In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it. Show
Enroll on Coursera All Quiz Answers of Cybersecurity Foundations for Risk Management Week 02 Quiz AnswersQuiz for the Introduction to Cybersecurity Module 1.1 Quiz AnswersQ1. Which of the following is not a term that is part of the history of cybersecurity?
Q2. Which of these is the best definition of cybersecurity?
Q3. Which if these is not one of the identified good security practices?
Key Concepts in Cybersecurity – Part 1 (Quiz 1.1.2) Quiz AnswersQ1. The three core characteristics of information are what give it value. Which of these is not one of those characteristics?
Q2. In the context of cybersecurity, _____ is the right of the individual or group to protect themselves and their information from unauthorized access.
Q3. A threat to privacy is information ______ where adversaries assemble of a portfolio of information from a number of different sources which can be assembled to create a more complete picture of an individual.
Key Concepts in Cybersecurity – Part 2 (Quiz 1.1.3) Quiz AnswersQ1. _____ are those information-based items of value to the organization.
Q2. _____ are events or circumstances that have the potential to adversely affect operations and assets.
Q3. A technique used to compromise a system is known as a(n) ____.
All Quiz Answers of Cybersecurity Foundations for Risk Management Week 03 Quiz AnswersThreats to Cybersecurity – Module 1.2 Quiz AnswersQ1. Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) ______.
Q2. The creation, ownership, and control of original ideas, as well as the representation of those ideas, is known as _____.
Q3. When power is interrupted for a long term (called an outage) it is called a _____.
Forces of Nature, Human Error or Failure & Information Extortion (Quiz 1.2.2) Quiz AnswersQ1. Forces of _____ are also known as force majeure, or acts of God, includes natural disasters, fires, floods, earthquakes, lightning strikes.
Q2. When an employee or other stakeholder of an organization, makes a mistake, that’s called _____.
Q3. If someone tricks a user into sharing their credentials, by pretending to be someone that the user would trust that’s called _____.
Sabotage or vandalism, Software attacks & Technical hardware failures (Quiz 1.2.3) Quiz AnswersQ1. The threat category known as _____ includes malware such as viruses, worms, macros, as well as denial of service attacks and script injections.
Q2. _____ software looks like legitimate software but is either malware in disguise or legitimate software embedded with malware
Q3. An attack that attempts to overwhelm a computer target’s ability to handle incoming communications is known as _____.
Technical Hardware Failure, Technical Software Failure, Technological Obsolescence, and Theft (Quiz1.2.4) Quiz AnswersQ1. The category of threat that represents a situation where, for some reason, our technology equipment fails is known as _____.
Q2. The category of threat that represents a situation where, for some reason, our programming or operating systems fail is known as _____.
Q3. The category of threat that represents a situation where we must rely on technology that cannot be easily replaced is known as _____.
All Quiz Answers of Cybersecurity Foundations for Risk Management Week 04 Quiz AnswersCybersecurity Management (Module Quiz 1.3) Quiz AnswersQ1. In a manager’s decisional role they _____.
Q2. Management and leadership are interchangeable and have the same necessary skills.
Q3. Controlling is _____.
Cybersecurity Roles and Responsibilities – Lesson 1.3.2 Quiz AnswersQ1. Cybersecurity professionals have to have _____.
Q2. The _____ develops the strategic plans for the cybersecurity function.
Q3. The job with the title of _____ is frequently called on to manage the day-to-day operations of security technology as well as to assist in training programs, developing policies.
Cybersecurity Governance – Lesson Quiz AnswersQ1. The responsibility for the entire cybersecurity program should rests solely on the CISO or VP for Cybersecurity.
Q2. In recent years, there is a strong trend to make cybersecurity the responsibility of _____.
Q3. _____ is an approach to cybersecurity management requiring direct oversignt by the board of directors or senior management.
Planning for Cybersecurity (Lesson Quiz 1.3.4) Quiz AnswersQ1. What is a system development lifecycle or SDLC approach?
Q2. The _____ phase of the SecSDLC begins with instructions from upper management specifying the process, outcomes, and goals of the project as well as its budget and other constraints.
Q3. The _____ phase of the SecSDLC is where the components of the recommended program are acquired, tested, implemented, and retested.
Planning for Cybersecurity Contingencies (Lesson Quiz 1.3.5) Quiz AnswersQ1. What are ‘non-normal’ operations?
Q2. Contingency planning is accomplished with all of the following except _____.
Q3. Crisis management planning is focused on the _____.
