put it to work prepare for cyber security jobs coursera weekly challenge 2 answers
Test your knowledge: To escalate or not to escalate
1. Fill in the blank: A malware infection is an incident type that occurs when _____.
- a website experiences high traffic volumes
- malicious software designed to disrupt a system infiltrates an organization’s computers or network
- a computer’s speed and performance improves
- an employee of an organization violates the organization’s acceptable use policies
2. Fill in the blank: Improper usage is an incident type that occurs when _____.
- an individual gains digital or physical access to a system or application without permission
- malicious software designed to disrupt a system infiltrates an organization’s computers or network.
- an employee of an organization violates the organization’s acceptable use policies
- an employee that runs an organization’s public relations posts incorrect data on the company’s social media page
3. When should you escalate improper usage to a supervisor?
- Improper usage incidents should always be escalated out of caution.
- Improper usage incidents should be escalated if there is a high level of improper usage.
- Improper usage attempts that affect high-priority assets should be escalated; other improper usage instances are not as important.
- Improper usage does not need to be escalated because these are in-house scenarios that can be handled without reporting them to the security team.
4. Fill in the blank: Unauthorized access is an incident type that occurs when _____.
- an individual gains digital or physical access to a system, data, or an application without permission
- an individual gains digital or physical access to a system, data, or an application without permission
- malicious software designed to disrupt a system infiltrates an organization’s computers or network
- an employee of an organization violates the organization’s acceptable use policies
Test your knowledge: Timing is everything
6. Which incident can have the most impact on an organization?
- An employee forgets their login credentials
- A user’s social media password is leaked
- A manufacturing plant’s network is compromised
- An organization’s guest Wi-Fi network is down
7. Fill in the blank: A(n) _____ is a set of actions that outlines who should be notified when an incident alert occurs and how that incident should be handled.
- playbook
- event
- security incident
- escalation policy
8. Which incident classification type occurs when an employee violates an organization’s acceptable use policy?
- Improper usage
- Malware infection
- Unauthorized access
- Containment
Shuffle Q/A 1
Weekly challenge 2
9. What security term describes the identification of a potential security event, triaging it, and handing it off to a more experienced team member?
- Incident escalation
- SOC operations
- Social engineering
- Data security protection
10. Which skills will help you identify security incidents that need to be escalated? Select two answers.
- Excellent communication skills
- Ability to collaborate well with others
- Attention to detail
- Ability to follow an organization’s escalation guidelines or processes