Saturday , July 27 2024
Breaking News

Introduction to Cybersecurity Tools & Cyber Attacks Week 2 Quiz Answers

WEEK 2: Introduction to Cybersecurity Tools & Cyber Attacks Quiz Answers Coursera

Types of actors and their motives Quiz Answers Coursera

  • Internal
  • Hackers
  • White Hats
  • Black Hats
  • Security Analysts
  • Hactivists
  • Governments
  • Political action and movements
  • Hire me!
  • Just playing around
  • Money
  • Canada
  • Venezuela
  • Israel
  • United States
  • China
  • Syrian Electronic Army
  • Fancy Bears
  • The Ponemon Institute
  • Guardians of Peace
  • Anonymous
  • 2011 Sony Playstation hack
  • 2013 Singapore Cyberattacks
  • 2014 Ebay hack
  • 2015 Target Stores hack
  • 2016 US Election hack

An Architect’s perspective on attack classifications Quiz Answers Coursera

  • Passive attacks are hard to detect because the original message is delivered unchanged and can pass an integrity check.
  • Passive attacks are hard to detect because the original message is never delivered so the receiving does not know they missed anything.
  • Passive attacks are easy to detect because the original message wrapper must be modified by the attacker before it is forwarded on to the intended recipient.
  • Passive attacks are easy to detect because of the latency created by the interception and second forwarding.
  • Often replicate functions found in physical documents
  • Enhance security of data processing systems and information transfer.
  • Includes any component of your security infrastructure that has been outsourced to a third-party
  • Are intended to counter security attacks.
  • Prevention of unauthorized use of a resource
  • Protection against the unauthorized disclosure of data
  • Protection against denial by one of the parties in communication
  • Assurance that the communicating entity is the one claimed
  • Data transmission speeds
  • Access Control
  • Authentication
  • Data Confidentiality
  • Transmission cost sharing between member countries
  • Security Mechanism
  • Business Policy
  • Security Architecture
  • Security Policy
  • Society’s increasing dependance on computers.
  • The desire by a number of organizations to use OSI recommendations.
  • New requirements from the WTO, World Trade Organization
  • The appearence of data protection legislation in several countries.
  • True
  • False
  • True
  • False
  • Passive attack
  • Security architecture attack
  • Masquerade attack
  • Origin attack

Malware and an introduction to threat protection Quiz Answers Coursera

  • True
  • False
  • Virus
  • Worms
  • Trojan Horses
  • Spyware
  • Adware
  • Ransomware
  • Virus
  • Worms
  • Spyware
  • Adware
  • A botnet
  • A keylogger
  • Logic Bombs
  • Trojan Horses
  • Technical controls
  • Administrative controls
  • Active controls
  • Passive controls

Additional Attack examples today Quiz Answers Coursera

  • Record traffic entering the network
  • Look for suspicious activity like IP addresses or ports being scanned sequentially.
  • Use a host scanner and keep an inventory of hosts on your network.
  • All of the above.
  • Promiscuous
  • Sniffer
  • Inspection
  • Open
  • Ingress filtering
  • Enable IP Packet Authentication filtering
  • Keep your certificates up-to-date
  • Enable the IP Spoofing feature available in most commercial antivirus software.
  • All of the above.
  • Use traceback to identify the source of the flooded packets.
  • Enable packet filtering on your firewall.
  • Implement a filter to remove flooded packets before they reach the host.
  • Enable the DOS Filtering option now available on most routers and switches.
  • Maintain an accurate inventory of of computer hosts by MAC address.
  • Use a host scanning tool to match a list of discovered hosts against known hosts.
  • Investigate newly discovered hosts.
  • All of the above.

Attacks and Cyber resources Quiz Answers Coursera

  • Command and Control
  • Delivery
  • Activation
  • Installation
  • Spectra
  • Vishing
  • Phishing
  • Cyberwarfare
  • Logging in to the Army’s missle command computer and launching a nuclear weapon.
  • Setting up a web site offering free games, but infecting the downloads with malware.
  • Calling an employee and telling him you are from IT support and must observe him logging into his corporate account.
  • Sending someone an email with a Trojan Horse attachment.
  • False
  • True

 A day in the life of a SOC analyst Quiz Answers Coursera

  • SIEM (Security Information and Event Management)
  • Packet Sniffers
  • Firewalls
  • Intrusion detection software

A brief overview of types of actors and their motives Quiz Answers Coursera

  • Fancy Bears
  • Anonymous
  • Syrian Electronic Army
  • Guardians of the Peace
  • All of the above
  • Enhanced espionage from more countries
  • Far more advanced malware
  • New consumer technology to exploit
  • All of the above
  • SWIFT is the protocol used by all banks to transfer money
  • SWIFT is the protocol used by all US healthcare providers to encrypt medical records
  • SWIFT is the protocol used to transmit all diplomatic telegrams between governments around the world
  • SWIFT is the flight plan and routing system used by all cooperating nations for international commercial flights
  • Assurance that the communicating entity is the one claimed
  • Protection against denial by one of the parties in communication
  • Assurance that a resource can be accessed and used
  • Prevention of unauthorized use of a resource
  • Contingent security mechanism
  • External security mechanism
  • Active security mechanism
  • Passive security mechanism
  • A malicious threat
  • An attack
  • An active threat
  • An open case
  • Advanced Persistent Threat
  • Water Hole
  • Spectra
  • Denial of Service (DOS)
  • Request to make a payment
  • Attorney impersonation
  • CEO Fraud, where CEO sends email to an employee
  • Account compromise
  • Hactivists
  • Governments
  • Hackers
  • Internal
  • Black Hats
  • Internal
  • Hackers
  • Hactivist
  • Security Analysts
  • Canada
  • Israel
  • South Africa
  • Egypt
  • The Ponemon Institute
  • Fancy Bears
  • Syrian Electronic Army
  • Anonymous
  • Guardians of the Peace
  • Hackers
  • Government
  • Hactivists
  • Internal
  • False
  • True
  • True
  • False
  • Business Policy
  • Specific security mechanisms
  • Pervasive security mechanisms
  • Security Policy
  • Security Policy
  • Specific security mechanisms
  • Business Policy
  • Pervasive security mechanisms
  • False
  • True
  • An origin attack
  • A passive attack
  • A masquerade attack
  • An active attack
  • Spyware
  • Adware
  • Worm
  • Virus
  • Trojan Horse
  • Ransomware
  • Distribution of Spam
  • DDoS attacks
  • Phishing attacks
  • Distribution of Spyware
  • As a Malware launchpad
  • All of the above
  • Active controls
  • Technical controls
  • Administrative controls
  • Passive controls
  • Packet Sniffing
  • Host Insertion
  • Trojan Horse
  • Ransomware
  • All of the above
  • A Denial of Service (DOS) attack
  • A Trojan Horse
  • A Masquerade attack
  • A Ransomware attack
  • A Social Engineering attack
  • A Trojan Horse
  • A Denial of Service attack
  • A Worm attack
  • False
  • True

About Clear My Certification

Check Also

Financial Derivatives and Risk Management Certificate

Get Financial Derivatives and Risk Management Certificate from The Digital Adda which you can share …

Leave a Reply

Your email address will not be published. Required fields are marked *