Tuesday , December 24 2024
Breaking News

Introduction to Cybersecurity Tools & Cyber Attacks Week 2 Quiz Answers

WEEK 2: Introduction to Cybersecurity Tools & Cyber Attacks Quiz Answers Coursera

Types of actors and their motives Quiz Answers Coursera

  • Internal
  • Hackers
  • White Hats
  • Black Hats
  • Security Analysts
  • Hactivists
  • Governments
  • Political action and movements
  • Hire me!
  • Just playing around
  • Money
  • Canada
  • Venezuela
  • Israel
  • United States
  • China
  • Syrian Electronic Army
  • Fancy Bears
  • The Ponemon Institute
  • Guardians of Peace
  • Anonymous
  • 2011 Sony Playstation hack
  • 2013 Singapore Cyberattacks
  • 2014 Ebay hack
  • 2015 Target Stores hack
  • 2016 US Election hack

An Architect’s perspective on attack classifications Quiz Answers Coursera

  • Passive attacks are hard to detect because the original message is delivered unchanged and can pass an integrity check.
  • Passive attacks are hard to detect because the original message is never delivered so the receiving does not know they missed anything.
  • Passive attacks are easy to detect because the original message wrapper must be modified by the attacker before it is forwarded on to the intended recipient.
  • Passive attacks are easy to detect because of the latency created by the interception and second forwarding.
  • Often replicate functions found in physical documents
  • Enhance security of data processing systems and information transfer.
  • Includes any component of your security infrastructure that has been outsourced to a third-party
  • Are intended to counter security attacks.
  • Prevention of unauthorized use of a resource
  • Protection against the unauthorized disclosure of data
  • Protection against denial by one of the parties in communication
  • Assurance that the communicating entity is the one claimed
  • Data transmission speeds
  • Access Control
  • Authentication
  • Data Confidentiality
  • Transmission cost sharing between member countries
  • Security Mechanism
  • Business Policy
  • Security Architecture
  • Security Policy
  • Society’s increasing dependance on computers.
  • The desire by a number of organizations to use OSI recommendations.
  • New requirements from the WTO, World Trade Organization
  • The appearence of data protection legislation in several countries.
  • True
  • False
  • True
  • False
  • Passive attack
  • Security architecture attack
  • Masquerade attack
  • Origin attack

Malware and an introduction to threat protection Quiz Answers Coursera

  • True
  • False
  • Virus
  • Worms
  • Trojan Horses
  • Spyware
  • Adware
  • Ransomware
  • Virus
  • Worms
  • Spyware
  • Adware
  • A botnet
  • A keylogger
  • Logic Bombs
  • Trojan Horses
  • Technical controls
  • Administrative controls
  • Active controls
  • Passive controls

Additional Attack examples today Quiz Answers Coursera

  • Record traffic entering the network
  • Look for suspicious activity like IP addresses or ports being scanned sequentially.
  • Use a host scanner and keep an inventory of hosts on your network.
  • All of the above.
  • Promiscuous
  • Sniffer
  • Inspection
  • Open
  • Ingress filtering
  • Enable IP Packet Authentication filtering
  • Keep your certificates up-to-date
  • Enable the IP Spoofing feature available in most commercial antivirus software.
  • All of the above.
  • Use traceback to identify the source of the flooded packets.
  • Enable packet filtering on your firewall.
  • Implement a filter to remove flooded packets before they reach the host.
  • Enable the DOS Filtering option now available on most routers and switches.
  • Maintain an accurate inventory of of computer hosts by MAC address.
  • Use a host scanning tool to match a list of discovered hosts against known hosts.
  • Investigate newly discovered hosts.
  • All of the above.

Attacks and Cyber resources Quiz Answers Coursera

  • Command and Control
  • Delivery
  • Activation
  • Installation
  • Spectra
  • Vishing
  • Phishing
  • Cyberwarfare
  • Logging in to the Army’s missle command computer and launching a nuclear weapon.
  • Setting up a web site offering free games, but infecting the downloads with malware.
  • Calling an employee and telling him you are from IT support and must observe him logging into his corporate account.
  • Sending someone an email with a Trojan Horse attachment.
  • False
  • True

 A day in the life of a SOC analyst Quiz Answers Coursera

  • SIEM (Security Information and Event Management)
  • Packet Sniffers
  • Firewalls
  • Intrusion detection software

A brief overview of types of actors and their motives Quiz Answers Coursera

  • Fancy Bears
  • Anonymous
  • Syrian Electronic Army
  • Guardians of the Peace
  • All of the above
  • Enhanced espionage from more countries
  • Far more advanced malware
  • New consumer technology to exploit
  • All of the above
  • SWIFT is the protocol used by all banks to transfer money
  • SWIFT is the protocol used by all US healthcare providers to encrypt medical records
  • SWIFT is the protocol used to transmit all diplomatic telegrams between governments around the world
  • SWIFT is the flight plan and routing system used by all cooperating nations for international commercial flights
  • Assurance that the communicating entity is the one claimed
  • Protection against denial by one of the parties in communication
  • Assurance that a resource can be accessed and used
  • Prevention of unauthorized use of a resource
  • Contingent security mechanism
  • External security mechanism
  • Active security mechanism
  • Passive security mechanism
  • A malicious threat
  • An attack
  • An active threat
  • An open case
  • Advanced Persistent Threat
  • Water Hole
  • Spectra
  • Denial of Service (DOS)
  • Request to make a payment
  • Attorney impersonation
  • CEO Fraud, where CEO sends email to an employee
  • Account compromise
  • Hactivists
  • Governments
  • Hackers
  • Internal
  • Black Hats
  • Internal
  • Hackers
  • Hactivist
  • Security Analysts
  • Canada
  • Israel
  • South Africa
  • Egypt
  • The Ponemon Institute
  • Fancy Bears
  • Syrian Electronic Army
  • Anonymous
  • Guardians of the Peace
  • Hackers
  • Government
  • Hactivists
  • Internal
  • False
  • True
  • True
  • False
  • Business Policy
  • Specific security mechanisms
  • Pervasive security mechanisms
  • Security Policy
  • Security Policy
  • Specific security mechanisms
  • Business Policy
  • Pervasive security mechanisms
  • False
  • True
  • An origin attack
  • A passive attack
  • A masquerade attack
  • An active attack
  • Spyware
  • Adware
  • Worm
  • Virus
  • Trojan Horse
  • Ransomware
  • Distribution of Spam
  • DDoS attacks
  • Phishing attacks
  • Distribution of Spyware
  • As a Malware launchpad
  • All of the above
  • Active controls
  • Technical controls
  • Administrative controls
  • Passive controls
  • Packet Sniffing
  • Host Insertion
  • Trojan Horse
  • Ransomware
  • All of the above
  • A Denial of Service (DOS) attack
  • A Trojan Horse
  • A Masquerade attack
  • A Ransomware attack
  • A Social Engineering attack
  • A Trojan Horse
  • A Denial of Service attack
  • A Worm attack
  • False
  • True

About Clear My Certification

Check Also

Information Technology Management Professional CertificatioN

Information Technology Management Professional Certification

Information Technology Management Professional Certification Information Technology Management involves overseeing and directing the use of …

Leave a Reply

Your email address will not be published. Required fields are marked *