All Coursera Quiz Answers

Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 1 Quiz Answers

In this article i am gone to share Coursera Course: Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 1 Quiz Answers with you..

Enroll Link: Put It to Work: Prepare for Cybersecurity Jobs

 

Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 1 Quiz Answers

Question 1)
Fill in the blank: A security mindset is the _____.

  • opportunity to showcase your Linux and other coding related technical skills
  • ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data
  • intent to provide quality security services to an organization’s development operations team
  • ability to help an organization’s human resources (HR) department remain compliant at all times

Question 2)
As a security analyst, you are responsible for protecting an organization’s low-level assets and high-level assets. Which of the following is considered a high-level asset?

  • Public press releases
  • Guest Wi-Fi network
  • Intellectual property
  • Company job descriptions

Question 3)
Which of the following statements best describes the relationship between a security mindset and asset protection?

  • A security mindset helps analysts protect low-level assets.
  • A security mindset helps analysts protect high-importance assets.
  • A security mindset is not important for protecting assets.
  • A security mindset helps analysts protect all levels of assets.

Question 4)
Which of the following examples are considered public data? Select two answers.

  • Health insurance information
  • Press releases
  • Product announcements
  • Passport numbers

Question 5)
Fill in the blank: _____ are interested in protecting sensitive financial data, customers’ usernames and passwords, and third-party vendor security.

  • HIPAA compliance officers
  • Stakeholders
  • Social media influencers
  • Web programmers

Question 6)
What are some examples of the customer data that security analysts protect? Select two answers.

  • Product announcements
  • Newsletters
  • Credit card numbers
  • Passwords

Question 7)
What are some ways that security analysts protect data? Select three answers.

  • Reporting small events
  • Paying attention to detail
  • Ignoring small events
  • Understanding the organization’s assets

Question 8)
Which of the following defines a security incident?

  • A security event that does not result in a data breach
  • A breach that disrupts the physical security of an organization
  • A breach that disrupts the cloud security of an organization
  • A security event that results in a data breach

Question 9)
Fill in the blank: An organization is responsible for protecting its customers’ sensitive data. Examples of the kinds of sensitive data that must be protected include ____ and _____. Select two answers.

  • website URLs
  • private social media pages
  • bank statements
  • social security numbers

Question 10)
Which of the following can cause a company to experience loss of credibility, financial loss, or regulatory fines?

  • A data breach
  • A cybersecurity awareness month phishing program
  • The resignation of the company’s social media manager
  • Employee security awareness training

 

Question 11)
Which concept focuses on understanding how to evaluate risk and identify the potential for a breach of a system, application, or data?

  • Security recognition
  • Python knowledge
  • Security mindset
  • Security analyst evaluation

Question 12)
Fill in the blank: Entry-level analysts can help protect low-level assets, such as an organization’s _____.

  • financial information
  • guest Wi-Fi network
  • trade secrets
  • company job descriptions

Question 13)
Fill in the blank: A security mindset helps a security analyst _____.

  • recognize the difference between physical security and cybersecurity
  • defend against constant pressure from cyber attackers
  • reinforce the expectations of security stakeholders
  • apply for an engineering role

Question 14)
An employee at a healthcare company accesses a patient’s medical history and payment information to provide treatment. Which type of data is this classified as?

  • Public data
  • Sensitive data
  • Confidential data
  • Private data

Question 15)
Fill in the blank: One of the most important concerns for most organizations is the protection of _____.

  • job postings
  • customer data
  • guest Wi-Fi
  • social media

Question 16)
A security analyst notices that an employee has installed an app on their work computer without getting permission from the IT service desk. The security analyst also notices that antivirus software recorded a potentially malicious execution on the same computer. Which of these security events should the security analyst escalate to their supervisor?

  • Both events should be escalated.
  • Neither event should be escalated.
  • The potentially malicious code detected by the antivirus software should be escalated.
  • The employee installing an app without permission should be escalated.

Question 17)
Which of the following are examples of sensitive customer data that most organizations prioritize? Select two answers.

  • Job postings
  • Usernames and passwords
  • Credit card numbers
  • Social media profiles

Question 18)
Fill in the blank: ____ can occur if an organization’s data and essential assets are compromised in a way that disrupts its business operations.

  • Public shame
  • Unsuccessful marketing campaigns
  • Cancellation of holiday work events
  • Financial loss

Question 19)
Who will be affected by the decisions you make as a security analyst? Select two answers.

  • The customers of the organization that hired you
  • The financial markets
  • Competitors in the same industry
  • The organization that hired you

Question 20)
Fill in the blank: A security analyst should _____ escalate potential security events.

  • sometimes
  • always
  • never
  • rarely

Question 21)
What is the correct term for a security event that results in a data breach?

  • Security incident
  • Phishing incident
  • Compromised data
  • Data security event

Question 22)
Which of the following are the best examples of possible consequences of a data breach? Select two answers.

  • Loss of credibility
  • Significant reduction in employee retention
  • Regulatory fines
  • Improved hardware functionality

Question 23)
What term is used to describe individuals of an organization who are interested in protecting sensitive financial data, customers’ usernames and passwords, and third-party vendor security?

  • Data managers
  • Information protection advisors
  • Stakeholders
  • Executive security administrators

Question 24)
Fill in the blank: When a security event results in a data breach, it is categorized as a _____.

  • security event
  • vulnerability
  • threat
  • security incident

Question 25)
Which of the following are examples of private data? Select two answers.

  • Government trade agreements
  • Customer bank account information
  • Employee identification numbers
  • Employee email addresses

Question 26)
Fill in the blank: The decisions a security analyst makes can affect the organization that the analyst works for and other team members across the organization. These decisions also affect ______.

  • the analyst’s chance for a promotion
  • the financial markets
  • competitors in the industry
  • the customers of the organization that hired the analyst

Question 27)
As a security analyst, you are responsible for protecting an organization’s low-level assets and high-importance assets. Which of the following is considered a low-level asset?

  • Company trade secrets
  • Guest Wi-Fi network
  • Customer email addresses
  • Intellectual property

Question 28)
Which of the following assets can be protected by adopting a security mindset? Select three answers.

  • Sensitive customer data
  • Financial information
  • Intellectual property
  • Network equipment

Question 29)
Fill in the blank: _____ must be protected at all times. An organization can lose its credibility with its customers if it is not properly protected.

  • Employee salaries
  • An organization’s social media page
  • Sensitive customer data
  • An organization’s termination policy

Question 30)
Which of the following is an essential way to maintain a security mindset?

  • Evaluate risks
  • Seek engineering mentors
  • Escalate major security issues within one week
  • Work various security jobs with different organizations