Coursera Answers

Introduction to Cybersecurity for Business Coursera Quiz Answers

In this article i am gone to share Introduction to Cybersecurity for Business All Weeks Quiz Answers with you. | Introduction to Cybersecurity for Business Coursera Quiz Answers

Enrol Link:  Introduction to Cybersecurity for Business

Introduction to Cybersecurity for Business Coursera Quiz Answers


 

Week 1 Quiz Answers

Practice Quiz – Week 1

Question 1)
An asset could be financial records

  • True.
  • False.

Question 2)
A threat is something that is vulnerable.

  • True.
  • False.

Question 3)
A vulnerability could be an unpatched software flaw.

  • True.
  • False.

Question 4)
An exploit could be shell code designed to compromise a system.

  • True.
  • False.

Question 5)
An example of a high risk could be an unsecure server that houses financial data compared to a secure server.

  • True.
  • False.

Question 6)
An exploit could be used against/on a vulnerable system to compromise it.

  • True.
  • False.

Question 7)
There are limited number of security frameworks that organizations can use for security.

  • True.
  • False.

Question 8)
Most security frameworks are specialized and cannot work for most organizations

  • True.
  • False.

Question 9)
Industry frameworks are generally developed out of compliance issues and concerns.

  • True.
  • False.

Question 10)
Security frameworks can be implemented over time

  • True.
  • False.

 


 

Week 2 Quiz Answers

Practice Quiz – Week 2

Question 1)
Unauthorized disclosure of information is the lack of which

  • Confidentiality
  • Integrity

Question 2)
Protecting Credit card data through encryption is an example of

  • Integrity
  • Confidentiality

Question 3)
Redundancy checks are an example of what concept

  • Confidentiality
  • Integrity

Question 4)
The use of a VPN is an example of what concept

  • Availability
  • Confidentiality

Question 5)
Most data breaches involve some kind of loss of

  • Confidentiality
  • Integrity

Question 6
Disruption of an information system is an example of which concept

  • Integrity
  • Availability

Question 7)
RAID is an example of

  • Availability
  • Confidentiality

Question 8)
Why do we need availablity

  • To keep critical systems up and running
  • To protect critical information encrypted

Question 9)
Large scale DDoS attacks are an example of the loss of

  • Availability
  • Integrity

Question 10)
Replay attacks could be a loss of

  • Availability
  • Integrity

 


 

Week 3 Quiz Answers

Practice Quiz – Week 3

Question 1)
Risk is not something that we should be concerned with

  • True.
  • False.

Question 2)
Using Torrenting software could be considered a risk

  • True.
  • False.

Question 3)
Connections in a home office have more risk than those in a coffee shop

  • True.
  • False.

Question 4)
Trusted networks generally have less risk than untrusted networks

  • True.
  • False.

Question 5)
Natural disasters generally come with their share of phishing

  • True.
  • False.

Question 6)
You, yourself, can rewrite your operating system code to lessen risk

  • True.
  • False.

Question 7)
Following best practices can lower risk

  • True.
  • False.

Question 8)
Risk Assessments require planning

  • True.
  • False.

Question 9)
Communication is not an important step in Risk Assessments

  • True.
  • False.

Question 10)
Once a risk assessment is performed, it is a good idea to address the risks

  • True.
  • False.

 

 

 


 

Week 4 Quiz Answers

Practice Quiz – Week 4

Question 1)
Passwords should be hashed

  • True.
  • False.

Question 2)
A fingerprint isn’t an identifer that should be protected.

  • True.
  • False.

Question 3)
Typically passwords are not stored in clear text.

  • True.
  • False.

Question 4)
A salt is a piece of data that is added to a hash to increase security.

  • True.
  • False.

Question 5)
Rainbow tables can be used to crack passwords

  • True.
  • False.

Question 6)
Large data breaches have been known to affect organizations more if the passwords that were compromised were not hashed.

  • False.
  • True.

Question 7)
Port 80 is a secure port

  • True.
  • False.

Question 8)
Port 443 generally runs secure communication for email

  • False.
  • True.

Question 9)
S/MIME is used for secure transport of email.

  • True.
  • False.

Question 10)
Telnet is a secure port for communicating to network devices.

  • True.
  • False.

 

 


 

Week 5 Quiz Answers