All Coursera Quiz Answers

Incident Response, Business Continuity & Disaster Recovery Concepts Quiz Answers

In this blog post, we provide the answers to the quiz for the course titled “Incident Response, BC, and DR Concepts.” Specifically, we focus on the Incident Response, Business Continuity & Disaster Recovery Concepts Quiz Answers to help learners reinforce their understanding of these critical subjects. This resource is designed to aid in mastering key concepts and preparing for practical applications in cybersecurity, business continuity, and disaster recovery.

This quiz serves as a tool to validate your knowledge of the course content. Make sure to answer all questions, review the correct answers and feedback, and revisit any areas where you need further study.

Incident Response, Business
Continuity & Disaster Recovery Concepts Quiz Answers


Instructions

  1. This Assessment contains 10 objective item questions.
  2. Recommended time limit is 20 minutes, 2 minutes per question.
  3. Choose the best answer(s) for each question.
  4. You have unlimited attempts and may complete this assessment as many times as you would like.
  5. Passing grade for this quiz is 80%.
  6. Score of highest attempt will be calculated.

 

Concepts Quiz Answers

Question 1)
You are working in your organization’s security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. This is an example of a(n)_______. (D2, L2.1.1)

  • emergency
  • event
  • policy
  • disaster

Question 2)
You are working in your organization’s security office. You receive a call from a user who has tried to log in to the network several times with the correct credentials, with no success. After a brief investigation, you determine that the user’s account has been compromised. This is an example of a(n)_______. (D2, L2.1.1)

  • risk management
  • incident detection
  • malware
  • disaster

Question 3)
An external entity has tried to gain access to your organization’s IT environment without proper authorization. This is an example of a(n) _________. (D2, L2.1.1)

  • exploit
  • intrusion
  • event
  • malware

Question 4)
When responding to a security incident, your team determines that the vulnerability that was exploited was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. This vulnerability and exploit might be called ______. (D2, L 2.1.1)

  • malware
  • critical
  • fractal
  • zero-day

Question 5)
True or False? The IT department is responsible for creating the organization’s business continuity plan. (D2, L2.2.1)

  • True
  • False

Question 6)
The Business Continuity effort for an organization is a way to ensure critical ______ functions are maintained during a disaster, emergency, or interruption to the production environment. (D2, L 2.2.1)

  • business
  • technical
  • IT
  • financial

 

Also Check Out:  Security Operations Coursera Final Assessment Quiz Answers

 

Question 7)
Which of the following is very likely to be used in a disaster recovery (DR) effort? (D2, L 2.3.1)

  • guard dogs
  • data backups
  • contract personnel
  • anti-malware solutions

Question 8)
Which of the following is often associated with DR planning? (D2, L 2.3.1)

  • checklists
  • firewalls
  • motion detectors
  • non-repudiation

Question 9)
Which of these activities is often associated with DR efforts? (D2, L2.3.1)

  • employees returning to the primary production location
  • running anti-malware solutions
  • scanning the IT environment for vulnerabilities
  • zero-day exploits

Question 10)
Which of these components is very likely to be instrumental to any disaster recovery (DR) effort? (D2, L2.3.1)

  • routers
  • laptops
  • firewalls
  • backups