All Coursera Quiz Answers

Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 3 Quiz Answers

In this article i am gone to share Coursera Course: Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 3 Quiz Answers with you..

Enroll Link: Put It to Work: Prepare for Cybersecurity Jobs


Also Visit:ย  Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 2 Quiz Answers


 

Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 3 Quiz Answers

Question 1)
What term is used to define an individual or a group that has an interest in the decisions or activities of an organization?

  • Incident response manager
  • Decision-making manager
  • Audit specialist
  • Stakeholder

Question 2)
Which individuals are considered security stakeholders? Select three answers.

  • Operations Managers
  • Chief Information Security Officers (CISOs)
  • Help desk analysts
  • Risk managers

Question 3)
Fill in the blank: Security operations managers are primarily responsible for helping to identify and safeguard an organization from _____.

  • negative social media reviews
  • security threats
  • equipment failures
  • failed tax audits

Question 4)
Fill in the blank: Information that is communicated to ____ is considered sensitive.

  • stakeholders
  • an organizationโ€™s competitors
  • employees regarding social events
  • the general public

Question 5)
You are alerted that a malicious actor has gained unauthorized access to one of your organizationโ€™s manufacturing applications. You need to inform the operations manager as soon as possible. What is the best way to communicate this information?

  • Clearly, concisely, and quickly
  • With a dashboard visualization
  • With a letter to HR
  • With a corporate-wide email

Question 6)
Which of the following is an example of a security event that should be communicated to a stakeholder?

  • A tax audit
  • Incorrect office hours posted on social media
  • The resignation of a human resources employee
  • Malicious code detected in logs

Question 7)
Fill in the blank: Creating ____ communications allows a security stakeholder to view representations of what is being explained using graphs and charts.

  • audio
  • complex
  • visual
  • simple

Question 8)
An analyst finishes an incident review. Next, they want to clearly communicate meaningful data from their findings. What action can they take to share this information?

  • Request that the Chief Technology Officer (CTO) sends a summary email
  • Use visuals to tell a security story
  • Collaborate with the publicity team to develop a communication strategy
  • Ask stakeholders to report their findings

Question 9)
Fill in the blank: In the field of security, ______should always be communicated with care.

  • nonsensitive information
  • publicly available information
  • leave requests
  • sensitive information

Question 10)
What is the best way to follow-up with a stakeholder who has not immediately responded to your email? Select two answers.

  • File a complaint with human resources
  • Report the issue to your supervisor
  • Call them on the phone
  • Send them an instant message

 

Question 11)
Which of the following are stakeholders interested in having knowledge of? Select two answers.

  • Social media reviews for their competitorโ€™s organization
  • The online reviews for their organization
  • The activities of their organization
  • The decisions of their organizationโ€™s leadership

Question 12)
Fill in the blank: The _____ is an example of a security stakeholder who is most interested in protecting the data and assets of an organization.

  • operations manager
  • accounts receivable specialist
  • social media manager
  • in-house graphic designer

Question 13)
A security operations manager often works directly with a security analyst as the first line of defense to protect an organization from what challenges? Select two answers.

  • Risks
  • A lack of an employee consortium
  • Vulnerabilities
  • The use of social media on work devices

Question 14)
Which of the following statements best describes the information that is communicated to stakeholders?

  • It is sensitive.
  • It is proprietary.
  • It is shareable to the entire organization.
  • It is publicly available.

Question 15)
Which of the following guidelines can help security analysts improve stakeholder communications? Select two answers.

  • Avoid unnecessary technical terms
  • Include as many topics as possible
  • Be precise
  • Use technical security terms as much as possible

Question 16)
You have recently been hired as a security analyst for an organization. Youโ€™ve been asked by a security stakeholder to provide information on how often the employees from various departments are clicking on simulated phishing emails. What action can you take to best communicate this information?

  • Send an email that explains the necessary information
  • Use visuals, such as charts and graphs, to tell the security story
  • Ask your supervisor to report your findings because you are new
  • Call the stakeholder and directly update them

Question 17)
Fill in the blank: For security purposes, it is important to communicate sensitive information with _____.

  • care
  • supervision
  • a low level of urgency
  • graphs and charts

Question 18)
Fill in the blank: If a stakeholder fails to respond to an important message you sent them right away, the best approach to reach them is to follow-up with _____.

  • an email to your immediate supervisor
  • an email to the CISO
  • a phone call or an instant message
  • a text message to the stakeholderโ€™s manager

Question 19)
What is a stakeholder?

  • The security professionals who manage the SOC operations for an organization
  • A customer who depends on an organization to protect their sensitive financial and medical data
  • An individual or a group that has an interest in any decision or activity of an organization
  • An individual or a group that manages the public relations crisis for an organization

Question 20)
Fill in the blank: Communications with stakeholders should always be precise, avoid unnecessary technical terms, and _____.

  • include numerous security questions
  • have a clear purpose
  • have various purposes to maximize time
  • tell an elaborate story to ensure your point is made

Question 21)
Fill in the blank: Visual communications to stakeholders can be used to convey key details in the form of ____.

  • graphs and charts
  • logs and alerts
  • text messages and charts
  • text-filled documents and graphs

Question 22)
Why is it important for analysts to use visuals to tell a security story?

  • Visuals can help an analyst prioritize which incidents need to be escalated with more or less urgency.
  • Visuals can help an analyst determine which tool to use to solve a security challenge.
  • Visuals can help an analyst communicate impactful metrics and data.
  • Visuals can help an analyst identify which details are most important for different stakeholders

Question 23)
Stakeholders have many responsibilities, so they might miss an email or fail to respond promptly. If an analyst needs to reach a stakeholder right away, what might be a better option for stakeholder communication?

  • A phone call
  • An email to the CISO
  • A follow-up investigation
  • A follow-up email to the stakeholderโ€™s supervisor

Question 24)
Which security stakeholder helps recognize risks and manage the response to security incidents?

  • Risk manager
  • Operations manager
  • Chief Information Security Officer (CISO)
  • Chief Financial Security Officer (CFO)

Question 25)
Handling the daily maintenance of security operations is the general responsibility for which security stakeholder?

  • Operations manager
  • Entry-level security analyst
  • Chief Information Security Officer (CISO)
  • Chief Financial Security Officer (CFO)

Question 26)
An analyst sends an email to stakeholders about a recent security breach. While writing the email, the analyst is mindful about what they say and which stakeholders they communicate the information to. Why does the analyst take this approach?

  • Information that is communicated to stakeholders is sensitive.
  • Information can be sent to stakeholders instead of managers.
  • Information sent via email can be considered public knowledge.
  • Information about a security breach might improve the companyโ€™s reputation.

Question 27)
Graphs and charts can be used to create which form of stakeholder report?

  • Text messages
  • Phone calls
  • Text-filled documents
  • Visual communications

Question 28)
Fill in the blank: In the field of security, it is important to communicate _____ with care.

  • time off requests
  • nonsensitive information
  • sensitive information
  • publicly available information

Question 29)
Which of the following options is the best way to handle the detection of malicious code in logs?

  • Report the incident directly to the CISO
  • Handle the incident using your Linux knowledge
  • Communicate the incident to a security stakeholder
  • Wait until a more experienced team member notices it

Question 30)
Which potential security challenges should a security analyst communicate to security stakeholders?

  • Lack of employee retention
  • Negative publicity about non-security related issues that has been posted on the internet
  • Malicious code detected in logs
  • Negative social media reviews