foundations of cybersecurity coursera weekly challenge 4 answers
Test your knowledge: Important cybersecurity tools
1. What tool is designed to capture and analyze data traffic within a network?
- network protocol analyzer (packet sniffer)
- Structured Query Language (SQL)
- Google Chronicle
- Splunk Enterprise
2. Which of the following are examples of SIEM tools? Select two answers.
- Python
- Google Chronicle
- Linux
- Splunk Enterprise
3. How are logs primarily used by security professionals?
- Identify vulnerabilities and potential security breaches
- Collect and analyze data to monitor critical activities in an organization
- Select which security team members will respond to an incident
- Research and optimize processing capabilities within a network
4. Fill in the blank: A _____ is a manual that provides details about operational actions.
- case history
- directory
- playbook
- checklist
Test your knowledge: Core cybersecurity knowledge and skills
5. What do security professionals use to interact with and request information from a database?
- Confidentiality, integrity, availability (CIA) triad
- Structured Query Language (SQL)
- Linux
- Python
6. What is programming typically used for? Select two answers.
- Enable open-source operations
- Create a specific set of instructions for a computer to execute tasks
- Complete repetitive tasks and processes
- Record events that occur within an organization’s systems
7. Fill in the blank: Linux is an open-source _____ that can be used to examine logs.
- operating system
- database
- algorithm
- programming language
8. A playbook is a manual that provides details about how to respond to an incident only after it has occurred.
- True
- False
Weekly challenge 4
9. Which of the following statements correctly describe logs? Select two answers.
- A business might log each time an employee signs into their computer.
- A log is used as a formal guide to incident response.
- Security professionals use logs to visualize data.
- A log is a record of events that occur within an organization’s systems.
10. Which of the following tasks can be performed using SIEM tools? Select three answers.
- Providing alerts for specific types of risks
- Performing incident analysis
- Proactively searching for threats
- Notifying authorities of illegal activity
11. What is a benefit of a tool, such as Google’s Chronicle, being cloud-native?
- It requires hardware to deploy.
- It is a static resource.
- It allows for fast delivery of new features.
- It performs best when downloaded to a network.
12. Fill in the blank: A security professional uses a _____ as a manual to guide operational activities.
- spreadsheet
- toolkit
- review
- playbook
13. As a security analyst, you are monitoring network traffic to ensure that SPII data is not being accessed by unauthorized users. What does this scenario describe?
- Using a network protocol analyzer (packet sniffer)
- Programming with code
- Calculating with formulas
- Gathering data in a spreadsheet
14. What are some key benefits of programming languages? Select all that apply.
- They install security hardware.
- They create a specific set of instructions for a computer to execute tasks.
- They execute repetitive processes accurately.
- They filter through data points faster than humans can working manually.
15. How is an open-source operating system, such as Linux, different from other operating systems?
- It relies on a command line.
- It is only a desktop tool.
- It is proprietary.
- It must be downloaded from the cloud.
16. Fill in the blank: A database is a _____ of organized data stored in a computer system.
- visualization
- collection
- model
- frame
17. What are some key benefits of using Python to perform security tasks? Select all that apply.
- It is designed for high levels of accuracy.
- It makes static data more dynamic.
- It simplifies repetitive tasks.
- It helps security professionals be more accurate.
18. Which of the following tasks can be performed using SIEM tools? Select three answers.
- Helping security analysts identify potential breaches
- Collecting and analyzing data
- Providing alerts for specific types of risks and threats
- Requesting security data from government agencies
19. Why might a security professional choose Google Chronicle to store security data for later analysis?
- It is cloud-native, which means it delivers new features quickly.
- It requires hardware to deploy, so it is more secure.
- It is a static resource, so the user interface never changes.
- It performs best when downloaded to a network, which enables efficient processing.
20. A security team wants to examine logs to understand what is occurring within their systems. Why might they choose Linux to perform this task? Select two answers.
- It allows for text-based commands by users.
- It is an efficient programming language.
- It is proprietary.
- It is open source.
21. Fill in the blank: Security professionals can use _____ to interact with and request information from a database.
- Chronicle
- network protocol analyzers (packet sniffers)
- Splunk Enterprise
- SQL
22. What are some key benefits of using Python to perform security tasks? Select all that apply.
- It saves time.
- It clearly maps data.
- It helps ensure accuracy.
- It uses a command-line interface.
23. As a security analyst, you are monitoring network traffic and detect a large number of failed login attempts. Which of the following tools would help you investigate this incident? Select two answers.
- An intrusion detection system (IDS)
- A network protocol analyzer (packet sniffer)
- A cryptographic encoder
- A command-line interface
24. What are some key benefits of programming languages? Select all that apply.
- They create a specific set of instructions for a computer to execute tasks.
- They reduce the risk of human error.
- They describe how data is organized.
- They complete tasks faster than if working manually.
25. Fill in the blank: To request information from a _____, security professionals can use SQL.
- spreadsheet
- database
- network
- dashboard
26. Which of the following tasks can be performed using SIEM tools? Select three answers.
- Implementing security software programs
- Saving time by reducing the amount of data to be reviewed
- Analyzing filtered events and patterns
- Monitoring critical activities
27. What term is used to describe publicly available systems, such as Linux?
- Open-source
- Unregulated
- Restricted
- Free-for-all