put it to work prepare for cyber security jobs coursera weekly challenge 3 answers

Test your knowledge: Communicate effectively with stakeholders

1. Which of the following should a security analyst do before communicating the results of a vulnerability test to stakeholders? Select three answers.

  • Use visual aids
  • Choose an appropriate communications medium
  • Use highly technical details
  • Consider the nature of the information that is being communicated

2. If a stakeholder fails to respond to an email in a timely manner, which communication steps are the next best options? Select two answers.

  • Send an instant message
  • Complain to human resources (HR)
  • Make a phone call
  • Report to the organization’s Chief Information Security Officer (CISO)

3. Fill in the blank: The use of _____ to tell a security story can help security analysts communicate impactful data and metrics.

  • visuals
  • cross-site scripting
  • direct phone calls
  • instant messages

4. Which software programs can be used as tools for sharing and telling a visual story about data? Select all that apply.

  • Apache OpenOffice
  • Google Docs
  • Google Sheets
  • Linux

Weekly challenge 3

5. What term is used to define an individual or a group that has an interest in the decisions or activities of an organization?

  • Audit specialist
  • Incident response manager
  • Decision-making manager
  • Stakeholder

6. Fill in the blank: The _____ is an example of a security stakeholder who is most interested in protecting the data and assets of an organization.

  • social media manager
  • accounts receivable specialist
  • in-house graphic designer
  • operations manager

7. A security operations manager often works directly with a security analyst as the first line of defense to protect an organization from what challenges? Select two answers.

  • A lack of an employee consortium
  • The use of social media on work devices
  • Vulnerabilities
  • Risks

8. Fill in the blank: Information that is communicated to ____ is considered sensitive.

  • the general public
  • stakeholders
  • an organization’s competitors
  • employees regarding social events

9. Which of the following guidelines can help security analysts improve stakeholder communications? Select two answers.

  • Use technical security terms as much as possible
  • Include as many topics as possible
  • Be precise
  • Avoid unnecessary technical terms

10. Which of the following is an example of a security event that should be communicated to a stakeholder?

  • Incorrect office hours posted on social media
  • A tax audit
  • Malicious code detected in logs
  • The resignation of a human resources employee

11. Fill in the blank: Visual communications to stakeholders can be used to convey key details in the form of ____.

  • text messages and charts
  • text-filled documents and graphs
  • logs and alerts
  • graphs and charts

12. Why is it important for analysts to use visuals to tell a security story?

  • Visuals can help an analyst communicate impactful metrics and data.
  • Visuals can help an analyst identify which details are most important for different stakeholders.
  • Visuals can help an analyst prioritize which incidents need to be escalated with more or less urgency.
  • Visuals can help an analyst determine which tool to use to solve a security challenge.

13. Fill in the blank: For security purposes, it is important to communicate sensitive information with _____.

  • supervision
  • care
  • graphs and charts
  • a low level of urgency

14. Stakeholders have many responsibilities, so they might miss an email or fail to respond promptly. If an analyst needs to reach a stakeholder right away, what might be a better option for stakeholder communication?

  • A follow-up investigation
  • A phone call
  • An email to the CISO
  • A follow-up email to the stakeholder’s supervisor

15. Which of the following are stakeholders interested in having knowledge of? Select two answers.

  • The online reviews for their organization
  • Social media reviews for their competitor’s organization
  • The decisions of their organization’s leadership
  • The activities of their organization

16. Which security stakeholder helps recognize risks and manage the response to security incidents?

  • Risk manager
  • Chief Information Security Officer (CISO)
  • Operations manager
  • Chief Financial Security Officer (CFO)

17. Handling the daily maintenance of security operations is the general responsibility for which security stakeholder?

  • Operations manager
  • Chief Information Security Officer (CISO)
  • Chief Financial Security Officer (CFO)
  • Entry-level security analyst

18. An analyst sends an email to stakeholders about a recent security breach. While writing the email, the analyst is mindful about what they say and which stakeholders they communicate the information to. Why does the analyst take this approach?

  • Information that is communicated to stakeholders is sensitive.
  • Information can be sent to stakeholders instead of managers.
  • Information about a security breach might improve the company’s reputation.
  • Information sent via email can be considered public knowledge.

19. Fill in the blank: Communications with stakeholders should always be precise, avoid unnecessary technical terms, and _____.

  • include numerous security questions
  • tell an elaborate story to ensure your point is made
  • have various purposes to maximize time
  • have a clear purpose

20. Graphs and charts can be used to create which form of stakeholder report?

  • Text-filled documents
  • Text messages
  • Phone calls
  • Visual communications

21. Fill in the blank: In the field of security, it is important to communicate _____ with care.

  • sensitive information
  • publicly available information
  • nonsensitive information
  • time off requests

22. What is the best way to follow-up with a stakeholder who has not immediately responded to your email? Select two answers.

  • File a complaint with human resources
  • Call them on the phone
  • Report the issue to your supervisor
  • Send them an instant message

23. Which of the following statements best describes the information that is communicated to stakeholders?

  • It is sensitive.
  • It is proprietary.
  • It is shareable to the entire organization.
  • It is publicly available.

24. Which of the following options is the best way to handle the detection of malicious code in logs?

  • Handle the incident using your Linux knowledge
  • Report the incident directly to the CISO
  • Communicate the incident to a security stakeholder
  • Wait until a more experienced team member notices it

25. Fill in the blank: Creating ____ communications allows a security stakeholder to view representations of what is being explained using graphs and charts.

  • audio
  • visual
  • complex
  • simple

26. You have recently been hired as a security analyst for an organization. You’ve been asked by a security stakeholder to provide information on how often the employees from various departments are clicking on simulated phishing emails. What action can you take to best communicate this information?

  • Use visuals, such as charts and graphs, to tell the security story
  • Send an email that explains the necessary information
  • Call the stakeholder and directly update them
  • Ask your supervisor to report your findings because you are new

27. Fill in the blank: If a stakeholder fails to respond to an important message you sent them right away, the best approach to reach them is to follow-up with _____.

  • an email to the CISO
  • a phone call or an instant message
  • an email to your immediate supervisor
  • a text message to the stakeholder’s manager

Leave a Reply