All Coursera Quiz Answers

Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 4 Quiz Answers

In this article i am gone to share Coursera Course: Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 4 Quiz Answers with you..

Enroll Link: Put It to Work: Prepare for Cybersecurity Jobs


Also Visit:ย  Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 3 Quiz Answers


 

Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 4 Quiz Answers

Question 1)
Fill in the blank: The OWASP is a standard awareness document that lists the top _____most critical security risks to web applications.

  • 50
  • 20
  • 5
  • 10

Question 2)
Which security website covers security news and investigations into cyber attacks?

  • Security Investigation by Krebs
  • Krebโ€™s Security Perspective
  • Krebs on Security
  • Online CISO

Question 3)
Continuing your security education demonstrates your willingness to remain current on whatโ€™s happening in the security industry. Which of the following sites provides news, analysis, and research on various security topics?

  • Krebs Knows Security
  • Cybershield Chronicles
  • Krebs, the Security Research Expert
  • CSO Online

Question 4)
Which security resource provides information on analytics and application security, mobile and cloud security, and the Internet of Things (IoT)?

  • Krebs Knows Security
  • Krebs on Security
  • Dark Reading
  • CSO Online

Question 5)
Which of the following is a great way to connect with other security professionals in the industry?

  • Utilizing your technical security terms as much as possible
  • Staying away from social media
  • Finding them on social media
  • Asking friends and family members who are not in the security industry

Question 6)
Which of the following is a good way to use social media to connect with security professionals? Select two answers.

  • Respond to messages of people on social media that youโ€™re unfamiliar with, as long as their profile says theyโ€™re in the security industry
  • Send messages to a security supervisor until they agree to be your mentor
  • Follow leaders in the security industry on social media
  • Read and comment on social media posts of leaders in the security industry

Question 7)
Fill in the blank: _____ for the name of the CISO of an organization is a good first step to finding a CISO to follow on social media.

  • Asking friends or family members
  • Conducting an internet search
  • Asking social media friends
  • Checking an organization’s blog

Question 8)
What is a good way to find other security analysts in the industry to follow on social media?

  • Search for cybersecurity analysts on LinkedInยฎ
  • Put out a social media post that asks all security analysts to follow you
  • Search for security engineers on LinkedInยฎ
  • Cold call various security teams until someone agrees to connect with you on social media

Question 9)
What is a great way to connect with security professionals or find mentors in the security industry without using social media?

  • Do an internet search for entry-level security analysts in your area
  • Join different security associations
  • Search for CISOs on LinkedInยฎ
  • Attend a social media training seminar

Question 10)
Fill in the blank: When determining a security association to join, it’s important to _____.

  • select one that aligns with your professional goals
  • ask the CISO of the most recent organization you applied to for suggestions
  • select one that is geared towards advanced security professionals
  • join one that is closest to where you live, so youโ€™re able to attend in person

 

Question 11)
Fill in the blank: The _____ is a standard awareness document that lists the top 10 most critical security risks to web applications.

  • Programming for Security Protection
  • OWASP
  • Red Teaming Blog
  • Wall Street Journal

Question 12)
Fill in the blank: ____ is a security website that covers security news and investigations into cyber attacks.

  • Krebs on Security
  • Security from Krebโ€™s Point of View
  • Security Investigation by Krebs
  • The Washington Post Security Guide

Question 13)
Fill in the blank: _____ is an online security resource that provides information on analytics and application security, mobile and cloud security, and the Internet of Things (IoT).

  • Krebs on Security
  • Krebs Knows Security
  • Dark Reading
  • CSO Online

Question 14)
Youโ€™ve recently completed the Google Cybersecurity Certificate and decide itโ€™s time to connect with other security professionals. Which of the following is a great way to connect with security professionals?

  • Searching for them on social media
  • Staying away from social media
  • Calling different organizations and asking to speak with their security teams
  • Asking friends and family members who are not in the security industry to connect you with people they know

Question 15)
Youโ€™ve recently completed the Google Cybersecurity Certificate and decide itโ€™s time to connect with other security professionals. Which of the following is a great way to connect with security professionals on social media? Select two answers.

