foundations of cybersecurity coursera weekly challenge 1 answers
Test your knowledge: Introduction to cybersecurity
1. What are the three key elements of the CIA triad?
- Customer trust, increased revenue, and advancement
- Compliance standards, instructions, and access
- Confidentiality, integrity, and availability of information
- Continuity, invulnerability, and attainment of business goals
2. What are the primary responsibilities of an entry-level security analyst? Select three answers.
- Create compliance laws
- Protect information
- Search for weaknesses
- Monitor systems
3. Fill in the blank: Performing _____ enables security professionals to review an organization's security records, activities, and related documents.
- penetration tests
- software developments
- ethical hacking
- security audits
4. In what ways do security teams bring value to an organization? Select two answers.
- Protecting against external and internal threats
- Reducing business productivity
- Achieving regulatory compliance
- Increasing operational expenses
Test your knowledge: Core skills for cybersecurity professionals
5. Which of the following proficiencies are transferable skills, likely to be applicable in almost any field? Select all that apply.
- Written and verbal communication
- Problem-solving
- Analysis
- Programming
6. Which of the following proficiencies are technical skills that are needed to become an entry-level security analyst? Select all that apply.
- Regulation writing
- Software development
- Data analysis
- Programming
7. Fill in the blank: _____ identify, analyze, and preserve criminal evidence within networks, computers, and electronic devices.
- Business intelligence professionals
- Digital forensic investigators
- Security operations center analysts
- Ethical hackers
8. What are examples of sensitive personally identifiable information (SPII) that cybersecurity professionals need to protect? Select two answers.
- Bank account numbers
- Email addresses
- Medical records
- Last names
Shuffle Q/A 1
Weekly challenge 1
9. Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from _____ or criminal exploitation.
- changing business priorities
- unauthorized access
- poor financial management
- market shifts
10. Which of the following tasks are typically responsibilities of entry-level security analysts? Select all that apply.
- Installing prevention software
- Creating organizational policies
- Conducting periodic security audits
- Protecting computer and network systems