All Coursera Quiz Answers

Foundations of Cybersecurity Weekly challenge 2 Quiz Answers

Hello Friends in this article i am gone to share Foundations of Cybersecurity Weekly challenge 2 Quiz Answers with you..

Enroll Link: Foundations of Cybersecurity


Also Visit:ย  Foundations of Cybersecurity Weekly challenge 1 Quiz Answers


 

Foundations of Cybersecurity Weekly challenge 2 Quiz Answers

Question 1)
Fill in the blank: A _____ is malicious code written to interfere with computer operations and cause damage to data.

  • software breach
  • computer virus
  • spyware attack
  • business disruption

Question 2)
What historical event used a malware attachment to steal user information and passwords?

  • Morris worm
  • LoveLetter attack
  • Equifax breach
  • Brain virus

Question 3)
Fill in the blank: Social engineering is a _____ that exploits human error to gain private information, access, or valuables.

  • business breach
  • type of malware
  • replicating virus
  • manipulation technique

Question 4)
A security professional is asked to teach employees how to avoid inadvertently revealing sensitive data. What type of training should they conduct?

  • Training about security architecture
  • Training about social engineering
  • Training about network optimization
  • Training about business continuity

Question 5)
Which domain involves defining security goals and objectives, risk mitigation, compliance, business continuity, and the law?

  • Security architecture and engineering
  • Security assessment and testing
  • Identity and access management
  • Security and risk management

Question 6)
Which of the following tasks may be part of the security architecture and engineering domain? Select all that apply.

  • Configuring a firewall
  • Ensuring that effective systems and processes are in place
  • Securing hardware
  • Validating the identities of employees

Question 7)
A security professional is ensuring proper storage, maintenance, and retention of their organizationโ€™s data. Which domain does this scenario describe?

  • Asset security
  • Security operations
  • Security assessment and testing
  • Communication and network security

Question 8)
Which domain involves conducting, collecting, and analyzing data, as well as conducting security audits to monitor for risks, threats, and vulnerabilities?

  • Security and risk management
  • Security assessment and testing
  • Communication and network security
  • Identity and access management

Question 9)
Which domain involves keeping data secure by ensuring users follow established policies to control and manage physical assets?

  • Security and risk management
  • Security assessment and testing
  • Communication and network security
  • Identity and access management

Question 10)
A security professional receives an alert that an unknown device has connected to their organizationโ€™s internal network. They follow policies and procedures to quickly stop the potential threat. Which domain does this scenario describe?

  • Asset security
  • Security and risk management
  • Security operations
  • Identity and access management

 

Question 11)
Which of the following threats are examples of malware? Select two answers.

  • Error messages
  • Worms
  • Viruses
  • Bugs

Question 12)
What historical event resulted in one of the largest known thefts of sensitive data, including social security numbers and credit card numbers?

  • Equifax breach
  • LoveLetter attack
  • Morris worm
  • Brain virus

Question 13)
Fill in the blank: Social engineering is a manipulation technique that exploits _____ error to gain access to private information.

  • network
  • human
  • computer
  • coding

Question 14)
A security professional is researching compliance and the law in order to define security goals. Which domain does this scenario describe?

  • Security assessment and testing
  • Security and risk management
  • Security architecture and engineering
  • Identity and access management

Question 15)
A security professional is optimizing data security by ensuring that effective tools, systems, and processes are in place. Which domain does this scenario describe?

  • Communication and network security
  • Security and risk management
  • Identity and access management
  • Security architecture and engineering

Question 16)
A security professional is setting up access keycards for new employees. Which domain does this scenario describe?

  • Communication and network security
  • Security and risk management
  • Identity and access management
  • Security assessment and testing

Question 17)
Which domain involves conducting investigations and implementing preventive measures?

  • Identity and access management
  • Asset security
  • Security and risk management
  • Security operations

Question 18)
Which of the following tasks may be part of the security operations domain? Select all that apply.

  • Conducting investigations
  • Investigating an unknown device that has connected to an internal network
  • Implementing preventive measures
  • Using coding practices to create secure applications

Question 19)
Which of the following tasks are part of the security and risk management domain? Select all that apply.

  • Defining security goals and objectives
  • Compliance
  • Securing physical assets
  • Business continuity

Question 20)
Which domain involves optimizing data security by ensuring that effective tools, systems, and processes are in place?

  • Security and risk management
  • Identity and access management
  • Communication and network security
  • Security architecture and engineering

Question 21)
Which domain involves securing digital and physical assets, as well as managing the storage, maintenance, retention, and destruction of data?

  • Communication and network security
  • Security operations
  • Asset security
  • Security assessment and testing

Question 22)
Which of the following tasks may be part of the security assessment and testing domain? Select all that apply.

  • Collecting and analyzing data
  • Conducting security audits
  • Auditing user permissions
  • Securing physical networks and wireless communications

Question 23)
A security professional is setting up access keycards for new employees. Which domain does this scenario describe?

  • Security assessment and testing
  • Identity and access management
  • Communication and network security
  • Security and risk management

Question 24)
Which of the following threats are most likely to occur in the event of a phishing attack? Select all that apply.

  • Malicious software being deployed
  • Employees inadvertently revealing sensitive data
  • Theft of the organizationโ€™s hardware
  • Overtaxing systems with too many internal emails

Question 25)
What is the term for software that is designed to harm devices or networks?

  • Bug
  • Error message
  • Social application
  • Malware

Question 26)
What historical event occurred as a result of trying to track illegal copies of medical software and prevent pirated licenses?

  • Equifax breach
  • LoveLetter attack
  • Brain virus
  • Morris worm

Question 27)
A security professional conducts internal training to teach their coworkers how to identify a social engineering attack. What types of security issues are they trying to avoid? Select all that apply.

  • Malicious software being deployed
  • Phishing attacks
  • Employees inadvertently revealing sensitive data
  • Overtaxing systems with too many internal emails

Question 28)
Which of the following tasks may be part of the asset security domain? Select all that apply.

  • Securing digital and physical assets
  • Proper disposal of digital assets
  • Ensuring users follow established policies
  • Data storage and maintenance

Question 29)
A security professional is auditing user permissions at their organization in order to ensure employees have the correct access levels. Which domain does this scenario describe?

  • Communication and network security
  • Security assessment and testing
  • Security and risk management
  • Asset security

Question 30)
Which of the following tasks may be part of the identity and access management domain? Select all that apply.

  • Controlling physical assets
  • Ensuring users follow established policies
  • Conducting security control testing
  • Setting up an employeeโ€™s access keycard

Question 31)
Fill in the blank: Exploiting human error to gain access to private information is an example of _____ engineering.

  • communication
  • network
  • social
  • digital