Coursera Foundations of Cybersecurity: End of Module 1 Quiz
Fill in the blank: The purpose of __________ is to protect networks, devices, people, and data from unauthorized access or criminal exploitation. A. cybersecurity B. business continuity C. change-management D. planning
*A. cybersecurity*
Someone outside of an organization attempts to gain access to its private information. What type of threat does this scenario describe? A. External B. Ethical C. Accidental D. Internal
*A. External*
What is identity theft? A. Stealing personal information to commit fraud while impersonating a victim B. Failing to maintain and secure user, customer and vendor data C. A data breach that affects an entire organization D. Trying to gain access to an organization's private networks
*A. Stealing personal information to commit fraud while impersonating a victim*
Which one of the following statements accurately describe personally identifiable information (PII) and sensitive personally identifiable information (SPII)? Select all that apply. A. The theft of PII is often more damaging than the theft of SPII. B. An example of SPII is someone's financial information. C. An example of PII is someone's date of birth. D. Both PII and SPII are vulnerable to identity theft.
*B. An example of SPII is someone's financial information. C. An example of PII is someone's date of birth. D. Both PII and SPII are vulnerable to identity theft.*
A security professional receives an alert about an unknown user accessing a system within their organization. They attempt to identify, analyze, and preserve the associated criminal evidence. What security task does this scenario describe? A. Programming with code B. Computer forensics C. Software upgrades D. Resolving error messages
*B. Computer forensics*
Fill in the blank: Security Information and Event _________________ (SIEM) tools enable security professionals to identify and analyze threats, risks, and vulnerabilities. A. Maturity B. Mitigation C. Management D. Monitoring
*C. Management*
What occurs during a security audit? A. Ethical hacking of an organization's internal network to identify vulnerabilities B. Prioritizing tasks, processes and procedures C. Review of an organization's security records, activities, and other related documents D. Analyzing the efficiency of an organization's internal network
*C. Review of an organization's security records, activities, and other related documents*
An individual is in their first job as an entry-level security professional. They apply the problem-solving proficiencies that they learned in past roles to their current security career. What does this scenario describe? A. Understanding business standards B. Having expertise with a specific procedure C. Using transferrable skills D. Taking on-the-job training
*C. Using transferrable skills*
What is regulatory compliance? A. Expenses and fines associated with vulnerabilities B. Threats and risks from employees and external vendors C. Sites and services that require complex passwords to access D. Laws and guidelines that require implementation of security standards
*D. Laws and guidelines that require implementation of security standards*