All Quiz Answers of Cybersecurity Foundations for Risk Management Week 05 Quiz AnswersUnderstanding Cybersecurity Risk and Risk Management Module Quiz AnswersQ1. In cybersecurity, risk is focused on the loss of confidentiality, integrity, and availability of information assets.
Q2. The probability that a specific vulnerability within an organization will be attacked by a threat is called _____.
Q3. The consequence of a loss from the outcome of a successful attack on an information asset, known as the “magnitude of harm” is known as the _____.
Understanding Risk Management (Lesson Quiz 1.4.2) Quiz AnswersQ1. _____ can be defined as the quantity and nature of risk that the organization is willing to accept as it evaluates the trade-offs between security and accessibility.
Q2. _____ can be defined as the risk you have left after you’re done reducing risk to an acceptable level.
Q3. In the risk management methodology, finding where and what is the risk is known as _____.
Risk Management Team Roles and Responsibilities (Lesson Quiz 1.4.3) Quiz AnswersQ1. The _____ is a high-level executive who can ensure that all subordinate managers will support the effort, without territory disputes, in-fighting, and other political games that can jeopardize the program.
Q2. The team that will perform the risk management assessment and recommends remediations, where shortcomings are found is known as the _____ team.
Q3. Threat assessment – also known as threat intelligence is used to review the valuation of the assets that may be at risk.
Final Course Assessment Quiz AnswersSome Questions of Final Course Assessment Quiz is already covered in the above module quiz, use ctrl+f to find questions instantly. Q1. A(n) _____ is an instance of an information asset suffering damage or destruction, unintended or unauthorized modification or disclosure, or denial of use.
Q2. Potential weaknesses in an asset or its defensive control systems are known as _____. Q3. _____ is the unauthorized entry into the real or virtual property of another party.
Q4. If an adversary can increase their level of access by changing the type of access they have from user, to administrator, that’s called _____.
Q5. When an adversary steals your information, then tries to blackmail you into paying for it’s return it is known as _____.
Q6. _____ are malicious software elements designed to infect a user’s computer and either steal information and send it to the attacker, or damage, destroy or deny service to the computers.
Q7. An attack in which an attacker intercepts a communications stream between two users or systems and inserts himself in the conversation is known as a(n) _____ attack.
Q8. Which of these is not one of the three general categories of Cybersecurity policy?
Q9. Those cybersecurity professional that define cybersecurity can_____.
Q10. Thos cybersecurity proffessional that build cybersecurity can _____.
Q11. Cybersecurity governance, if properly implemented, can yield _____ benefits
Q12. The ISO 27014:2013 is the ISO 27000 series standard for _____.
Q13. Where does the name ‘waterfall model’ come from?
Q14. The BIA is also known as the _____.
Q15. Crisis management planning is focused on the _____.
Cybersecurity Foundations for Risk Management Coursera Course Review:In our experience, we suggest you enroll in the Cybersecurity Foundations for Risk Management courses and gain some new skills from Professionals completely free and we assure you will be worth it. Cybersecurity Foundations for Risk Management course is available on Coursera for free, if you are stuck anywhere between quiz or graded assessment quiz, just visit Networking Funda to get Cybersecurity Foundations for Risk Management Quiz Answers. Conclusion:I hope these Cybersecurity Foundations for Risk Management Quiz Answers would be useful for you to learn something new from this Course. If it helped you then don’t forget to bookmark our site for more Coursera Quiz Answers. This course is intended for audiences of all experiences who are interested in learning about new skills in a business context; there are no prerequisite courses. Keep Learning! Get All Quiz Answers of Cybersecurity Risk Management Frameworks SpecializationCybersecurity Foundations for Risk Management Quiz Answers A General Approach to Risk Management Coursera Quiz Answers Dominant Risk Management Standards and Frameworks Quiz Answers Implementing a Risk Management Framework Coursera Quiz Answers Which one of the following elements of an information security policy framework does not contain mandatory requirements for employees?Which one of the following security policy framework components does not contain mandatory guidance for individuals in the organization? Explanation: Guidelines are the only element of the security policy framework that are optional.
Which of the following are the two general groups into which SysSPs can be separated?SysSPs can be separated into two general components, managerial guidance and technical specifications.
What are security policies quizlet?A security policy defines "secure" for a system or a set of systems. Definition 4-1. Security Policy. A security policy is a statement that partitions the states of the system into a set of authorized, or secure, states and a set of unauthorized, or nonsecure, states.
What is the Seta program designed to do?Security education, training and awareness (SETA) programs are designed to reduce the incidence of accidental security breaches.
|