All Coursera Quiz Answers

Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 2 Quiz Answers

In this article i am gone to share Coursera Course: Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 2 Quiz Answers with you..

Enroll Link: Put It to Work: Prepare for Cybersecurity Jobs


Also Visit: Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 1 Quiz Answers


 

Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 2 Quiz Answers

Question 1)
Fill in the blank: Incident escalation is the process of _____.

  • reporting a security incident to a human resource department for compliance purposes
  • identifying a potential security incident , triaging it, and handing it off to a more experienced team member
  • properly assessing security events
  • creating a visual dashboard that shows security stakeholders the amount of security incidents taking place

Question 2)
Fill in the blank: _____ is a skill that will help you identify security incidents that need to be escalated.

  • Graphics design
  • Leadership
  • Attention to detail
  • Linux operations

Question 3)
As a security analyst, you might be asked to escalate various incidents. Which of the following are common incident classification types? Select two answers.

  • Gift card scam
  • Malware infection
  • Unauthorized access
  • SPAM

Question 4)
An employee attempting to access software on their work device for personal use can be an example of what security incident type?

  • Improper usage
  • Unauthorized access
  • Malware infection
  • Social engineering

Question 5)
Which of the following security incidents can have the most damaging impact to an organization?

  • An employee forgets their password and logs too many failed login attempts
  • The guest Wi-Fi network for a company is hacked
  • A companyโ€™s social media account is compromised
  • A system containing customer PII is compromised

Question 6)
What is a potential negative consequence of not properly escalating a small security incident? Select two answers.

  • The company can suffer a financial loss.
  • The companyโ€™s employee retention percentage can decrease drastically.
  • The company can suffer a loss in reputation.
  • The company’s antivirus software can be uninstalled.

Question 7)
Fill in the blank: An escalation policy is a set of actions that outlines _____.

  • how to defend an organizationโ€™s data and assets
  • how to manage the security stakeholders of an organization
  • how to escalate customer service complaints
  • how to handle a security incident alert

Question 8)
You have recently been hired as a security analyst for an organization. You previously worked at another company doing security, and you were very familiar with their escalation policy. Why would it be important for you to learn your new companyโ€™s escalation policy?

  • The policy will advise you on who to report to each day.
  • Every company has a different escalation policy, and it is an analyst’s job to ensure incidents are handled correctly.
  • The escalation policy will help you with vulnerability scanning.
  • The policy will help you analyze data logs.

Question 9)
A new security analyst has just been hired to an organization and is advised to read through the companyโ€™s escalation policy. What kind of information will the analyst be educated on when reading through this policy?

  • They will learn how to use the Linux operating system.
  • They will learn the best way to create visual dashboards to communicate with executives.
  • They will learn when and how to escalate security incidents.
  • They will learn the best way to communicate with stakeholders.

Question 10)
Which of the following security incidents is likely to have the most negative impact on an organization?

  • An employee sends an email to the wrong colleague
  • Unauthorized access to a manufacturing application
  • An employee having a phone conversation about a work project in the breakroom
  • An employeeโ€™s account flagged for multiple login attempts

 

Question 11)
What security term describes the identification of a potential security event, triaging it, and handing it off to a more experienced team member?

  • Data security protection
  • SOC operations
  • Social engineering
  • Incident escalation

Question 12)
What elements of security do terms like unauthorized access, malware infections, and improper usage describe?

  • Phishing attempts
  • Company job descriptions
  • Incident classification types
  • Public press releases

Question 13)
Which incident type involves an employee violating an organizationโ€™s acceptable use policy?

  • Phishing
  • Malware infection
  • Improper usage
  • Unauthorized access

Question 14)
Fill in the blank: Security incidents involving the PII of customers should be escalated with a ____ level of urgency compared to incidents that do not involve customer PII.

  • minimal
  • higher
  • moderate
  • lower

Question 15)
A security analyst for an organization notices unusual log activity in an app that was recently banned from the organization. However, the analyst forgets to escalate this activity to the proper personnel. What potential impact can this small incident have on the organization?

