Coursera Answers

Introduction to Cybersecurity Essentials Coursera Quiz Answers

Hello Friends in this article i am gone to share Coursera course: Introduction to Cybersecurity Essentials by IBM | All Weeks Quiz  Answers| Introduction to Cybersecurity Essentials Coursera Quiz Answers with you..

Enroll Link: Introduction to Cybersecurity Essentials

Introduction to Cybersecurity Essentials Coursera Quiz Answers


 

WEEK 1 QUIZ ANSWERS

Practice Quiz: Common Security Threats and Risks Quiz Answer

Question 1)
In cybersecurity, what does the CIA in CIA Triad refer to?

  • Cybersecurity Investigation Agency
  • Cybersecurity, Integration, Accessibility
  • Control, Integration, Availability
  • Confidentiality, Integrity, Availability

Question 2)
When does raw data become information?

  • When it has been cleaned, refined, and organized
  • When it has been securely stored in a database and analyzed
  • When it is captured
  • When it is exported to a spreadsheet or report

Question 3)
Which malicious software is a virus that starts itself after identifying system weaknesses and spreads between computers and over networks?

  • Spyware
  • Virus
  • Trojan
  • Worm

Question 4)
What type of malware locks the user out of their files or device, then demands an anonymous online payment to restore access?

  • Ransomware
  • Virus
  • Trojan
  • Man-in-the-Middle attack

Question 5)
Employees at your company are having a difficult time accessing the company’s website. Some employees report slow performance, and some cannot access it all. IT staff investigate and find millions of half-open connections on port 443 from thousands of different IP addresses. Which type of attack is occurring?

  • Man-in-the-Middle attack
  • DDoS attack
  • MAC flooding
  • Domain name hijacking

 

Graded Quiz: Common Security Threats and Risks Quiz Answers

Question 1)
What does confidentiality of data refer to?

  • Rules which hide data
  • Rules which restrict access only to those who need to know
  • Rules which prevent data from being changed
  • Rules which allow access only to all parties

Question 2)
Maria has taken her college entry exam and is waiting to get her results via email. By accident, the university sent Maria’s results to Alexander. What part of the CIA Triad has been broken?

  • Confidentiality
  • Availability
  • Accessibility
  • Data breach

Question 3)
Your company’s Marketing team will be taking a group of people on a tour of your facility. The company has sent an email to all employees requiring them to clean all whiteboards and to make sure their desktops are cleared. What is the company trying to protect against?

  • Exposure to logon credentials
  • Damage to the company’s reputation
  • A loss of intellectual property
  • Social engineering

Question 4)
What does the acronym PII stand for?

  • Protected identity Information
  • Personnel Internal Information
  • Private Internet Identifier
  • Personally Identifiable Information

Question 5)
David noticed an unattended laptop in a coffee shop and decided to steal it. Which of the following types of cybercrime did he commit?

  • Hardware theft
  • Identity theft
  • Unauthorized access
  • Cyberbullying

Question 6)
Someone was recently caught sifting through your company’s trash looking for confidential information. Which type of security threat is this?

  • Data dump
  • Snooping
  • Data leak
  • Dumpster diving

Question 7)
You’ve started to notice that a co-worker sitting next to you always seems to look your way when you’re trying to enter your username and password to log onto the network. What is this co-worker doing?

  • Eavesdropping
  • Snooping
  • Man-in-the-Middle attack
  • Shoulder surfing

Question 8)
You just installed a new search engine on your computer. Afterwards, whenever you search the Internet, several pop-up windows appear on your screen directing you to buy products. What type of malware is installed on your machine?

  • Adware
  • Spyware
  • Trojan
  • Virus

Question 9)
Your supervisor is extremely busy today and asks you to log into the HR server using her logon credentials to retrieve some payroll reports. What should you do?

  • She’s a trusted employee and your supervisor so it is acceptable to do as she asks.
  • Forward her request to the IT Department because they also have logons to the HR server and can run the reports for you because their logins allow them to provide software patches to the server.
  • Ignore her request and hope she forgets about it.
  • Politely decline the request and remind her that it is against the company’s security policy to share logon credentials.

