put it to work prepare for cyber security jobs coursera weekly challenge 1 answers
Test your knowledge: Event and incident detection
1. What does a security mindset enable a security analyst to do when protecting their organization? Select two answers.
- Evaluate risks and identify potential system breaches
- Approve social media connections from security professionals
- Recognize what they are defending
- Evaluate employee retention
2. Which type of asset would have the least impact on an organization if it were compromised?
- Trade secrets
- Intellectual property
- Financial information
- Guest Wi-Fi network
3. How can security analysts cultivate a security mindset?
- By researching the latest security vulnerabilities
- By signing non-disclosure agreements (NDAs)
- By protecting public data from being accessed and shared
- By sharing sensitive information with those who request it
4. Which of the following examples describes the use of a security mindset? Select two answers.
- Exercising suspicion before opening email attachments
- Reusing passwords for multiple accounts
- Downloading email attachments from unknown senders
- Reporting suspicious emails
Test your knowledge: Your impact on data protection
5. A security analyst notices that an employee has installed an app on their work device without getting permission from the help desk. The log indicates that potentially malicious code might have been executed on the host. Which of these security events should the security analyst escalate to a supervisor?
- The employee installing an app without permission should be escalated.
- Both events should be escalated.
- Neither event should be escalated.
- The log indicating malicious code might have been executed on the host should be escalated.
6. Which are types of data and assets that stakeholders are most interested in protecting? Select two answers.
- Company policies
- Sensitive financial data
- Social media presence
- Customers’ usernames and passwords
7. Fill in the blank: When a security event results in a data breach, it is categorized as a _____.
- security incident
- threat
- vulnerability
- asset
8. Which of the following are examples of the potential impact of a security incident involving malicious code?
- Loss of assets
- Operational downtime
- Financial consequences
- Data protection
Shuffle Q/A 1
Weekly challenge 1
9. Fill in the blank: A security mindset is the _____.
- ability to help an organization’s human resources (HR) department remain compliant at all times
- intent to provide quality security services to an organization’s development operations team
- opportunity to showcase your Linux and other coding related technical skills
- ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data
10. As a security analyst, you are responsible for protecting an organization’s low-level assets and high-level assets. Which of the following is considered a high-level asset?
- Company job descriptions
- Public press releases
- Intellectual property
- Guest Wi-Fi network