  • Follow leaders in the security industry
  • Read and comment on the social media posts of leaders in the security industry
  • Respond to messages of people on social media that youโ€™re unfamiliar with, as long as their profile says they’re in the security industry
  • Send messages to a security supervisor until they agree to be your mentor

Question 16)
Fill in the blank: A great way to find other security analysts to connect with on LinkedInยฎ is to set your filter to locate _____ that focus on security-related topics that interest you.

  • events
  • human resources professionals
  • products
  • courses

Question 17)
What is the best search term to use to find a security organization to join?

  • โ€œTop CISOs in my areaโ€
  • โ€œCybersecurity industry associationsโ€
  • โ€œIncident response teamsโ€
  • โ€œIndustry associationsโ€

Question 18)
You are being interviewed for a cybersecurity analyst role with a mid-level organization. During the interview, the hiring manager asks you what resources you believe are most valuable for staying up-to-date on the most critical security risks to web applications. Which of the following resources would you suggest?

  • CSO Online
  • Risk Management for Security Geeks
  • OWASP
  • Krebs Explains Security

Question 19)
Fill in the blank: _____ provides news, analysis, and research on various security and risk management topics.

  • Risk Management for Security Geeks
  • Krebs Explains Security
  • Who Knows Security?
  • CSO Online

Question 20)
Which of the following is a good first step to finding a CISO to follow on social media?

  • Ask friends in the e-commerce industry about which CISOs to follow
  • Conduct an internet search for the name of the CISO of an organization
  • Conduct a background check on CISOs in your area
  • Send multiple messages to a company on their social media page and ask how to contact their CISO directly

Question 21)
On social networks like LinkedInยฎ, you can find security professionals by searching for โ€œcybersecurity analystsโ€ or a similar search term. After this search, what is the best way to filter through those search results?

  • Filter for people who talk about # (hashtag) social media
  • Filter for people who talk about # (hashtag) product engineering
  • Filter for people who talk about # (hashtag) Python
  • Filter for people who talk about # (hashtag) cybersecurity

Question 22)
Fill in the blank: _____ is a great way to connect with security professionals without using social media.

  • Joining different security associations
  • Cold calling security teams from different companies
  • Contacting a CISO directly via email
  • Doing an internet search for entry-level security analysts in your area

Question 23)
Fill in the blank: Although many security websites and blogs provide different relevant security tips, _____ specifically provides information on analytics and application security, mobile and cloud security, and the Internet of Things (IoT).

  • CSO Online
  • Dark Reading
  • Krebs on Security
  • Krebโ€™s Cloud Security Blog

Question 24)
Fill in the blank: The first step to finding a CISO to follow on social media is to conduct a(n) _____ for the name of the CISO of an organization.

  • internet search
  • background check
  • cross-reference check
  • external security audit

Question 25)
Fill in the blank: Selecting a security association that _____ will help ensure you find the one that best fits your needs.

  • has excellent online reviews
  • aligns with your professional goals
  • is dedicated to senior-level analysts
  • is within a five-mile radius of your home

Question 26)
Which site do many CISOs in the security industry review for security tips and ideas?

  • CSO Online
  • CSO Tips for Beginners
  • The Security CISO Online
  • The CSO Security Expert Digest

Question 27)
Fill in the blank: _____ is a great way to connect to other security professionals in the industry.

  • Knocking door-to-door
  • Networking on social media
  • Asking friends and family members who are not in the security industry for introductions
  • Staying away from social media

Question 28)
Fill in the blank: _____ is a great way to connect with security professionals on social media.

  • Reading CISO posts on social media
  • Responding to unfamiliar messages
  • Attempting to hack a security team member and resolving that hack in a timely fashion
  • Reading and commenting on the social media posts of leaders in the security industry

Question 29)
Fill in the blank: For individuals who are not active on social media, _____ is another great way to connect with security professionals.

  • joining exclusive CFO seminars
  • taking a social media training course
  • taking a class on how to foster a collaborative team environment
  • joining different security associations

Question 30)
Which well-known security website was created by former Washington Post reporter, Brian Krebs?

  • Krebs on Security
  • Brian Knows Security
  • Security from Krebโ€™s Point of View
  • The Washington Post Security Guide