play it safe manage security risks coursera weekly challenge 1 answers

Test your knowledge: More about the CISSP security domains

1. Fill in the blank: The _____ domain is focused on access and authorization to keep data secure by making sure that users follow established policies to control and manage assets.

  • security operations
  • identity and access management
  • asset security
  • communication and network security

2. What is the focus of the security and risk management domain?

  • Manage and secure wireless communications
  • Secure physical networks and wireless communications
  • Optimize data security by ensuring effective processes are in place
  • Define security goals and objectives, risk mitigation, compliance, business continuity, and regulations

3. In which domain would a security professional conduct security control testing; collect and analyze data; and perform security audits to monitor for risks, threats, and vulnerabilities?

  • Communication and network engineering
  • Security architecture and engineering
  • Identity and access management
  • Security assessment and testing

4. Fill in the blank: The _____ domain concerns conducting investigations and implementing preventive measures.

  • security operations
  • communications and networking engineering
  • asset security
  • software development security

Test your knowledge: Navigate threats, risks, and vulnerabilities

5. What is a vulnerability?

  • An organization’s ability to manage its defense of critical assets and data and react to change
  • Anything that can impact the confidentiality, integrity, or availability of an asset
  • Any circumstance or event that can negatively impact assets
  • A weakness that can be exploited by a threat

6. Fill in the blank: Information protected by regulations or laws is a _____. If it is compromised, there is likely to be a severe negative impact on an organization’s finances, operations, or reputation.

  • low-risk asset
  • new-risk asset
  • medium-risk asset
  • high-risk asset

7. What are the key impacts of threats, risks, and vulnerabilities? Select three answers.

  • Damage to reputation
  • Employee retention
  • Identity theft
  • Financial damage

8. Fill in the blank: The steps in the Risk Management Framework (RMF) are prepare, _____, select, implement, assess, authorize, and monitor.

  • communicate
  • categorize
  • produce
  • reflect

Shuffle Q/A 1

Weekly challenge 1

9. Fill in the blank: Security _____ refers to an organization’s ability to manage its defense of critical assets and data, as well as its ability to react to change.

  • posture
  • architecture
  • governance
  • hardening

10. Which of the following examples are key focus areas of the security and risk management domain? Select three answers.

  • Mitigate risk
  • Be in compliance
  • Secure digital and physical assets
  • Define security goals and objectives

Leave a Reply