put it to work prepare for cyber security jobs coursera weekly challenge 2 answers

Test your knowledge: To escalate or not to escalate

1. Fill in the blank: A malware infection is an incident type that occurs when _____.

  • a website experiences high traffic volumes
  • malicious software designed to disrupt a system infiltrates an organization’s computers or network
  • a computer’s speed and performance improves
  • an employee of an organization violates the organization’s acceptable use policies

2. Fill in the blank: Improper usage is an incident type that occurs when _____.

  • an individual gains digital or physical access to a system or application without permission
  • malicious software designed to disrupt a system infiltrates an organization’s computers or network.
  • an employee of an organization violates the organization’s acceptable use policies
  • an employee that runs an organization’s public relations posts incorrect data on the company’s social media page

3. When should you escalate improper usage to a supervisor?

  • Improper usage incidents should always be escalated out of caution.
  • Improper usage incidents should be escalated if there is a high level of improper usage.
  • Improper usage attempts that affect high-priority assets should be escalated; other improper usage instances are not as important.
  • Improper usage does not need to be escalated because these are in-house scenarios that can be handled without reporting them to the security team.

4. Fill in the blank: Unauthorized access is an incident type that occurs when _____.

  • an individual gains digital or physical access to a system, data, or an application without permission
  • an individual gains digital or physical access to a system, data, or an application without permission
  • malicious software designed to disrupt a system infiltrates an organization’s computers or network
  • an employee of an organization violates the organization’s acceptable use policies

Test your knowledge: Timing is everything

5. All security incidents should be escalated.

  • True
  • False

6. Which incident can have the most impact on an organization?

  • An employee forgets their login credentials
  • A user’s social media password is leaked
  • A manufacturing plant’s network is compromised
  • An organization’s guest Wi-Fi network is down

7. Fill in the blank: A(n) _____ is a set of actions that outlines who should be notified when an incident alert occurs and how that incident should be handled.

  • playbook
  • event
  • security incident
  • escalation policy

8. Which incident classification type occurs when an employee violates an organization’s acceptable use policy?

  • Improper usage
  • Malware infection
  • Unauthorized access
  • Containment

Shuffle Q/A 1

Weekly challenge 2

9. What security term describes the identification of a potential security event, triaging it, and handing it off to a more experienced team member?

  • Incident escalation
  • SOC operations
  • Social engineering
  • Data security protection

10. Which skills will help you identify security incidents that need to be escalated? Select two answers.

  • Excellent communication skills
  • Ability to collaborate well with others
  • Attention to detail
  • Ability to follow an organization’s escalation guidelines or processes

Leave a Reply