play it safe manage security risks coursera weekly challenge 1 answers
Test your knowledge: More about the CISSP security domains
1. Fill in the blank: The _____ domain is focused on access and authorization to keep data secure by making sure that users follow established policies to control and manage assets.
- security operations
- identity and access management
- asset security
- communication and network security
2. What is the focus of the security and risk management domain?
- Manage and secure wireless communications
- Secure physical networks and wireless communications
- Optimize data security by ensuring effective processes are in place
- Define security goals and objectives, risk mitigation, compliance, business continuity, and regulations
3. In which domain would a security professional conduct security control testing; collect and analyze data; and perform security audits to monitor for risks, threats, and vulnerabilities?
- Communication and network engineering
- Security architecture and engineering
- Identity and access management
- Security assessment and testing
4. Fill in the blank: The _____ domain concerns conducting investigations and implementing preventive measures.
- security operations
- communications and networking engineering
- asset security
- software development security
Test your knowledge: Navigate threats, risks, and vulnerabilities
5. What is a vulnerability?
- An organization’s ability to manage its defense of critical assets and data and react to change
- Anything that can impact the confidentiality, integrity, or availability of an asset
- Any circumstance or event that can negatively impact assets
- A weakness that can be exploited by a threat
6. Fill in the blank: Information protected by regulations or laws is a _____. If it is compromised, there is likely to be a severe negative impact on an organization’s finances, operations, or reputation.
- low-risk asset
- new-risk asset
- medium-risk asset
- high-risk asset
7. What are the key impacts of threats, risks, and vulnerabilities? Select three answers.
- Damage to reputation
- Employee retention
- Identity theft
- Financial damage
8. Fill in the blank: The steps in the Risk Management Framework (RMF) are prepare, _____, select, implement, assess, authorize, and monitor.
- communicate
- categorize
- produce
- reflect
Shuffle Q/A 1
Weekly challenge 1
9. Fill in the blank: Security _____ refers to an organization’s ability to manage its defense of critical assets and data, as well as its ability to react to change.
- posture
- architecture
- governance
- hardening
10. Which of the following examples are key focus areas of the security and risk management domain? Select three answers.
- Mitigate risk
- Be in compliance
- Secure digital and physical assets
Define security goals and objectives