  • Small incidents rarely have any impact on an organization.
  • The organization might need to delete its social media profile.
  • The third-party assessment team might be removed by the organization.
  • It can become a bigger threat.

Question 16)
How can an escalation policy help security analysts do their jobs?

  • An escalation policy educates analysts on how to be aware of phishing attempts.
  • An escalation policy instructs the analysts on how to scan for vulnerabilities.
  • An escalation policy outlines when to alert the public of a data breach.
  • An escalation policy outlines who should be notified when an incident occurs.

Question 17)
Fill in the blank: A/An _____ will help an entry-level analyst to know when and how to escalate a security incident.

  • blue team CIRT guideline
  • employee security handbook
  • escalation policy
  • executive security dashboard

Question 18)
Unauthorized access to a system with PII is _____ critical than an employeeโ€™s account being flagged for multiple failed login attempts.

  • marginally
  • more
  • equally
  • less

Question 19)
What does attention to detail and following an organizationโ€™s security event notification process help you with?

  • Log monitoring
  • Security data forensics
  • Incident escalation
  • Vulnerability scanning

Question 20)
Why is it important for analysts to follow a companyโ€™s escalation policy? Select two answers.

  • An escalation policy can help analysts determine which tools to use to solve an issue.
  • An escalation policy can help analysts determine the best way to cross-collaborate with other members of their organization.
  • An escalation policy instructs analysts on the right person to contact during an incident.
  • An escalation policy can help analysts prioritize which security events need to be escalated with more or less urgency.

Question 21)
Which skills will help you identify security incidents that need to be escalated? Select two answers.

  • Attention to detail
  • Excellent communication skills
  • Ability to collaborate well with others
  • Ability to follow an organizationโ€™s escalation guidelines or processes

Question 22)
Fill in the blank: Entry-level analysts might need to escalate various incident types, including _____.

  • improper usage
  • missing software
  • noncompliance of tax laws
  • mismanagement of funds

Question 23)
Improper usage can be intentional; other times it can be accidental. How should you decide which acts of improper usage should be escalated to a supervisor?

  • Improper usage should never be escalated to a supervisor.
  • Only intentional acts of improper usage should be escalated.
  • Improper usage incidents should always be escalated as a precaution.
  • Improper usage attempts that affect high-priority assets should be escalated; other improper usage instances are not as important.

Question 24)
You are alerted that a hacker has gained unauthorized access to one of your organizationโ€™s manufacturing applications. At the same time, an employeeโ€™s account has been flagged for multiple failed login attempts. Which incident should be escalated first?

  • Both security incidents should be escalated at the same time.
  • The best thing to do is escalate the incident that your supervisor advised you to escalate first.
  • The incident involving the employee who is unable to log in to their account should be escalated first.
  • The incident involving the malicious actor who has gained unauthorized access to the manufacturing application should be escalated first.

Question 25)
What is the best way to determine the urgency of a security incident?

  • Contact the risk assessment team to determine urgency.
  • Identify the importance of the assets affected by the security incident.
  • Reach out to the organizationโ€™s Red Team supervisor to determine urgency.
  • Email the Chief Information Security Officer (CISO) of the company for clarification.

Question 26)
Fill in the blank: _____ is important when following a companyโ€™s escalation policy to ensure you follow the policy correctly.

  • Reading quickly
  • Working remotely
  • Attention to detail
  • Delegating tasks

Question 27)
Fill in the blank: An entry-level analyst helps the security team make sure the _____ person on the team is alerted when incidents occur.

  • correct
  • technical
  • available
  • most senior-level

Question 28)
Fill in the blank: An _____ will help an entry-level analyst to know when and how to escalate a security incident.

  • escalation policy
  • employee security handbook
  • executive security dashboard
  • blue team CIRT guideline

Question 29)
What security term is defined as a set of actions that outlines who should be notified when an incident alert occurs?

  • An escalation policy
  • A security risk assessor
  • A network architecture alert
  • A vulnerability scan system