Module 2 Graded Quiz: Access Management and Endpoint Security Quiz Answers
In this article i am gone to share Coursera Course: Cybersecurity Architecture by IBM | Week 2 | Module 2 Graded Quiz: Access Management and Endpoint Security Quiz Answers with you.
Enrol Link: Cybersecurity Architecture
Module 2 Graded Quiz: Access Management and Endpoint Security Quiz Answers
Question 1)
What is UBA in the context of cybersecurity?
- Unified Behavior Administration
- User Behavior Analytics
- Unified Business Analysis
- User Business Administration
Question 2)
What is the purpose of a federation capability in a cybersecurity system?
- To encrypt data transfers
- To record user sessions
- To manage user passwords
- To facilitate communication between different identity domains
Question 3)
What does CIAM stand for in the context of cybersecurity?
- Customer Information Access Management
- Centralized Information and Access Management
- Corporate Identity Approval Mechanism
- Consumer Identity and Access Management
Question 4)
What is the focus of the term ‘workforce identity management’?
- Managing the identities of corporate assets
- Managing the identities of external partners
- Managing the identities of employees within an organization
- Managing the identities of customers
Question 5)
What is the first and most important element that should be considered in a well-defined BYOD program?
- Consent
- Remote wipe
- Monitoring
- Software requirements
Question 6)
In a well-defined BYOD program, what should the policy state about monitoring?
- The company doesn’t monitor usage
- The company monitors without informing the employee
- The company primarily monitors corporate usage
- The company monitors personal usage
Question 7)
What could a company reserve the right to do in a well-defined BYOD program for security purposes?
- Monitor all device activities
- Lock the device
- Wipe all data from the device
- Remotely wipe only corporate data
Question 8)
What is a possible hardware restriction in a well-defined BYOD program?
- There are no hardware restrictions
- Only a specific device configuration is supported
- Any device can be used
- Only the latest devices are supported
Question 9)
What is the main+ disadvantage of using Single-factor Authentication with Password Only?
- It lacks an additional layer of security
- It involves biometrics
- It requires something the user knows
- It can be impractical and user-unfriendly for online banking
Question 10)
Why is a two-factor authentication involving a biometric and security token that is not ideal for online banking?
- All users have the necessary hardware for biometric authentication
- Carrying a security token at all times is convenient
- Many users may not have the required hardware for biometric authentication
- It provides a high level of security