Introduction to Cybersecurity Tools & Cyber Attacks Week 3 Quiz answers Coursera

In this post, you will get all week 3 quiz answers of Introduction to Cybersecurity Tools & Cyber Attacks Coursera.

Enroll Here: Introduction to Cybersecurity Tools & Cyber Attack – Coursera

Course overview (All weeks quizzes answers link)

Introduction to Cybersecurity Tools & Cyber Attacks Week 3 Quiz answers Coursera

Now, let’s start with Week 3 quiz answers which is a part of Introduction to Cybersecurity Tools & Cyber Attacks – Coursera

Week 3: Introduction to Cybersecurity Tools & Cyber Attacks quiz answers coursera

Below you’ll find all practice quiz answers of different topics/sections in Introduction to Cybersecurity Tools & Cyber Attacks Quiz answers Coursera and end quiz exam answers under week 3.

Practice Quiz: CIA Triad Quiz Answers Coursera – 4 questions

Q1: Encrypting your email is an example of addressing which aspect of the CIA Triad?

  • Confidentiality
  • Integrity
  • Availability

Q2. Trudy changes the meeting time in a message she intercepts from Alice before she forwards it on to Bob. This is a violation of which aspect of the CIA Triad?

  • Confidentiality
  • Integrity
  • Availability

Q3. You fail to backup your files and then drop your laptop breaking it into many small pieces. You have just failed to address which aspect of the CIA Triad?

  • Confidentiality
  • Integrity
  • Availability

Q4. The use of digital signatures is an example of which concept?

  • Non-repudiation
  • Confidentiality
  • Integrity
  • Availability

Practice Quiz: Access Management Quiz Answers Coursera – 1 question

Q1. Managers in the Singapore office at your company can access documents that managers in other offices cannot access, nor can nonmanager employees in the Singapore office. Which 2 access criterial types were likely involved in setting this up?

  • Physical location
  • Transaction type
  • Groups
  • Timeframe

Practice Quiz: Incident Response Quiz Answers Coursera – 3 questions

Q1. In incident management, an event that has a negative impact on some aspect of the network or data is called what?

  • Threat
  • Attack
  • Event
  • Incident

Q2. In incident management, a data inventory, data classification and data management process are part of which key concept?

  • E-Discovery
  • Post-Incident Activities
  • Automated system
  • Business Continuity Plan & Disaster Recovery

Q3. Which phase of the Incident Response Process do steps like Identify cyber security incident, Define objectives and investigate situation and Take appropriate action fall into?

  • Phase 1: Prepare
  • Phase 2: Respond
  • Phase 3: Follow Up

Practice Quiz: Frameworks and their purpose Quiz Answers Coursera – 5 questions

Q1. In the context of security standards and compliance, which two (2) of these items are goals of frameworks and best practices?

  • They serve as an enforcement mechanism for government, industry or clients.
  • They help translate the business needs into technical or operational needs.
  • They are rules to follow for a specific industry.
  • They seek to improve performance, controls and metrics.

Q2. A company document that says employees may not do online shopping while at work would be which of the following?

  • Strategic Plan
  • Procedure
  • Tactical Plan
  • Policy

Q3. Which three (3) of these are compliance standards that must be adhered to by companies is some industries / countries?

  • HIPPA
  • OCTAVE
  • SOX
  • PCI/DSS

Q4. A method of evaluating computer and network security by simulating an attack on a computer system or network from external or internal threats is know as which of the following?

  • A hack
  • A pentest
  • A white hat
  • A threat

Q5. The OWASP “Top 10” provides guidance on what?

  • The top 10 cybercrimes reported each year.
  • The top 10 network vulnerabilities reported each year.
  • The top 10 malware exploits reported each year.
  • The top 10 application vulnerabilities reported each year.

Quiz: An overview of key security concepts Week 3 Quiz Answers Coursera – 17 questions

Introduction to Cybersecurity Tools & Cyber Attacks Week 3 Quiz answers Coursera

This is the end quiz of week 3 in Introduction to Cybersecurity Tools & Cyber Attacks Week 3 Quiz answers Coursera. It is necessary to complete with 80% or higher.

