Wednesday , December 18 2024
Breaking News

Introduction to Cybersecurity Tools & Cyber Attacks Week 1 Quiz Answers

Week 1: Introduction to Cybersecurity Tools & Cyber Attacks Quiz Answers Coursera

  • Threats
  • Available analysts
  • Available time
  • Needed knowledge
  • Alerts
  • 180,000
  • 1.8 million
  • 180 million
  • There is expected to be a surplus of available skills by 2022.

What are We Talking about when We Talk about Cybersecurity? Quiz Answers Week 1 Coursera

  • The measures taken to protect governmental and military computer and weapons systems from unauthorized use, alteration, disruption or destruction.
  • The protection of information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.
  • The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  • Integrity
  • Confidentiality
  • Cyber
  • Availability
  • Access
  • Information
  • Threat
  • Exploit
  • Vulnerability
  • Risk
  • Threat
  • Vulnerability
  • Exploit
  • Risk
  • Natural factors, such as hurricanes, lightning and tornados.
  • External threats, such as hackers, malware and viruses.
  • Internal factors, such as current and former employees.
  • Malicious events, such as an attack orchestrated by a foreign government.
  • Many vulnerabilities are introduced to a system by malware such as Trojan horses.
  • Many systems are shipped with known and unknown security holes, such as insecure default settings.
  • Many vulnerabilities occur as a result of misconfiguration by the system administrator.
  • Many vulnerabilities are inherent in a systems operating system and cannot be patched, only monitored.
  • Information Security Analyst
  • Chief Information Security Officer
  • Information Security Auditor
  • Information Security Architect

From Ronald Reagan to Where we are Today Quiz Answers Week 1 Coursera

  • George W Bush
  • Gerald Ford
  • Ronald Reagan
  • Barack Obama
  • Computing devices like PCs and smartphones are now used by a large majority of people.
  • To save money, common operating systems have paid little attention to security and are easily hacked.
  • Weapons systems are now fully automated and can be controlled remotely.
  • There is nothing illegal about accessing any computer you wish, as long as you do not do harm.
  • 1000 to 2000
  • 50 to 100
  • 35,000 to 40,000
  • 7000 to 10,000
  • Stuxnet was used to steal an estimated $100M from various banks in the United States and the UK.
  • Stuxnet was used by agents acting on behalf of the Russian government to hack Hillary Clinton’s email server.
  • Stuxnet was used to disable uranium processing equipment in an Iranian nuclear facility.
  • Stuxnet was used by Edward Snowden to hack US intelligence agency servers and download classified information about secret surveillance programs.

Cybersecurity Programs Quiz Answers Week 1 Coursera

  • Local nature of business
  • Mobile technology – everyone has a smartphone
  • Data protection – your data is everywhere
  • Multiple different vendors, each supporting different technology and protocols
  • Security program
  • Asset management
  • Administrative controls
  • Technical controls
  • Security program
  • Asset management
  • Administrative controls
  • Technical controls
  • Security program
  • Asset management
  • Administrative controls
  • Technical controls

Cybersecurity – A Security Architect’s Perspective Quiz Answers Week 1 Coursera

  • Solutions can be attacked themselves
  • Protection of enforcement structure can complicate solutions
  • Protectors have to be right just once
  • Security is not as simple as it seems
  • trudy
  • Priya
  • Availability
  • Integrity
  • Confidentiality
  • Authentication
  • Authentication
  • Availability
  • Confidentiality
  • Integrity

What is Critical Thinking? Quiz Answers Week 1 Coursera

  • Critical thinking is taking on the mindset of your opponent (the hacker for example) and trying to think like him/her.
  • Critical thinking is the controlled, purposeful thinking directed toward a goal.
  • Critical thinking is a mode the brain goes into during critical or emergency situations.
  • Critical thinking involves always looking for the flaw or weakness in any given situation.
  • Interpersonal skills and competencies.
  • Technical skills and competencies.
  • Technical and experimental knowledge, intellectual skills and competencies.
  • Critical thinking characteristics (attitudes & behaviors).
  • The ability to place yourself in the mindset of an adversary or attacker.
  • The strength necessary to be critical of others who are advocating unsafe practices.
  • Understand Context
  • Identify Key Drivers
  • Challenge Assumptions
  • Consider Alternatives

Quiz: History of Cybersecurity Quiz Answers Week 1 Coursera

  • The movie gave an accurate portayal of the Iran-Contra scandle that could have only come from inside sources.
  • US Army gererals did not know how to use the advanced weapons systems they were responsable for.
  • KGB agents from the USSR were able to hack into Pentagon computer systems and steal plans for advanced US weapons.
  • A teenager hacked into a Pentagon computer that was capable of launching nuclear weapons.
  • Confirmed reports of Al Qaeda operatives hacking the E-mail servers of US Government agencies.
  • The failed Bay of Pigs invasion.
  • 9/11
  • The attack against the USS Cole while it was in port in Yeman.
  • Could this happen again?
  • How did this happen?
  • Could an attack like this happen in the virtual world too?
  • Who wrote the malware that took control of the 4 airplanes navigation systems?
  • $100M
  • $1B
  • $10B
  • $100B
  • They are fictional characters used to illustrate how cryptography works.
  • They are the founders of modern cryptography.
  • They are the pseudonyms (false names) used by members of the hacktivist group Anonymous.
  • They were members of British Navel Intelligence who did pioneering work in secure communications that later became known as cryptography.
  • Security practices are viewed as being “in the way”.
  • Security architectures require constant effort.
  • Security is often an after-thought; something that is added at the end of a project rather than baked into the project from the start.
  • All of the above
  • Available analysts
  • Needed knowledge
  • Available time
  • Threats
  • Alerts
  • Vulnerability
  • Risk
  • Threat
  • Exploit
  • Exploit
  • Threat
  • Vulnerability
  • Risk
  • Asset management
  • Administrative controls
  • Security program
  • Technical controls
  • Every 1 second
  • Every 1 minute
  • Every 1 hour
  • Every 1 day
  • Every 1 month
  • Every 1 year
  • The availability of communication that needs to be shared between the 3 friends.
  • The complexity of communication between people who use different protocols.
  • The positioning of firewalls that assure the integrity of communication between the 3 friends.
  • The security of communication between Alice and Bob that risks interception by Trudy.
  • Confidentiality
  • Integrity
  • Availability
  • All of the above.
  • Confidentiality
  • Integrity
  • Availability
  • All of the above
  • Confidentiality
  • Integrity
  • Availability
  • All of the above
  • A White Hat
  • A Black Hat
  • A Gray Hat
  • NIST SP 800-42 Guidelines on Network Security Testing.
  • Health Information Portability and Accountability Act (HIPAA)
  • Federal Financial Institutions Examination Council (EFIEC) Information Technology Examination.
  • Open Source Security Testing Methodology Manual (OSSTMM).
  • Exposure and Sensitivity
  • Identify Indicators and Exposure
  • Sensitivity and Adaptive Capacity
  • Potential Impacts and Adaptive Capacity

About Clear My Certification

Check Also

Information Technology Management Professional CertificatioN

Information Technology Management Professional Certification

Information Technology Management Professional Certification Information Technology Management involves overseeing and directing the use of …

Leave a Reply

Your email address will not be published. Required fields are marked *