Question 10)
Which of the following best describes a Trojan Horse?

  • A type of malware that encrypts your files and makes a demand that ransom be paid.
  • A type of malware that inserts ads on top of websites that you visit.
  • A type of malware that records your keystrokes.
  • A type of malware that tricks you into installing software that looks legitimate.

 


 

WEEK 2 QUIZ ANSWERS

Practice Quiz: Security Best Practices Quiz Answer

Question 1)
Which of the following is an example of an effective password policy?

  • Password strength combined with multifactor authentication are essential tools for maintaining security.
  • Passwords may be reused or recycled after 6 months.
  • Set the minimum password to 6 characters or more.
  • A password could be shared with a trusted co-worker such as someone from the IT Department or Help Desk.

Question 2)
What is the benefit of the principle of least privilege?

  • It improves data security and prevents the spread of malware on your network.
  • It reduces the number of employees who can log into the corporate network.
  • It reduces the number of hours that an employee can log into the company’s network.
  • It lets system administrators monitor all user activity on the company’s network, including logins and system changes.

Question 3)
Which of the following is the correct term used for making a device, operating system, or software application as secure as possible?

  • Fortifying
  • Toughening
  • Strengthening
  • Hardening

Question 4)
Which method would prevent an attacker from connecting to your computer remotely from an Internet connection over an open port?

  • Use cipher text to encrypt your files.
  • Use full disk encryption like Microsoft BitLocker.
  • Use a VPN (Virtual Private Network), like Norton Secure VPN.
  • Use a host-based firewall, like Windows Firewall.

Question 5)
Which of the following terms best refers to fixing a known software problem?

  • BIOS Update
  • Patch
  • Upgrade
  • Firmware Update

 

Graded Quiz: Security Best Practices Quiz Answers

Question 1)
You are investigating fraudulent activities committed by two employees at your company. You’re asked to provide non-refutable evidence to confirm it. What type of evidence will you provide?

  • Authentication records
  • Non-repudiation
  • Access control
  • Authorization logs

Question 2)
Why would you use a VPN?

  • To encrypt data on a public network
  • To translate network addresses into subnets
  • To share an Internet connection to multiple devices
  • To allocate IP addresses to network hosts

Question 3)
Which of the following authentication methods require more than one authentication process for a logon? (Select two.)

  • 2FA
  • Fingerprint reader
  • Multifactor authentication
  • Access badge
  • Biometrics

Question 4)
You received an email from your bank alerting you to suspicious activity on your bank account. They inform you that to keep your account safe, you should change your password immediately. They provide you with a link to change your password. Which type of social engineering attack was used against you?

  • Impersonation
  • Session hijacking
  • Identity theft
  • Phishing

Question 5)
Recently, your company experienced a data breach. An investigation confirms that the source was a company executive who was using his mobile phone in a public area. Which of the following might have prevented this breach?

  • Multifactor authentication
  • A firewall
  • Disabling Bluetooth
  • Disabling NFC

Question 6)
Using asymmetric encryption is best suited for which one of the following scenarios?

  • Protecting data in transit against eavesdropping and data tampering.
  • A laptop with a WWAN card installed.
  • Efficiency. There is a single key used to encrypt and decrypt data.
  • Protecting data at rest stored on hard drives and removable drives.

Question 7)
Which of the following practices can help you manage your email and reduce spam?

  • Only subscribe to legitimate email distributions lists.
  • Don’t use throwaway accounts.
  • Keep your inbox clean and use folders to organize your email by category.
  • Change your password every 6-12 months.

Question 8)
You are assigned a task to secure data on the development machines in the lab. None are connected to any external networks. What can you do to prevent data theft?

  • Install a VPN.
  • Install a network firewall.
  • Use file-level encryption.
  • Use drive encryption.

Question 9)
After you have applied an operating system update to your laptop, your sound card is no longer functional. You’ve determined that the sound card driver is no longer compatible and needs an update. Where is the best place to obtain a new driver?

