Cybersecurity for Data Science Coursera Quiz Answers

Get All Weeks Cybersecurity for Data Science Coursera Quiz Answers

Week 01: Cybersecurity for Data Science Coursera Quiz Answers

Week 1: Basic Cybersecurity Concepts and Principles

What are the basic principles of the CIA? Please select all that apply.

  • Confidentiality
  • Availability
  • Integrity
  • Agility

What does CIA stand for in terms of cybersecurity?

  • Caution, Intention and Availability
  • Confidentiality, Integrity and Availability
  • Confidence, Integration and Awareness
  • Confidentiality, Intentionality and Availability

What does integrity mean?

  • Only specific people have access to and modify data
  • How data is maintained
  • When a user can access data

What does confidentiality deal with?

  • Only specific people have access to and modify data
  • How data is maintained
  • When a user can access data

What is the closest meaning to availability in the CIA triad?

  • Access to the data by authorized users
  • Keeping the data private
  • Making sure the data is maintained well

What shape is the CIA triad visual?

  • C​ircle
  • S​quare
  • T​riangle
  • Why is the CIA triad important?
  • It is a fundamental pillar of confidentiality
  • It helps the FBI do its job

It is the foundation of understanding cybersecurity

  • Who should data be available to?
  • Your answer cannot be more than 10000 characters.

Who created the CIA triad?

  • The CIA triad does not have a single creator
  • Ben Miller
  • Al Pisano
  • The CIA

Can you think of an example of confidentiality?

  • Your answer cannot be more than 10000 characters.

Week 02: Cybersecurity for Data Science Coursera Quiz Answers

Week 2: Your Cyber Story and Your Public Data Profile

What is cryptography?

  • A method for protecting information and communications through codes
  • A fundamental piece of the CIA Triad
  • A social engineering tool hackers use

How does cryptography relate to cybersecurity?

  • Your answer cannot be more than 10000 characters.

What aspect can make long passwords less successful?

  • Accessability
  • Confidentiality
  • Social engineering

What goes into a secure password?

  • Your answer cannot be more than 10000 characters.

True or false, an easy to remember password like “1,2,3,4” is more secure than a complex password.

  • True
  • F​alse

A password is only as good as…

  • The organization storing them
  • The set of numbers it contains
  • How many characters it is made up of

How can a company store a password more securely?

  • Store it in plain text
  • Encrypt it
  • Create a new one to store it behind

What do you call a person who practices cryptography?

What searches should you do when exploring your cyberstory?

  • Name or Email address search
  • Image search
  • type my password in a search engine
  • check HaveIBeenPwned website

What are the main standards of cryptography?

  • Confidentiality, Integrity, Non-repudiation and Authentication
  • Confidentiality, Integrity and Awareness
  • Confidence, Non-repudiation and Integrity
  • Awareness, Integrity and Authentication

Week 03: Cybersecurity for Data Science Coursera Quiz Answers

Week 3: Wifi, IoT, Hacking, Data Breaches and Social Engineering

What does IoT stand for?

What is the IoT?

  • Your answer cannot be more than 10000 characters.

What is an example of social engineering?

  • Phishing
  • Hunting
  • Breaking into a secure system

How does social engineering fit into cyber security?

  • Your answer cannot be more than 10000 characters.

True or false, all hacking is bad.

  • T​rue
  • F​alse

What is a white hat hacker?

  • A hacker that helps an organization learn what its vulnerabilities are, with the knowledge of the organization.
  • A hacker who breaks into a system without the knowledge of the organization
  • A hacker who steals data without information

What is a black hat hacker?

  • Hackers who are doing damage and hacking unethically
  • Hackers who help organizations learn about their vulnerabilities
  • Hackers who are between ethical lines

What is a grey hat hacker?

  • They are between ethical and unethical hacking
  • They are deliberately harming people with their hacking
  • They are helping organizations learn about their vulnerabilities with the organization’s permission

What is the benefit of something getting hacked?

  • An individual can file and insurance claim
  • An organization gets new data
  • The hacker makes money
  • Organizations learn where their vulnerabilities are
  • How does social engineering connect to hackers?
  • Hackers use social engineering to steal people’s data
  • Hackers use social engineering to break into organizations’ data
  • Social engineering is a key tool for hackers to use

How does social engineering connect to hackers?

  • Hackers use social engineering to steal people’s data
  • Hackers use social engineering to break into organizations’ data
  • Social engineering is a key tool for hackers to use
  • A​ll of the above

Week 04: Cybersecurity for Data Science Coursera Quiz Answers

Week 4: The Ethics of Cyber Security

What is facial recognition as it relates to cybersecurity(please select all that apply)?

  • Seeing somebody in a crowd
  • Mining photos on the internet
  • Somebody’s password
  • Security cameras capturing your face

How does facial recognition fit into cybersecurity?

  • A photo of your face can impact privacy
  • A photo of your face is still data
  • Facial recognition can help hackers guess your password

Can you foresee any ethical conflicts occuring with facial recognition?

  • Your answer cannot be more than 10000 characters.

What is the utility does LinkedIn have for professional use?

  • Connecting with experts in your field
  • Learning more about areas of interest
  • Learning about new data science developments
  • A​ll of the above.

What is the utility of Twitter for professional use?

  • Messaging friends
  • Sending memes
  • Learning about experts’ findings

Why is facial recognition more difficult to trace than other data?

  • The data is collected from various different sources
  • The data is stored on one major, secure computer
  • It is hard to recognize individual faces

What animal was being studied in the Netflix show called “Connection?”

  • C​ows
  • D​olphins
  • C​ats
  • P​igs

Who do you think owns facial recognition data?

  • Your answer cannot be more than 10000 characters.

What are the two primary ways Kade Crockford says governments use this type of technology?

What is the difference between facial recognition and face surveillance?

  • Your answer cannot be more than 10000 characters.
Get All Weeks Vital Skills for Data Science Specialization

Data Science as a Field Coursera Quiz Answers

Ethical Issues in Data Science Coursera Quiz Answers

Cybersecurity for Data Science Coursera Quiz Answers

Fundamentals of Data Visualization Coursera Quiz Answers

Leave a Reply

Your email address will not be published. Required fields are marked *

error: Content is protected !!