put it to work prepare for cyber security jobs coursera weekly challenge 3 answers
Test your knowledge: Communicate effectively with stakeholders
1. Which of the following should a security analyst do before communicating the results of a vulnerability test to stakeholders? Select three answers.
- Use visual aids
- Choose an appropriate communications medium
- Use highly technical details
- Consider the nature of the information that is being communicated
2. If a stakeholder fails to respond to an email in a timely manner, which communication steps are the next best options? Select two answers.
- Send an instant message
- Complain to human resources (HR)
- Make a phone call
- Report to the organization’s Chief Information Security Officer (CISO)
3. Fill in the blank: The use of _____ to tell a security story can help security analysts communicate impactful data and metrics.
- visuals
- cross-site scripting
- direct phone calls
- instant messages
4. Which software programs can be used as tools for sharing and telling a visual story about data? Select all that apply.
- Apache OpenOffice
- Google Docs
- Google Sheets
- Linux
Weekly challenge 3
5. What term is used to define an individual or a group that has an interest in the decisions or activities of an organization?
- Audit specialist
- Incident response manager
- Decision-making manager
- Stakeholder
6. Fill in the blank: The _____ is an example of a security stakeholder who is most interested in protecting the data and assets of an organization.
- social media manager
- accounts receivable specialist
- in-house graphic designer
- operations manager
7. A security operations manager often works directly with a security analyst as the first line of defense to protect an organization from what challenges? Select two answers.
- A lack of an employee consortium
- The use of social media on work devices
- Vulnerabilities
- Risks
8. Fill in the blank: Information that is communicated to ____ is considered sensitive.
- the general public
- stakeholders
- an organization’s competitors
- employees regarding social events
Shuffle Q/A 1
9. Which of the following guidelines can help security analysts improve stakeholder communications? Select two answers.
- Use technical security terms as much as possible
- Include as many topics as possible
- Be precise
- Avoid unnecessary technical terms
10. Which of the following is an example of a security event that should be communicated to a stakeholder?
- Incorrect office hours posted on social media
- A tax audit
- Malicious code detected in logs
- The resignation of a human resources employee