  • From a torrent site
  • The Apple App Store
  • The Google Play store
  • From the original equipment manufacturer (OEM)

Question 10)
Common passwords and phrases are safe for passwords as long as they:

  • Are at least 12 characters long and include a number and punctuation mark.
  • Commonly used passwords are never safe.
  • Are in a language other than your own native language.
  • Are easy for you to remember.

 


 

WEEK 3 QUIZ ANSWERS

Practice Quiz: Safe Browsing Practices Quiz Answer

Question 1)
Why is it important for organizations to secure their business software?

  • To ensure that IT staff can install necessary patches to keep it up to date
  • To prevent hackers from obtaining the software and selling it on the dark web
  • To prevent employees from legally downloading and installing it on their computers
  • To prevent hackers from targeting and launching ransomware, exploits, or other cyberattacks against it

Question 2)
What does the HTTPS:// at the beginning of a URL mean, as opposed to a URL that begins with HTTP://?

  • That the site is only for computers and not mobile phones
  • That the site is not accessible to certain computers
  • That any information entered into the site is encrypted
  • That the site has special high-definition content

Question 3)
When a public Wi-Fi network requires a password to use it, does that mean it’s generally safe to use it for sensitive activities like online banking?

  • Yes, as long as you are only checking balances and not sending or receiving funds.
  • Yes, as long as your bank requires multifactor authentication.
  • Yes, as long as you’re using your mobile phone.
  • No, it is not safe.

Question 4)
Which of the following statements is true regarding browser plugins, toolbars, and extensions?

  • They should never be installed on a mobile device.
  • They are safe to use only if they come from a website that has HTTP:\\ in the URL.
  • Browsers and their associated add-ons should be updated to the newest versions.
  • They are completely safe to use.

Question 5)
Your co-worker, Rachelle, has recently discovered that when she starts typing her name into a field in a web browser, her whole name and address appears in their respective boxes. What is causing this to happen?

  • Autorun
  • Autopay
  • Autofill
  • Autoplay

 

Graded Quiz: Safe Browsing Practices Quiz Answers

Question 1)
Which of the following best describes the primary reason that hackers target companies?

  • To try to steal sensitive data such as intellectual property, trade secrets and other valuable data to sell on the dark web.
  • So they can learn more about multifactor authentication.
  • So they can learn more about the non-approved applications installed at the company.
  • To see if the company’s employees are practicing unsafe browsing habits.

Question 2)
Which technology can help reduce security threats when using an unsecure Wi-Fi network?

  • Using a virtual private network (VPN)
  • Using a different public Wi-Fi network that requires a password to log in
  • By rooting or jailbreaking your phone
  • Using the Bluetooth connection on your mobile phone

Question 3)
Which of the following is a strong password?

  • BlackJack1963
  • X5j13$#eCM19
  • IluvMyCat
  • ToBeorNotToBe

Question 4)
You’ve been messaging online with a stranger for a few weeks, and he asked you for your email address. He’s been friendly and seems trustworthy, so you give it to him. He then cut off all contact with you and now your Inbox is filling up with thousands of emails from companies, and people you don’t know. What happened?

  • The stranger is trying to impersonate you online.
  • The stranger used a phishing attack and social engineering against you to obtain your email address to use for sending spam.
  • Your email account was hacked.
  • Your identity was stolen.

Question 5)
Which of the following statements about cookies is true?

  • Cookies do not track my activities on a website.
  • Cookies contain viruses that can damage my computer.
  • Cookies can fill up my hard drive and make my computer run slower.
  • I can get a cookie from a website I’ve never been to.

Question 6)
Which of the following characteristics should apply to a CA security certificate?

  • A security certificate should not be required if the website’s URL begins with HTTPS://.
  • A security certificate should be issued from a trusted Certificate of Authority.
  • A security certificate should be self-signed.
  • A security certificate should be hashed with an MD5 algorithm.

Question 7)
What is SSL (Secure Socket Layer) used for?

  • Protecting the website from SQL injection attacks
  • Stopping certificate expiration warning messages
  • Protecting the website from drive-by malware installations
  • Preventing the interception and tampering of data

Question 8)
After logging into your computer today, you’ve noticed that every time you try to visit a website, your browser keeps redirecting you to other sites. What is the cause?

