play it safe manage security risks coursera weekly challenge 1 answers
Test your knowledge: More about the CISSP security domains
1. Fill in the blank: The _____ domain is focused on access and authorization to keep data secure by making sure that users follow established policies to control and manage assets.
- security operations
- identity and access management
- asset security
- communication and network security
2. What is the focus of the security and risk management domain?
- Manage and secure wireless communications
- Secure physical networks and wireless communications
- Optimize data security by ensuring effective processes are in place
- Define security goals and objectives, risk mitigation, compliance, business continuity, and regulations
3. In which domain would a security professional conduct security control testing; collect and analyze data; and perform security audits to monitor for risks, threats, and vulnerabilities?
- Communication and network engineering
- Security architecture and engineering
- Identity and access management
- Security assessment and testing
4. Fill in the blank: The _____ domain concerns conducting investigations and implementing preventive measures.
- security operations
- communications and networking engineering
- asset security
- software development security
Test your knowledge: Navigate threats, risks, and vulnerabilities
5. What is a vulnerability?
- An organization’s ability to manage its defense of critical assets and data and react to change
- Anything that can impact the confidentiality, integrity, or availability of an asset
- Any circumstance or event that can negatively impact assets
- A weakness that can be exploited by a threat
6. Fill in the blank: Information protected by regulations or laws is a _____. If it is compromised, there is likely to be a severe negative impact on an organization’s finances, operations, or reputation.
- low-risk asset
- new-risk asset
- medium-risk asset
- high-risk asset
7. What are the key impacts of threats, risks, and vulnerabilities? Select three answers.
- Damage to reputation
- Employee retention
- Identity theft
- Financial damage
8. Fill in the blank: The steps in the Risk Management Framework (RMF) are prepare, _____, select, implement, assess, authorize, and monitor.
- communicate
- categorize
- produce
- reflect
Weekly challenge 1
9. Fill in the blank: Security _____ refers to an organization’s ability to manage its defense of critical assets and data, as well as its ability to react to change.
- posture
- architecture
- governance
- hardening
10. Which of the following examples are key focus areas of the security and risk management domain? Select three answers.
- Mitigate risk
- Be in compliance
- Secure digital and physical assets
Define security goals and objectives
11. What term describes an organization's ability to maintain its everyday productivity by establishing risk disaster recovery plans?
- Mitigation
- Daily defense
- Recovery
- Business continuity
12. What security concept involves all individuals in an organization taking an active role in reducing risk and maintaining security?
- Shared responsibility
- Remote services
- Secure coding
- Employee retention
13. A security analyst researches ways to improve access and authorization at their business. Their primary goal is to keep data secure. Which security domain does this scenario describe?
- Security assessment and testing
- Communication and network security
- Asset security
- Identity and access management
14. What are the key areas of focus in the security assessment and testing domain? Select three answers.
- Collect and analyze data
- Perform security audits
- Conduct security control testing
- Use secure coding practices
15. Fill in the blank: The software development _____ process may involve penetration testing during the deployment and implementation phase of developing software products.
- positioning
- access
- operational
- lifecycle
16. Which of the following statements accurately describe risk? Select all that apply.
- Another way to think of risk is the likelihood of a threat occurring.
- A high-risk asset is any information protected by regulations or laws.
- If compromised, a medium-risk asset may cause some damage to an organization’s ongoing operations.
- If compromised, a low-risk asset would have a severe negative impact on an organization’s ongoing reputation.
17. A business experiences an attack. As a result, sensitive personally identifiable information (SPII) is leaked through the dark web. What type of consequence does this scenario describe?
- Financial gain
- Identity theft
- Reputation
- Customer
18. In the Risk Management Framework (RMF), which step involves knowing how current systems are operating and if they support security goals?
- Monitor
- Assess
- Authorize
- Categorize
19. Fill in the blank: Security posture refers to an organization’s ability to react to _____ and manage its defense of critical assets and data.
- change
- tasks
- sustainability
- competition
20. How does business continuity enable an organization to maintain everyday productivity?
- By ensuring return on investment
- By exploiting vulnerabilities
- By outlining faults to business policies
- By establishing risk disaster recovery plans
21. Which of the following activities may be part of establishing security controls? Select three answers.
- Monitor and record user requests
- Collect and analyze security data regularly
- Evaluate whether current controls help achieve business goals
- Implement multi-factor authentication
22. A business experiences an attack. As a result, a major news outlet reports the attack, which creates bad press for the organization. What type of consequence does this scenario describe?
- Increase in profits
- Damage to reputation
- Loss of identity
- Lack of engagement
23. In the Risk Management Framework (RMF), which step involves having effective security and privacy plans in place in order to minimize the impact of ongoing risks?
- Authorize
- Prepare
- Categorize
- Implement
24. What is the goal of business continuity?
- Reduce personnel
- Remove access to assets
- Destroy publicly available data
- Maintain everyday productivity
25. Shared responsibility is a core concept of which domain?
- Security and risk management
- Security architecture and engineering
- Asset security
Communication and network security
26. How does security control testing enable companies to identify new and better ways to mitigate threats? Select two answers.
- By revising project milestones
- By evaluating whether the current controls help achieve goals
- By granting employee access to physical spaces
- By examining organizational goals and objectives
27. A business experiences an attack. As a result, its critical business operations are interrupted and it faces regulatory fines. What type of consequence does this scenario describe?
- Practical
- Reputation
- Financial
- Identity
28. In the Risk Management Framework (RMF), which step involves being aware of how systems are operating?
- Monitor
- Categorize
- Implement
- Authorize