All Coursera Quiz Answers

Play It Safe: Manage Security Risks Weekly challenge 3 Quiz Answers

In this article i am gone to share Coursera Course: Play It Safe: Manage Security Risks | Weekly challenge 3 Quiz Answers with you..

Course Link: Play It Safe: Manage Security Risks


Also Visit:  Play It Safe: Manage Security Risks Weekly challenge 2 Quiz Answers


 

Play It Safe: Manage Security Risks Weekly challenge 3 Quiz Answers

Question 1)
Which of the following statements correctly describe logs? Select three answers.

  • SIEM tools rely on logs to monitor systems and detect security threats.
  • A record of events related to employee logins and username requests is part of a server log.
  • Actions such as username requests are recorded in a network log.
  • A record of connections between devices and services on a network is part of a network log.

Question 2)
What are some of the key benefits of SIEM tools? Select three answers.

  • Automatic customization to changing security needs
  • Minimize the number of logs to be manually reviewed
  • Increase efficiency
  • Deliver automated alerts

Question 3)
Fill in the blank: A security professional creates a dashboard that displays technical attributes about business operations called ______, such as incoming and outgoing network traffic.

  • metrics
  • averages
  • logs
  • SIEM tools

Question 4)
A security team chooses to implement a SIEM tool that they will install, operate, and maintain using their own physical infrastructure. What type of tool are they using?

  • Cloud-hosted
  • Hybrid
  • Self-hosted
  • Log-hosted

Question 5)
You are a security professional, and you want to save time by using a SIEM tool that will be managed by a provider and only be accessible through the internet. What type of tool do you choose?

  • Hybrid
  • Cloud-hosted
  • Self-hosted
  • IT-hosted

Question 6)
Fill in the blank: SIEM tools are used to search, analyze, and _____ an organization’s log data to provide security information and alerts in real-time.

  • separate
  • retain
  • release
  • modify

Question 7)
Which tool provides a comprehensive, visual summary of security-related data, including metrics?

  • Playbook
  • network protocol analyzer (packet sniffer)
  • Command-line interface
  • SIEM

Question 8)
Fill in the blank: _____ tools are often free to use.

  • Proprietary
  • Command-line
  • Cloud-hosted
  • Open-source

Question 9)
Which of the following statements correctly describe logs? Select three answers.

  • A network log is a record of all computers and devices that enter and leave a network.
  • Actions such as using a username or password are recorded in a firewall log.
  • Events related to websites, emails, or file shares are recorded in a server log.
  • A log is a record of events that occur within an organization’s systems and networks.

Question 10)
What are some of the key benefits of SIEM tools? Select three answers.

  • Provide visibility
  • Store all log data in a centralized location
  • Monitor critical activities in an organization
  • Automatic updates customized to new threats and vulnerabilities

Question 11)
Fill in the blank: To assess the performance of a software application, security professionals use _____, including response time, availability, and failure rate.

  • SIEM tools
  • metrics
  • dashboards
  • logs

Question 12)
You are a security professional, and you want a SIEM tool that will require both on-site infrastructure and internet-based solutions. What type of tool do you choose?

  • Self-hosted
  • Cloud-hosted
  • Component-hosted
  • Hybrid

Question 13)
Fill in the blank: SIEM tools retain, analyze, and search an organization’s _____ to provide security information and alerts.

  • hardware
  • cloud applications
  • database
  • log data

Question 14)
A security analyst receives an alert about hundreds of login attempts from unusual geographic locations within the last few minutes. What can the analyst use to review a timeline of the login attempts, locations, and time of activity?

  • A network protocol analyzer (packet sniffer)
  • A SIEM tool dashboard
  • A playbook
  • An operating system

Question 15)
Which type of tool typically requires users to pay for usage?

  • Open-source
  • Cloud native
  • Proprietary
  • Self-hosted

Question 16)
Fill in the blank: Software application _____ are technical attributes, such as response time, availability, and failure rate.

  • metrics
  • dashboards
  • logs
  • SIEM tools

Question 17)
A security team chooses to implement a SIEM tool that will be managed and maintained by the organization’s IT department, rather than a third-party vendor. What type of tool are they using?

  • Self-hosted
  • Department-hosted
  • Cloud-hosted
  • Hybrid

Question 18)
You are a security analyst, and you want a security solution that will be fully maintained and managed by your SIEM tool provider. What type of tool do you choose?

  • Cloud-hosted
  • Hybrid
  • Solution-hosted
  • Self-hosted

Question 19)
After receiving an alert about a suspicious login attempt, a security analyst can access their _____ to gather information about the alert.

  • internal infrastructure
  • playbook
  • SIEM tool dashboard
  • network protocol analyzer (packet sniffer)

Question 20)
Fill in the blank: The wide exposure and immediate access to the source code of open-source tools makes it _____ likely that issues will occur.

  • very
  • more
  • equally
  • less

Question 1)
Which of the following statements correctly describe logs? Select three answers.

  • Security teams monitor logs to identify vulnerabilities and potential data breaches.
  • Outbound requests to the internet from within a network are recorded in a firewall log.
  • Actions such as login requests are recorded in a server log.
  • Connections between devices and services on a network are recorded in a firewall log.

Question 6)
Fill in the blank: _____ are used to retain, analyze, and search an organization’s log data to provide security information and alerts in real-time.

  • SIEM tools
  • Playbooks
  • network protocol analyzers (packet sniffers)
  • Operating systems

Question 4)
A security team installs a SIEM tool within their company’s own infrastructure to keep private data on internal servers. What type of tool are they using?

  • Self-hosted
  • Hybrid
  • Infrastructure-hosted
  • Cloud-hosted

Question 2)
What are some of the key benefits of SIEM tools? Select three answers.

  • Eliminate the need for manual review of logs
  • Collect log data from different sources
  • Provide event monitoring and analysis
  • Save time