All Coursera Quiz Answers

Module 2 Graded Quiz: Access Management and Endpoint Security Quiz Answers

In this article i am gone to share Coursera Course: Cybersecurity Architecture by IBM | Week 2 | Module 2 Graded Quiz: Access Management and Endpoint Security Quiz Answers with you.

Enrol Link:  Cybersecurity Architecture

 

Module 2 Graded Quiz: Access Management and Endpoint Security Quiz Answers

Question 1)
What is UBA in the context of cybersecurity?

  • Unified Behavior Administration
  • User Behavior Analytics
  • Unified Business Analysis
  • User Business Administration

Question 2)
What is the purpose of a federation capability in a cybersecurity system?

  • To encrypt data transfers
  • To record user sessions
  • To manage user passwords
  • To facilitate communication between different identity domains

Question 3)
What does CIAM stand for in the context of cybersecurity?

  • Customer Information Access Management
  • Centralized Information and Access Management
  • Corporate Identity Approval Mechanism
  • Consumer Identity and Access Management

Question 4)
What is the focus of the term ‘workforce identity management’?

  • Managing the identities of corporate assets
  • Managing the identities of external partners
  • Managing the identities of employees within an organization
  • Managing the identities of customers

Question 5)
What is the first and most important element that should be considered in a well-defined BYOD program?

  • Consent
  • Remote wipe
  • Monitoring
  • Software requirements

Question 6)
In a well-defined BYOD program, what should the policy state about monitoring?

  • The company doesn’t monitor usage
  • The company monitors without informing the employee
  • The company primarily monitors corporate usage
  • The company monitors personal usage

Question 7)
What could a company reserve the right to do in a well-defined BYOD program for security purposes?

  • Monitor all device activities
  • Lock the device
  • Wipe all data from the device
  • Remotely wipe only corporate data

Question 8)
What is a possible hardware restriction in a well-defined BYOD program?

  • There are no hardware restrictions
  • Only a specific device configuration is supported
  • Any device can be used
  • Only the latest devices are supported

Question 9)
What is the main+ disadvantage of using Single-factor Authentication with Password Only?

  • It lacks an additional layer of security
  • It involves biometrics
  • It requires something the user knows
  • It can be impractical and user-unfriendly for online banking

Question 10)
Why is a two-factor authentication involving a biometric and security token that is not ideal for online banking?

  • All users have the necessary hardware for biometric authentication
  • Carrying a security token at all times is convenient
  • Many users may not have the required hardware for biometric authentication
  • It provides a high level of security