put it to work prepare for cyber security jobs coursera weekly challenge 3 answers

Test your knowledge: Communicate effectively with stakeholders

1. Which of the following should a security analyst do before communicating the results of a vulnerability test to stakeholders? Select three answers.

  • Use visual aids
  • Choose an appropriate communications medium
  • Use highly technical details
  • Consider the nature of the information that is being communicated

2. If a stakeholder fails to respond to an email in a timely manner, which communication steps are the next best options? Select two answers.

  • Send an instant message
  • Complain to human resources (HR)
  • Make a phone call
  • Report to the organization’s Chief Information Security Officer (CISO)

3. Fill in the blank: The use of _____ to tell a security story can help security analysts communicate impactful data and metrics.

  • visuals
  • cross-site scripting
  • direct phone calls
  • instant messages

4. Which software programs can be used as tools for sharing and telling a visual story about data? Select all that apply.

  • Apache OpenOffice
  • Google Docs
  • Google Sheets
  • Linux

Weekly challenge 3

5. What term is used to define an individual or a group that has an interest in the decisions or activities of an organization?

  • Audit specialist
  • Incident response manager
  • Decision-making manager
  • Stakeholder

6. Fill in the blank: The _____ is an example of a security stakeholder who is most interested in protecting the data and assets of an organization.

  • social media manager
  • accounts receivable specialist
  • in-house graphic designer
  • operations manager

7. A security operations manager often works directly with a security analyst as the first line of defense to protect an organization from what challenges? Select two answers.

  • A lack of an employee consortium
  • The use of social media on work devices
  • Vulnerabilities
  • Risks

8. Fill in the blank: Information that is communicated to ____ is considered sensitive.

  • the general public
  • stakeholders
  • an organization’s competitors
  • employees regarding social events

Shuffle Q/A 1

9. Which of the following guidelines can help security analysts improve stakeholder communications? Select two answers.

  • Use technical security terms as much as possible
  • Include as many topics as possible
  • Be precise
  • Avoid unnecessary technical terms

10. Which of the following is an example of a security event that should be communicated to a stakeholder?

  • Incorrect office hours posted on social media
  • A tax audit
  • Malicious code detected in logs
  • The resignation of a human resources employee

Leave a Reply