assets threats and vulnerabilities coursera weekly challenge 2 answers

Test your knowledge: Safeguard information

1. What are categories of security controls? Select all that apply.

  • Operational
  • Privacy
  • Technical
  • Managerial

2. Fill in the blank: A data _____ decides who can access, edit, use, or destroy their information.

  • handler
  • custodian
  • protector
  • owner

3. A writer for a technology company is drafting an article about new software features that are being released. According to the principle of least privilege, what should the writer have access to while drafting the article? Select all that apply.

  • Login credentials of the software users
  • Software developers who are knowledgeable about the product
  • Other new software that is in development
  • The software they are reviewing

4. Which privacy regulations influence how organizations approach data security? Select three answers.

  • Infrastructure as a Service (IaaS)
  • General Data Protection Regulation (GDPR)
  • Payment Card Industry Data Security Standard (PCI DSS)
  • Health Insurance Portability and Accountability Act (HIPAA)

Test your knowledge: Encryption methods

5. Which of the following elements are required when using encryption? Select all that apply.

  • Key
  • Certificate
  • Cipher
  • Token

6. Which technologies are used in public key infrastructure (PKI)? Select three answers.

  • Asymmetric encryption
  • Symmetric encryption
  • Digital certificates
  • Ciphertext

7. Fill in the blank: _____ encryption produces a public and private key pair.

  • Hashing
  • Symmetric
  • Salting
  • Asymmetric

8. An attacker gains access to a database where user passwords are secured with the SHA-256 hashing algorithm. Can the attacker decrypt the user passwords?

  • Yes. Hash algorithms produce a decryption key.
  • No. Hash algorithms do not produce decryption keys.

Shuffle Q/A 1

9. What term describes being unable to deny that information is authentic?

  • Confidentiality
  • Non-repudiation
  • Integrity
  • Availability

Test your knowledge: Authentication, authorization, and accounting

10. What factors do authentication systems use to verify a user's identity? Select three answers.

  • Ownership
  • Characteristic
  • Authorization
  • Knowledge

Leave a Reply