All Coursera Quiz Answers

Test your knowledge: To escalate or not to escalate Quiz Answer

In this article i am gone to share Coursera Course: Put It to Work: Prepare for Cybersecurity Jobs Week 2 Practice Quiz | Test your knowledge: To escalate or not to escalate Quiz Answer with you..


Also visit:  Test your knowledge: Your impact on data protection Quiz Answer


 

Test your knowledge: To escalate or not to escalate Quiz Answer

Question 1)
Fill in the blank: A malware infection is an incident type that occurs when _____.

  • a website experiences high traffic volumes
  • an employee of an organization violates the organization’s acceptable use policies
  • malicious software designed to disrupt a system infiltrates an organization’s computers or network
  • a computer’s speed and performance improves

Question 2)
Fill in the blank: Improper usage is an incident type that occurs when _____.

  • an employee that runs an organization’s public relations posts incorrect data on the company’s social media page
  • malicious software designed to disrupt a system infiltrates an organization’s computers or network.
  • an individual gains digital or physical access to a system or application without permission
  • an employee of an organization violates the organization’s acceptable use policies

Question 3)
When should you escalate improper usage to a supervisor?

  • Improper usage incidents should always be escalated out of caution.
  • Improper usage incidents should be escalated if there is a high level of improper usage.
  • Improper usage does not need to be escalated because these are in-house scenarios that can be handled without reporting them to the security team.
  • Improper usage attempts that affect high-priority assets should be escalated; other improper usage instances are not as important.

Question 4)
Fill in the blank: Unauthorized access is an incident type that occurs when _____.

  • an employee of an organization violates the organization’s acceptable use policies
  • malicious software designed to disrupt a system infiltrates an organization’s computers or network
  • an individual gains digital or physical access to a system, data, or an application without permission
  • an authorized employee sends a job description to a friend before the job description has been released to the public