Q1. Which two (2) key components are part of incident response? (Select 2)

  • Investigation
  • Threat
  • Response team
  • Attack

Q2. Which is not part of the Sans Institutes Audit process?

  • Help to translate the business needs into technical or operational needs.
  • Define the audit scope and limitations.
  • Feedback based on the findings.
  • Deliver a report.

Q3. Which key concept to understand incident response is defined as “data inventory, helps to understand the current tech status, data classification, data management, we could use automated systems. Understand how you control data retention and backup.”

  • Post-Incident
  • BCP & Disaster Recovery
  • E-Discovery
  • Automated Systems

Q4. Which is not included as part of the IT Governance process?

  • Procedures
  • Audits
  • Policies
  • Tactical Plans

Q5. Trudy reading Alice’s message to Bob is a violation of which aspect of the CIA Triad?

  • Confidentiality
  • Integrity
  • Availability

Q6. A hash is a mathematical algorithm that helps assure which aspect of the CIA Triad?

  • Confidentiality
  • Integrity
  • Availability

Q7. A successful DOS attack against your company’s servers is a violation of which aspect of the CIA Triad?

  • Confidentiality
  • Integrity
  • Availability

Q8. Which of these is an example of the concept of non-repudiation?

  • Alice sends a message to Bob and Alice is certain that it was not read by Trudy.
  • Alice sends a message to Bob with certainty that it will be delivered.
  • Alice sends a message to Bob with certainty that it was not altered while in route by Trudy.
  • Alice sends a message to Bob and Bob knows for a certainty that it came from Alice and no one else.

Q9. You have been asked to establish access to corporate documents in such a way that they can be read from anywhere, but only modified while the employees are in the office. Which 2 access criteria types were likely involved in setting this up?

  • Transaction type
  • Timeframe
  • Physical location
  • Groups

Q10. In incident management, an observed change to the normal behavior of a system, environment or process is called what?

  • Incident
  • Event
  • Threat
  • Attack

Q11. In incident management, tools like SIEM, SOA and UBA are part of which key concept?

  • Automated system
  • Post-Incident Activities
  • BCP & Disaster Recovery
  • E-Discovery

Q12.Which phase of the Incident Response Process do steps like Carry out a post incident review and Communicate and build on lessons learned fall into?

  • Respond
  • Follow Up
  • Prepare

Q13. In the context of security standards and compliance, which two (2) of these are considered normative and compliance items?

  • They serve as an enforcement mechanism for government, industry or clients.
  • They are rules to follow for a specific industry.
  • They help translate the business needs into technical or operational needs.
  • They seek to improve performance, controls and metrics.

Q14. A company document that details how an employee should request Internet access for her computer would be which of the following?

  • Procedure
  • Policy
  • Strategic Plan
  • Tactical Plan

Q15. Which of these is a methodology by which to conduct audits?

  • SOX
  • HIPPA
  • PCI/DSS
  • OCTAVE

Q16. Mile 2 CPTE Training teaches you how to do what?

  • Construct a botnet
  • Advanced network management tasks
  • Conduct a pentest.
  • Conduct a Ransomware attack

Q17. Which three (3) statements about OWASP are True?

  • OWASP Top 10 only lists the top 10 web application vulnerabilities but you must engage an OWASP certified partner to learn how to fix them.
  • OWASP stands for Open Web Application Security Project
  • OWASP provides tools and guidance for mobile applications.
  • OWASP provides guidance and tools to help you address web application vulnerabilities on their Top 10 list.

<< Prev: Introduction to Cybersecurity Tools & Cyber Attacks Week 2 Quiz Answers Coursera

>> Next: Introduction to Cybersecurity Tools & Cyber Attacks Week 4 Quiz Answers Coursera


Explore! Artificial Intelligence Foundations Exams answers – SkillUp

The above question set contains all the correct answers. But in any case, you find any typographical, grammatical or any other error then kindly inform us.

Thanks in advance.

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.

Leave a Comment

Your email address will not be published. Required fields are marked *