put it to work prepare for cyber security jobs coursera weekly challenge 1 answers
Test your knowledge: Event and incident detection
1. What does a security mindset enable a security analyst to do when protecting their organization? Select two answers.
- Evaluate risks and identify potential system breaches
- Approve social media connections from security professionals
- Recognize what they are defending
- Evaluate employee retention
2. Which type of asset would have the least impact on an organization if it were compromised?
- Trade secrets
- Intellectual property
- Financial information
- Guest Wi-Fi network
3. How can security analysts cultivate a security mindset?
- By researching the latest security vulnerabilities
- By signing non-disclosure agreements (NDAs)
- By protecting public data from being accessed and shared
- By sharing sensitive information with those who request it
4. Which of the following examples describes the use of a security mindset? Select two answers.
- Exercising suspicion before opening email attachments
- Reusing passwords for multiple accounts
- Downloading email attachments from unknown senders
- Reporting suspicious emails
Test your knowledge: Your impact on data protection
5. A security analyst notices that an employee has installed an app on their work device without getting permission from the help desk. The log indicates that potentially malicious code might have been executed on the host. Which of these security events should the security analyst escalate to a supervisor?
- The employee installing an app without permission should be escalated.
- Both events should be escalated.
- Neither event should be escalated.
- The log indicating malicious code might have been executed on the host should be escalated.
6. Which are types of data and assets that stakeholders are most interested in protecting? Select two answers.
- Company policies
- Sensitive financial data
- Social media presence
- Customers’ usernames and passwords
7. Fill in the blank: When a security event results in a data breach, it is categorized as a _____.
- security incident
- threat
- vulnerability
- asset
8. Which of the following are examples of the potential impact of a security incident involving malicious code?
- Loss of assets
- Operational downtime
- Financial consequences
- Data protection
Weekly challenge 1
9. Fill in the blank: A security mindset is the _____.
- ability to help an organization’s human resources (HR) department remain compliant at all times
- intent to provide quality security services to an organization’s development operations team
- opportunity to showcase your Linux and other coding related technical skills
- ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data
10. As a security analyst, you are responsible for protecting an organization’s low-level assets and high-level assets. Which of the following is considered a high-level asset?
- Company job descriptions
- Public press releases
- Intellectual property
- Guest Wi-Fi network
11. Fill in the blank: A security mindset helps a security analyst _____.
- defend against constant pressure from cyber attackers
- recognize the difference between physical security and cybersecurity
- apply for an engineering role
- reinforce the expectations of security stakeholders
12. Which of the following are examples of private data? Select two answers.
- Government trade agreements
- Customer bank account information
- Employee identification numbers
- Employee email addresses
13. What term is used to describe individuals of an organization who are interested in protecting sensitive financial data, customers’ usernames and passwords, and third-party vendor security?
- Executive security administrators
- Data managers
- Information protection advisors
- Stakeholders
14. Fill in the blank: The decisions a security analyst makes can affect the organization that the analyst works for and other team members across the organization. These decisions also affect ______.
- the analyst’s chance for a promotion
- the financial markets
- competitors in the industry
- the customers of the organization that hired the analyst
15. What are some ways that security analysts protect data? Select three answers.
- Understanding the organization’s assets
- Reporting small events
- Ignoring small events
- Paying attention to detail
16. Fill in the blank: When a security event results in a data breach, it is categorized as a _____.
- vulnerability
- security event
- security incident
- threat
17. Fill in the blank: An organization is responsible for protecting its customers' sensitive data. Examples of the kinds of sensitive data that must be protected include ____ and _____. Select two answers.
- social security numbers
- bank statements
- private social media pages
- website URLs
18. Which of the following can cause a company to experience loss of credibility, financial loss, or regulatory fines?
- A cybersecurity awareness month phishing program
- The resignation of the company’s social media manager
- Employee security awareness training
- A data breach
19. Which concept focuses on understanding how to evaluate risk and identify the potential for a breach of a system, application, or data?
- Security analyst evaluation
- Security recognition
- Security mindset
- Python knowledge
20. As a security analyst, you are responsible for protecting an organization’s low-level assets and high-importance assets. Which of the following is considered a low-level asset?
- Company trade secrets
- Guest Wi-Fi network
- Customer email addresses
- Intellectual property
21. Which of the following assets can be protected by adopting a security mindset? Select three answers.
- Sensitive customer data
- Financial information
- Intellectual property
- Network equipment
22. An employee at a healthcare company accesses a patient's medical history and payment information to provide treatment. Which type of data is this classified as?
- Sensitive data
- Confidential data
- Private data
- Public data
23. Fill in the blank: _____ are interested in protecting sensitive financial data, customers’ usernames and passwords, and third-party vendor security.
- Stakeholders
- Social media influencers
- Web programmers
- HIPAA compliance officers
24. What are some examples of the customer data that security analysts protect? Select two answers.
- Product announcements
- Passwords
- Newsletters
- Credit card numbers
25. Fill in the blank: _____ must be protected at all times. An organization can lose its credibility with its customers if it is not properly protected.
- Employee salaries
- An organization’s social media page
- Sensitive customer data
- An organization’s termination policy
26. Which of the following are the best examples of possible consequences of a data breach? Select two answers.
- Improved hardware functionality
- Significant reduction in employee retention
- Loss of credibility
- Regulatory fines
27. Which of the following examples are considered public data? Select two answers.
- Health insurance information
- Product announcements
- Press releases
- Passport numbers
28. Fill in the blank: One of the most important concerns for most organizations is the protection of _____.
- customer data
- guest Wi-Fi
- social media
- job postings
29. A security analyst notices that an employee has installed an app on their work computer without getting permission from the IT service desk. The security analyst also notices that antivirus software recorded a potentially malicious execution on the same computer. Which of these security events should the security analyst escalate to their supervisor?
- Both events should be escalated.
- Neither event should be escalated.
- The employee installing an app without permission should be escalated.
- The potentially malicious code detected by the antivirus software should be escalated.
30. Which of the following is an essential way to maintain a security mindset?
- Evaluate risks
- Seek engineering mentors
- Escalate major security issues within one week
- Work various security jobs with different organizations
31. Fill in the blank: Entry-level analysts can help protect low-level assets, such as an organization’s _____.
- guest Wi-Fi network
- financial information
- trade secrets
- company job descriptions
32. Which of the following statements best describes the relationship between a security mindset and asset protection?
- A security mindset helps analysts protect low-level assets.
- A security mindset is not important for protecting assets.
- A security mindset helps analysts protect high-importance assets.
- A security mindset helps analysts protect all levels of assets.
33. Who will be affected by the decisions you make as a security analyst? Select two answers.
- The financial markets
- The customers of the organization that hired you
- Competitors in the same industry
- The organization that hired you