foundations of cybersecurity coursera weekly challenge 4 answers

Test your knowledge: Important cybersecurity tools

1. What tool is designed to capture and analyze data traffic within a network?

  • network protocol analyzer (packet sniffer)
  • Structured Query Language (SQL)
  • Google Chronicle
  • Splunk Enterprise

2. Which of the following are examples of SIEM tools? Select two answers.

  • Python
  • Google Chronicle
  • Linux
  • Splunk Enterprise

3. How are logs primarily used by security professionals?

  • Identify vulnerabilities and potential security breaches
  • Collect and analyze data to monitor critical activities in an organization
  • Select which security team members will respond to an incident
  • Research and optimize processing capabilities within a network

4. Fill in the blank: A _____ is a manual that provides details about operational actions.

  • case history
  • directory
  • playbook
  • checklist

Test your knowledge: Core cybersecurity knowledge and skills

5. What do security professionals use to interact with and request information from a database?

  • Confidentiality, integrity, availability (CIA) triad
  • Structured Query Language (SQL)
  • Linux
  • Python

6. What is programming typically used for? Select two answers.

  • Enable open-source operations
  • Create a specific set of instructions for a computer to execute tasks
  • Complete repetitive tasks and processes
  • Record events that occur within an organization’s systems

7. Fill in the blank: Linux is an open-source _____ that can be used to examine logs.

  • operating system
  • database
  • algorithm
  • programming language

8. A playbook is a manual that provides details about how to respond to an incident only after it has occurred.

  • True
  • False

Weekly challenge 4

9. Which of the following statements correctly describe logs? Select two answers.

  • A business might log each time an employee signs into their computer.
  • A log is used as a formal guide to incident response.
  • Security professionals use logs to visualize data.
  • A log is a record of events that occur within an organization’s systems. 

10. Which of the following tasks can be performed using SIEM tools? Select three answers.

  • Providing alerts for specific types of risks
  • Performing incident analysis
  • Proactively searching for threats
  • Notifying authorities of illegal activity

11. What is a benefit of a tool, such as Google’s Chronicle, being cloud-native?

  • It requires hardware to deploy.
  • It is a static resource.
  • It allows for fast delivery of new features.
  • It performs best when downloaded to a network.

12. Fill in the blank: A security professional uses a _____ as a manual to guide operational activities.

  • spreadsheet
  • toolkit
  • review
  • playbook

13. As a security analyst, you are monitoring network traffic to ensure that SPII data is not being accessed by unauthorized users. What does this scenario describe?

  • Using a network protocol analyzer (packet sniffer)
  • Programming with code
  • Calculating with formulas
  • Gathering data in a spreadsheet

14. What are some key benefits of programming languages? Select all that apply.

  • They install security hardware.
  • They create a specific set of instructions for a computer to execute tasks.
  • They execute repetitive processes accurately.
  • They filter through data points faster than humans can working manually.

15. How is an open-source operating system, such as Linux, different from other operating systems?

  • It relies on a command line.
  • It is only a desktop tool.
  • It is proprietary.
  • It must be downloaded from the cloud.

16. Fill in the blank: A database is a _____ of organized data stored in a computer system.

  • visualization
  • collection
  • model
  • frame

17. What are some key benefits of using Python to perform security tasks? Select all that apply.

  • It is designed for high levels of accuracy.
  • It makes static data more dynamic.
  • It simplifies repetitive tasks.
  • It helps security professionals be more accurate.

18. Which of the following tasks can be performed using SIEM tools? Select three answers.

  • Helping security analysts identify potential breaches
  • Collecting and analyzing data
  • Providing alerts for specific types of risks and threats
  • Requesting security data from government agencies

19. Why might a security professional choose Google Chronicle to store security data for later analysis?

  • It is cloud-native, which means it delivers new features quickly.
  • It requires hardware to deploy, so it is more secure.
  • It is a static resource, so the user interface never changes.
  • It performs best when downloaded to a network, which enables efficient processing.

20. A security team wants to examine logs to understand what is occurring within their systems. Why might they choose Linux to perform this task? Select two answers.

  • It allows for text-based commands by users.
  • It is an efficient programming language.
  • It is proprietary.
  • It is open source.

21. Fill in the blank: Security professionals can use _____ to interact with and request information from a database.

  • Chronicle
  • network protocol analyzers (packet sniffers)
  • Splunk Enterprise
  • SQL

22. What are some key benefits of using Python to perform security tasks? Select all that apply.

  • It saves time.
  • It clearly maps data.
  • It helps ensure accuracy.
  • It uses a command-line interface.

23. As a security analyst, you are monitoring network traffic and detect a large number of failed login attempts. Which of the following tools would help you investigate this incident? Select two answers.

  • An intrusion detection system (IDS)
  • A network protocol analyzer (packet sniffer)
  • A cryptographic encoder
  • A command-line interface

24. What are some key benefits of programming languages? Select all that apply.

  • They create a specific set of instructions for a computer to execute tasks.
  • They reduce the risk of human error.
  • They describe how data is organized.
  • They complete tasks faster than if working manually.

25. Fill in the blank: To request information from a _____, security professionals can use SQL.

  • spreadsheet
  • database
  • network
  • dashboard

26. Which of the following tasks can be performed using SIEM tools? Select three answers.

  • Implementing security software programs
  • Saving time by reducing the amount of data to be reviewed
  • Analyzing filtered events and patterns
  • Monitoring critical activities

27. What term is used to describe publicly available systems, such as Linux?

  • Open-source
  • Unregulated
  • Restricted
  • Free-for-all

Leave a Reply