Introduction to Cybersecurity for Business Coursera Quiz Answers
In this article i am gone to share Introduction to Cybersecurity for Business All Weeks Quiz Answers with you. | Introduction to Cybersecurity for Business Coursera Quiz Answers
Enrol Link: Introduction to Cybersecurity for Business
Introduction to Cybersecurity for Business Coursera Quiz Answers
Week 1 Quiz Answers
Practice Quiz – Week 1
Question 1)
An asset could be financial records
- True.
- False.
Question 2)
A threat is something that is vulnerable.
- True.
- False.
Question 3)
A vulnerability could be an unpatched software flaw.
- True.
- False.
Question 4)
An exploit could be shell code designed to compromise a system.
- True.
- False.
Question 5)
An example of a high risk could be an unsecure server that houses financial data compared to a secure server.
- True.
- False.
Question 6)
An exploit could be used against/on a vulnerable system to compromise it.
- True.
- False.
Question 7)
There are limited number of security frameworks that organizations can use for security.
- True.
- False.
Question 8)
Most security frameworks are specialized and cannot work for most organizations
- True.
- False.
Question 9)
Industry frameworks are generally developed out of compliance issues and concerns.
- True.
- False.
Question 10)
Security frameworks can be implemented over time
- True.
- False.
Week 2 Quiz Answers
Practice Quiz – Week 2
Question 1)
Unauthorized disclosure of information is the lack of which
- Confidentiality
- Integrity
Question 2)
Protecting Credit card data through encryption is an example of
- Integrity
- Confidentiality
Question 3)
Redundancy checks are an example of what concept
- Confidentiality
- Integrity
Question 4)
The use of a VPN is an example of what concept
- Availability
- Confidentiality
Question 5)
Most data breaches involve some kind of loss of
- Confidentiality
- Integrity
Question 6
Disruption of an information system is an example of which concept
- Integrity
- Availability
Question 7)
RAID is an example of
- Availability
- Confidentiality
Question 8)
Why do we need availablity
- To keep critical systems up and running
- To protect critical information encrypted
Question 9)
Large scale DDoS attacks are an example of the loss of
- Availability
- Integrity
Question 10)
Replay attacks could be a loss of
- Availability
- Integrity
Week 3 Quiz Answers
Practice Quiz – Week 3
Question 1)
Risk is not something that we should be concerned with
- True.
- False.
Question 2)
Using Torrenting software could be considered a risk
- True.
- False.
Question 3)
Connections in a home office have more risk than those in a coffee shop
- True.
- False.
Question 4)
Trusted networks generally have less risk than untrusted networks
- True.
- False.
Question 5)
Natural disasters generally come with their share of phishing
- True.
- False.
Question 6)
You, yourself, can rewrite your operating system code to lessen risk
- True.
- False.
Question 7)
Following best practices can lower risk
- True.
- False.
Question 8)
Risk Assessments require planning
- True.
- False.
Question 9)
Communication is not an important step in Risk Assessments
- True.
- False.
Question 10)
Once a risk assessment is performed, it is a good idea to address the risks
- True.
- False.
Week 4 Quiz Answers
Practice Quiz – Week 4
Question 1)
Passwords should be hashed
- True.
- False.
Question 2)
A fingerprint isn’t an identifer that should be protected.
- True.
- False.
Question 3)
Typically passwords are not stored in clear text.
- True.
- False.
Question 4)
A salt is a piece of data that is added to a hash to increase security.
- True.
- False.
Question 5)
Rainbow tables can be used to crack passwords
- True.
- False.
Question 6)
Large data breaches have been known to affect organizations more if the passwords that were compromised were not hashed.
- False.
- True.
Question 7)
Port 80 is a secure port
- True.
- False.
Question 8)
Port 443 generally runs secure communication for email
- False.
- True.
Question 9)
S/MIME is used for secure transport of email.
- True.
- False.
Question 10)
Telnet is a secure port for communicating to network devices.
- True.
- False.
Week 5 Quiz Answers