  • Your computer has been infected with malware that is causing the redirects.
  • A hacker is controlling your computer.
  • Your computer was hacked and is now part of a botnet.
  • Someone has stolen your identity and is impersonating you on your computer.

Question 9)
Which of the following is a risk to rooting or jailbreaking a mobile device?

  • Data is exposed to hackers.
  • The device is bricked or becomes unusable.
  • You won’t be charged for the software you want to install on it.
  • All data is deleted from the device.

Question 10)
Which of the following is a genuine Certificate of Authority (root certificate store)?

  • Google Play Store
  • Adobe
  • Apple App Store
  • Microsoft

 


 

WEEK 4 QUIZ ANSWERS

Graded Quiz: Final Quiz Answers

Question 1)
Which of the following attacks would a hacker use to potentially target the theft of intellectual property?

  • Man-in-the-Middle attack
  • Replay attack
  • Dumpster diving
  • Impersonation

Question 2)
An attacker was easily able to log in to your company’s security camera by performing a basic Internet search. He found a setup guide for that particular camera brand and model. Which of the following BEST describes the configurations the attacker exploited?

  • Unsecure protocols
  • Weak encryption
  • Open permissions
  • Default settings

Question 3)
Which of the following is one of the categories used in multifactor authentication?

  • Something you have
  • Someone you know
  • Something you can do
  • Somewhere you are

Question 4)
What does SSL stand for?

  • Secure sockets layer
  • Special security license
  • Secure space layer
  • Straight socket loop

Question 5)
Which of the following are elements of the CIA Triad?

  • Confidentiality, Interest, and Accessibility
  • Control, Integrity, and Accessibility
  • Control, Integrity, and Authentication
  • Confidentiality, Integrity, and Availability

Question 6)
In the context of security and information privacy, what does IP stand for?

  • Integrity Protocol
  • Internet Privacy
  • Intellectual Property
  • Information Privacy

Question 7)
Which of the following is a way that a web browser is vulnerable to a breach?

  • Web browsers are impervious to exploitation.
  • Leaving the browser open after it has become infected.
  • A virus can be sent through the monitor.
  • A browser plug-in can be exploited.

Question 8)
Digital signatures provide which of the following?

  • Authentication, data integrity, a form of non-repudiation
  • Confidentiality
  • Encryption
  • Availability

Question 9)
What is personally identifiable information, or PII?

  • Any data that alone, or in combination with other information, can identify an individual
  • Any information about an employee
  • Information or data stored online or offline
  • Historical information about a celebrity published on Wikipedia

Question 10)
What is the purpose of Trojan malware?

  • To flood a target system with so much traffic that it ceases to function, crashes, or reduces its performance
  • To masquerade as non-malicious software while exploiting a system’s weaknesses
  • To replicate itself and spread to other computers to form a botnet
  • To secretly record your browsing activities, capture your keystrokes and report back to a command-and-control server

Question 11)
Which of the following best describes a zombie cookie?

  • Cookies are altered to a virus-like state.
  • Cookies that emulate users by downloading the victim’s information to a virtual machine.
  • Cookies that emulate users by stealing their personal identity.
  • They don’t follow normal protocols and are difficult to remove.

Question 12)
What happens to your data when it’s encrypted?

  • It is sent through a series of computers to be compressed multiple times.
  • It is compressed, renamed, and archived.
  • It is scrambled to retain privacy from third parties.
  • It is transferred to a third party, encoded, then sent back.

Question 13)
There are two types of firewalls. What are they?

  • Internet-based and home-based
  • Digital and electronic
  • Hardware-based and software-based
  • Remote and local

Question 14)
Which of the following webpage addresses indicate that the browsing session is secured by SSL?

  • The web address begins with http://
  • The web address begins with ssl.http://
  • The web address begins with http.ssl://
  • The web address begins with https://

Question 15)
When is data at its least vulnerable?

  • When it’s being transferred on a USB stick
  • When it’s being written
  • When it’s at rest
  • When it’s in transit