put it to work prepare for cyber security jobs coursera weekly challenge 3 answers
Test your knowledge: Communicate effectively with stakeholders
1. Which of the following should a security analyst do before communicating the results of a vulnerability test to stakeholders? Select three answers.
- Use visual aids
- Choose an appropriate communications medium
- Use highly technical details
- Consider the nature of the information that is being communicated
2. If a stakeholder fails to respond to an email in a timely manner, which communication steps are the next best options? Select two answers.
- Send an instant message
- Complain to human resources (HR)
- Make a phone call
- Report to the organization’s Chief Information Security Officer (CISO)
3. Fill in the blank: The use of _____ to tell a security story can help security analysts communicate impactful data and metrics.
- visuals
- cross-site scripting
- direct phone calls
- instant messages
4. Which software programs can be used as tools for sharing and telling a visual story about data? Select all that apply.
- Apache OpenOffice
- Google Docs
- Google Sheets
- Linux
Weekly challenge 3
5. What term is used to define an individual or a group that has an interest in the decisions or activities of an organization?
- Audit specialist
- Incident response manager
- Decision-making manager
- Stakeholder
6. Fill in the blank: The _____ is an example of a security stakeholder who is most interested in protecting the data and assets of an organization.
- social media manager
- accounts receivable specialist
- in-house graphic designer
- operations manager
7. A security operations manager often works directly with a security analyst as the first line of defense to protect an organization from what challenges? Select two answers.
- A lack of an employee consortium
- The use of social media on work devices
- Vulnerabilities
- Risks
8. Fill in the blank: Information that is communicated to ____ is considered sensitive.
- the general public
- stakeholders
- an organization’s competitors
- employees regarding social events
9. Which of the following guidelines can help security analysts improve stakeholder communications? Select two answers.
- Use technical security terms as much as possible
- Include as many topics as possible
- Be precise
- Avoid unnecessary technical terms
10. Which of the following is an example of a security event that should be communicated to a stakeholder?
- Incorrect office hours posted on social media
- A tax audit
- Malicious code detected in logs
- The resignation of a human resources employee
11. Fill in the blank: Visual communications to stakeholders can be used to convey key details in the form of ____.
- text messages and charts
- text-filled documents and graphs
- logs and alerts
- graphs and charts
12. Why is it important for analysts to use visuals to tell a security story?
- Visuals can help an analyst communicate impactful metrics and data.
- Visuals can help an analyst identify which details are most important for different stakeholders.
- Visuals can help an analyst prioritize which incidents need to be escalated with more or less urgency.
- Visuals can help an analyst determine which tool to use to solve a security challenge.
13. Fill in the blank: For security purposes, it is important to communicate sensitive information with _____.
- supervision
- care
- graphs and charts
- a low level of urgency
14. Stakeholders have many responsibilities, so they might miss an email or fail to respond promptly. If an analyst needs to reach a stakeholder right away, what might be a better option for stakeholder communication?
- A follow-up investigation
- A phone call
- An email to the CISO
- A follow-up email to the stakeholder’s supervisor
15. Which of the following are stakeholders interested in having knowledge of? Select two answers.
- The online reviews for their organization
- Social media reviews for their competitor’s organization
- The decisions of their organization’s leadership
- The activities of their organization
16. Which security stakeholder helps recognize risks and manage the response to security incidents?
- Risk manager
- Chief Information Security Officer (CISO)
- Operations manager
- Chief Financial Security Officer (CFO)
17. Handling the daily maintenance of security operations is the general responsibility for which security stakeholder?
- Operations manager
- Chief Information Security Officer (CISO)
- Chief Financial Security Officer (CFO)
- Entry-level security analyst
18. An analyst sends an email to stakeholders about a recent security breach. While writing the email, the analyst is mindful about what they say and which stakeholders they communicate the information to. Why does the analyst take this approach?
- Information that is communicated to stakeholders is sensitive.
- Information can be sent to stakeholders instead of managers.
- Information about a security breach might improve the company’s reputation.
- Information sent via email can be considered public knowledge.
19. Fill in the blank: Communications with stakeholders should always be precise, avoid unnecessary technical terms, and _____.
- include numerous security questions
- tell an elaborate story to ensure your point is made
- have various purposes to maximize time
- have a clear purpose
20. Graphs and charts can be used to create which form of stakeholder report?
- Text-filled documents
- Text messages
- Phone calls
- Visual communications
21. Fill in the blank: In the field of security, it is important to communicate _____ with care.
- sensitive information
- publicly available information
- nonsensitive information
- time off requests
22. What is the best way to follow-up with a stakeholder who has not immediately responded to your email? Select two answers.
- File a complaint with human resources
- Call them on the phone
- Report the issue to your supervisor
- Send them an instant message
23. Which of the following statements best describes the information that is communicated to stakeholders?
- It is sensitive.
- It is proprietary.
- It is shareable to the entire organization.
- It is publicly available.
24. Which of the following options is the best way to handle the detection of malicious code in logs?
- Handle the incident using your Linux knowledge
- Report the incident directly to the CISO
- Communicate the incident to a security stakeholder
- Wait until a more experienced team member notices it
25. Fill in the blank: Creating ____ communications allows a security stakeholder to view representations of what is being explained using graphs and charts.
- audio
- visual
- complex
- simple
26. You have recently been hired as a security analyst for an organization. You’ve been asked by a security stakeholder to provide information on how often the employees from various departments are clicking on simulated phishing emails. What action can you take to best communicate this information?
- Use visuals, such as charts and graphs, to tell the security story
- Send an email that explains the necessary information
- Call the stakeholder and directly update them
- Ask your supervisor to report your findings because you are new
27. Fill in the blank: If a stakeholder fails to respond to an important message you sent them right away, the best approach to reach them is to follow-up with _____.
- an email to the CISO
- a phone call or an instant message
- an email to your immediate supervisor
- a text message to the stakeholder’s manager