All Coursera Quiz Answers

Foundations of Cybersecurity Weekly challenge 2 Quiz Answers

Hello Friends in this article i am gone to share Foundations of Cybersecurity Weekly challenge 2 Quiz Answers with you..

Enroll Link: Foundations of Cybersecurity


Also Visit:  Foundations of Cybersecurity Weekly challenge 1 Quiz Answers


 

Foundations of Cybersecurity Weekly challenge 2 Quiz Answers

Question 1)
Fill in the blank: A _____ is malicious code written to interfere with computer operations and cause damage to data.

  • software breach
  • computer virus
  • spyware attack
  • business disruption

Question 2)
What historical event used a malware attachment to steal user information and passwords?

  • Morris worm
  • LoveLetter attack
  • Equifax breach
  • Brain virus

Question 3)
Fill in the blank: Social engineering is a _____ that exploits human error to gain private information, access, or valuables.

  • business breach
  • type of malware
  • replicating virus
  • manipulation technique

Question 4)
A security professional is asked to teach employees how to avoid inadvertently revealing sensitive data. What type of training should they conduct?

  • Training about security architecture
  • Training about social engineering
  • Training about network optimization
  • Training about business continuity

Question 5)
Which domain involves defining security goals and objectives, risk mitigation, compliance, business continuity, and the law?

  • Security architecture and engineering
  • Security assessment and testing
  • Identity and access management
  • Security and risk management

Question 6)
Which of the following tasks may be part of the security architecture and engineering domain? Select all that apply.

  • Configuring a firewall
  • Ensuring that effective systems and processes are in place
  • Securing hardware
  • Validating the identities of employees

Question 7)
A security professional is ensuring proper storage, maintenance, and retention of their organization’s data. Which domain does this scenario describe?

  • Asset security
  • Security operations
  • Security assessment and testing
  • Communication and network security

Question 8)
Which domain involves conducting, collecting, and analyzing data, as well as conducting security audits to monitor for risks, threats, and vulnerabilities?

  • Security and risk management
  • Security assessment and testing
  • Communication and network security
  • Identity and access management

Question 9)
Which domain involves keeping data secure by ensuring users follow established policies to control and manage physical assets?

  • Security and risk management
  • Security assessment and testing
  • Communication and network security
  • Identity and access management

Question 10)
A security professional receives an alert that an unknown device has connected to their organization’s internal network. They follow policies and procedures to quickly stop the potential threat. Which domain does this scenario describe?

  • Asset security
  • Security and risk management
  • Security operations
  • Identity and access management

 

Question 11)
Which of the following threats are examples of malware? Select two answers.

  • Error messages
  • Worms
  • Viruses
  • Bugs

Question 12)
What historical event resulted in one of the largest known thefts of sensitive data, including social security numbers and credit card numbers?

  • Equifax breach
  • LoveLetter attack
  • Morris worm
  • Brain virus

Question 13)
Fill in the blank: Social engineering is a manipulation technique that exploits _____ error to gain access to private information.

  • network
  • human
  • computer
  • coding

Question 14)
A security professional is researching compliance and the law in order to define security goals. Which domain does this scenario describe?

  • Security assessment and testing
  • Security and risk management
  • Security architecture and engineering
  • Identity and access management

Question 15)
A security professional is optimizing data security by ensuring that effective tools, systems, and processes are in place. Which domain does this scenario describe?

  • Communication and network security
  • Security and risk management
  • Identity and access management
  • Security architecture and engineering

Question 16)
A security professional is setting up access keycards for new employees. Which domain does this scenario describe?

  • Communication and network security
  • Security and risk management
  • Identity and access management
  • Security assessment and testing

Question 17)
Which domain involves conducting investigations and implementing preventive measures?

  • Identity and access management
  • Asset security
  • Security and risk management
  • Security operations

Question 18)
Which of the following tasks may be part of the security operations domain? Select all that apply.

  • Conducting investigations
  • Investigating an unknown device that has connected to an internal network
  • Implementing preventive measures
  • Using coding practices to create secure applications

Question 19)
Which of the following tasks are part of the security and risk management domain? Select all that apply.

  • Defining security goals and objectives
  • Compliance
  • Securing physical assets
  • Business continuity

Question 20)
Which domain involves optimizing data security by ensuring that effective tools, systems, and processes are in place?

  • Security and risk management
  • Identity and access management
  • Communication and network security
  • Security architecture and engineering

Question 21)
Which domain involves securing digital and physical assets, as well as managing the storage, maintenance, retention, and destruction of data?

  • Communication and network security
  • Security operations
  • Asset security
  • Security assessment and testing

Question 22)
Which of the following tasks may be part of the security assessment and testing domain? Select all that apply.

  • Collecting and analyzing data
  • Conducting security audits
  • Auditing user permissions
  • Securing physical networks and wireless communications

Question 23)
A security professional is setting up access keycards for new employees. Which domain does this scenario describe?

  • Security assessment and testing
  • Identity and access management
  • Communication and network security
  • Security and risk management

Question 24)
Which of the following threats are most likely to occur in the event of a phishing attack? Select all that apply.

  • Malicious software being deployed
  • Employees inadvertently revealing sensitive data
  • Theft of the organization’s hardware
  • Overtaxing systems with too many internal emails

Question 25)
What is the term for software that is designed to harm devices or networks?

  • Bug
  • Error message
  • Social application
  • Malware

Question 26)
What historical event occurred as a result of trying to track illegal copies of medical software and prevent pirated licenses?

  • Equifax breach
  • LoveLetter attack
  • Brain virus
  • Morris worm

Question 27)
A security professional conducts internal training to teach their coworkers how to identify a social engineering attack. What types of security issues are they trying to avoid? Select all that apply.

  • Malicious software being deployed
  • Phishing attacks
  • Employees inadvertently revealing sensitive data
  • Overtaxing systems with too many internal emails

Question 28)
Which of the following tasks may be part of the asset security domain? Select all that apply.

  • Securing digital and physical assets
  • Proper disposal of digital assets
  • Ensuring users follow established policies
  • Data storage and maintenance

Question 29)
A security professional is auditing user permissions at their organization in order to ensure employees have the correct access levels. Which domain does this scenario describe?

  • Communication and network security
  • Security assessment and testing
  • Security and risk management
  • Asset security

Question 30)
Which of the following tasks may be part of the identity and access management domain? Select all that apply.

  • Controlling physical assets
  • Ensuring users follow established policies
  • Conducting security control testing
  • Setting up an employee’s access keycard

Question 31)
Fill in the blank: Exploiting human error to gain access to private information is an example of _____ engineering.

  • communication
  • network
  • social
  • digital