All Coursera Quiz Answers

Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 4 Quiz Answers

In this article i am gone to share Coursera Course: Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 4 Quiz Answers with you..

Enroll Link: Put It to Work: Prepare for Cybersecurity Jobs


Also Visit:  Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 3 Quiz Answers


 

Put It to Work: Prepare for Cybersecurity Jobs Weekly challenge 4 Quiz Answers

Question 1)
Fill in the blank: The OWASP is a standard awareness document that lists the top _____most critical security risks to web applications.

  • 50
  • 20
  • 5
  • 10

Question 2)
Which security website covers security news and investigations into cyber attacks?

  • Security Investigation by Krebs
  • Kreb’s Security Perspective
  • Krebs on Security
  • Online CISO

Question 3)
Continuing your security education demonstrates your willingness to remain current on what’s happening in the security industry. Which of the following sites provides news, analysis, and research on various security topics?

  • Krebs Knows Security
  • Cybershield Chronicles
  • Krebs, the Security Research Expert
  • CSO Online

Question 4)
Which security resource provides information on analytics and application security, mobile and cloud security, and the Internet of Things (IoT)?

  • Krebs Knows Security
  • Krebs on Security
  • Dark Reading
  • CSO Online

Question 5)
Which of the following is a great way to connect with other security professionals in the industry?

  • Utilizing your technical security terms as much as possible
  • Staying away from social media
  • Finding them on social media
  • Asking friends and family members who are not in the security industry

Question 6)
Which of the following is a good way to use social media to connect with security professionals? Select two answers.

  • Respond to messages of people on social media that you’re unfamiliar with, as long as their profile says they’re in the security industry
  • Send messages to a security supervisor until they agree to be your mentor
  • Follow leaders in the security industry on social media
  • Read and comment on social media posts of leaders in the security industry

Question 7)
Fill in the blank: _____ for the name of the CISO of an organization is a good first step to finding a CISO to follow on social media.

  • Asking friends or family members
  • Conducting an internet search
  • Asking social media friends
  • Checking an organization’s blog

Question 8)
What is a good way to find other security analysts in the industry to follow on social media?

  • Search for cybersecurity analysts on LinkedIn®
  • Put out a social media post that asks all security analysts to follow you
  • Search for security engineers on LinkedIn®
  • Cold call various security teams until someone agrees to connect with you on social media

Question 9)
What is a great way to connect with security professionals or find mentors in the security industry without using social media?

  • Do an internet search for entry-level security analysts in your area
  • Join different security associations
  • Search for CISOs on LinkedIn®
  • Attend a social media training seminar

Question 10)
Fill in the blank: When determining a security association to join, it’s important to _____.

  • select one that aligns with your professional goals
  • ask the CISO of the most recent organization you applied to for suggestions
  • select one that is geared towards advanced security professionals
  • join one that is closest to where you live, so you’re able to attend in person

 

Question 11)
Fill in the blank: The _____ is a standard awareness document that lists the top 10 most critical security risks to web applications.

  • Programming for Security Protection
  • OWASP
  • Red Teaming Blog
  • Wall Street Journal

Question 12)
Fill in the blank: ____ is a security website that covers security news and investigations into cyber attacks.

  • Krebs on Security
  • Security from Kreb’s Point of View
  • Security Investigation by Krebs
  • The Washington Post Security Guide

Question 13)
Fill in the blank: _____ is an online security resource that provides information on analytics and application security, mobile and cloud security, and the Internet of Things (IoT).

  • Krebs on Security
  • Krebs Knows Security
  • Dark Reading
  • CSO Online

Question 14)
You’ve recently completed the Google Cybersecurity Certificate and decide it’s time to connect with other security professionals. Which of the following is a great way to connect with security professionals?

  • Searching for them on social media
  • Staying away from social media
  • Calling different organizations and asking to speak with their security teams
  • Asking friends and family members who are not in the security industry to connect you with people they know

Question 15)
You’ve recently completed the Google Cybersecurity Certificate and decide it’s time to connect with other security professionals. Which of the following is a great way to connect with security professionals on social media? Select two answers.

