foundations of cybersecurity coursera weekly challenge 1 answers

Test your knowledge: Introduction to cybersecurity

1. What are the three key elements of the CIA triad?

  • Customer trust, increased revenue, and advancement
  • Compliance standards, instructions, and access
  • Confidentiality, integrity, and availability of information
  • Continuity, invulnerability, and attainment of business goals

2. What are the primary responsibilities of an entry-level security analyst? Select three answers.

  • Create compliance laws
  • Protect information
  • Search for weaknesses
  • Monitor systems

3. Fill in the blank: Performing _____ enables security professionals to review an organization's security records, activities, and related documents.

  • penetration tests
  • software developments
  • ethical hacking
  • security audits

4. In what ways do security teams bring value to an organization? Select two answers.

  • Protecting against external and internal threats
  • Reducing business productivity
  • Achieving regulatory compliance
  • Increasing operational expenses

Test your knowledge: Core skills for cybersecurity professionals

5. Which of the following proficiencies are transferable skills, likely to be applicable in almost any field? Select all that apply.

  • Written and verbal communication
  • Problem-solving
  • Analysis
  • Programming

6. Which of the following proficiencies are technical skills that are needed to become an entry-level security analyst? Select all that apply.

  • Regulation writing
  • Software development
  • Data analysis
  • Programming

7. Fill in the blank: _____ identify, analyze, and preserve criminal evidence within networks, computers, and electronic devices.

  • Business intelligence professionals
  • Digital forensic investigators
  • Security operations center analysts
  • Ethical hackers

8. What are examples of sensitive personally identifiable information (SPII) that cybersecurity professionals need to protect? Select two answers.

  • Bank account numbers
  • Email addresses
  • Medical records
  • Last names

Shuffle Q/A 1

Weekly challenge 1

9. Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from _____ or criminal exploitation.

  • changing business priorities
  • unauthorized access
  • poor financial management
  • market shifts

10. Which of the following tasks are typically responsibilities of entry-level security analysts? Select all that apply.

  • Installing prevention software
  • Creating organizational policies
  • Conducting periodic security audits
  • Protecting computer and network systems

Leave a Reply