  • Follow leaders in the security industry
  • Read and comment on the social media posts of leaders in the security industry
  • Respond to messages of people on social media that you’re unfamiliar with, as long as their profile says they’re in the security industry
  • Send messages to a security supervisor until they agree to be your mentor

Question 16)
Fill in the blank: A great way to find other security analysts to connect with on LinkedIn® is to set your filter to locate _____ that focus on security-related topics that interest you.

  • events
  • human resources professionals
  • products
  • courses

Question 17)
What is the best search term to use to find a security organization to join?

  • “Top CISOs in my area”
  • “Cybersecurity industry associations”
  • “Incident response teams”
  • “Industry associations”

Question 18)
You are being interviewed for a cybersecurity analyst role with a mid-level organization. During the interview, the hiring manager asks you what resources you believe are most valuable for staying up-to-date on the most critical security risks to web applications. Which of the following resources would you suggest?

  • CSO Online
  • Risk Management for Security Geeks
  • OWASP
  • Krebs Explains Security

Question 19)
Fill in the blank: _____ provides news, analysis, and research on various security and risk management topics.

  • Risk Management for Security Geeks
  • Krebs Explains Security
  • Who Knows Security?
  • CSO Online

Question 20)
Which of the following is a good first step to finding a CISO to follow on social media?

  • Ask friends in the e-commerce industry about which CISOs to follow
  • Conduct an internet search for the name of the CISO of an organization
  • Conduct a background check on CISOs in your area
  • Send multiple messages to a company on their social media page and ask how to contact their CISO directly

Question 21)
On social networks like LinkedIn®, you can find security professionals by searching for “cybersecurity analysts” or a similar search term. After this search, what is the best way to filter through those search results?

  • Filter for people who talk about # (hashtag) social media
  • Filter for people who talk about # (hashtag) product engineering
  • Filter for people who talk about # (hashtag) Python
  • Filter for people who talk about # (hashtag) cybersecurity

Question 22)
Fill in the blank: _____ is a great way to connect with security professionals without using social media.

  • Joining different security associations
  • Cold calling security teams from different companies
  • Contacting a CISO directly via email
  • Doing an internet search for entry-level security analysts in your area

Question 23)
Fill in the blank: Although many security websites and blogs provide different relevant security tips, _____ specifically provides information on analytics and application security, mobile and cloud security, and the Internet of Things (IoT).

  • CSO Online
  • Dark Reading
  • Krebs on Security
  • Kreb’s Cloud Security Blog

Question 24)
Fill in the blank: The first step to finding a CISO to follow on social media is to conduct a(n) _____ for the name of the CISO of an organization.

  • internet search
  • background check
  • cross-reference check
  • external security audit

Question 25)
Fill in the blank: Selecting a security association that _____ will help ensure you find the one that best fits your needs.

  • has excellent online reviews
  • aligns with your professional goals
  • is dedicated to senior-level analysts
  • is within a five-mile radius of your home

Question 26)
Which site do many CISOs in the security industry review for security tips and ideas?

  • CSO Online
  • CSO Tips for Beginners
  • The Security CISO Online
  • The CSO Security Expert Digest

Question 27)
Fill in the blank: _____ is a great way to connect to other security professionals in the industry.

  • Knocking door-to-door
  • Networking on social media
  • Asking friends and family members who are not in the security industry for introductions
  • Staying away from social media

Question 28)
Fill in the blank: _____ is a great way to connect with security professionals on social media.

  • Reading CISO posts on social media
  • Responding to unfamiliar messages
  • Attempting to hack a security team member and resolving that hack in a timely fashion
  • Reading and commenting on the social media posts of leaders in the security industry

Question 29)
Fill in the blank: For individuals who are not active on social media, _____ is another great way to connect with security professionals.

  • joining exclusive CFO seminars
  • taking a social media training course
  • taking a class on how to foster a collaborative team environment
  • joining different security associations

Question 30)
Which well-known security website was created by former Washington Post reporter, Brian Krebs?

  • Krebs on Security
  • Brian Knows Security
  • Security from Kreb’s Point of View
  • The Washington Post Security Guide