Book Appointment Now

Cybersecurity Roles, Processes & Operating System Security Quiz Answers

All Weeks Cybersecurity Roles, Processes & Operating System Security Quiz Answers

Cybersecurity Roles, Processes & Operating System Security Week 01 Quiz Answers

Welcome to People, Process and Operating System Fundamentals for Cybersecurity

Q1. In the video Welcome to People, Process and Operating System Fundamentals for Cybersecurity, Alex mentions especially needing which two (2) technical skills and which two (2) soft skills ?

  • Effective Communications and Critical Thinking
  • Firewalls and Antivirus

Q2. The statement: “The protection of computer systems from theft or damage to the hardware, software or information on them, as well as from disruption or misdirection of the services they provide.” Is a good definition for what ?

  • IT Security

Quiz-02 Frameworks, Policies and Roles


Q1. When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and frameworks ?

  • They seek to improve performance, controls and metrics.
  • They help translate the business needs into technical or operational needs.
  • They are used to improved controls, methodologies and governance for the IT department.

Q2. Which three (3) of these roles would likely exist in an Information Security organization ?

  • CISO, Chief Information Security Officer
  • Information Security Architect
  • Vulnerability Assessor

Quiz-03 Business Process Management and IT Infrastructure Library Basics


Q1. In the video Introduction to Process, which three (3) items were called out as critical to the success of a Security Operations Center (SOC) ?

  • Tools
  • People
  • Process

Q2. Process performance metrics typically measure items in which four (4) categories ?

  • Rework
  • Cost
  • Quality (defect rate)
  • Cycle time

Q3. Service Portfolio Management, Financial Management, Demand Management and Business Relationship Management belong to which ITIL Service Lifecycle Phase ?

  • Service Strategy

Q4. Log, Assign, Track, Categorize, Prioritize, Resolve and Close are all steps in which ITIL process ?

  • Incident Management

Quiz-04 People, Process and Technology

Q1. The process in ITIL where changes are released to an IT environment is called what ?

  • Release Management

Q2. Which two (2) processes are operational processes? (Select 2)

  • Incident Management
  • Change Management

Q3. Which two (2) of these are considered best practices? (Select 2)

  • ITIL
  • Project Manager methodologies

Q4. Which service management process has the responsibility of understanding the root cause of a problem ?

  • Problem Management

Q5. In the video What is IT Security, Elio Sanabria Echeverria put forth a definition that included which factors ?

  • All of the above.

Q6. This description belongs to which information security role? “This position is in charge of testing the effectiveness of computer information systems, including the security of the systems and reports their findings.”

  • Information Security Auditor

Q7. Which of these statements more accurately conveys what was stated in the video Introduction to Process ?

  • As volumes of security alerts and false positives grow, more burden is placed upon Security Analysts & Incident Response teams.

Cybersecurity Roles, Processes & Operating System Security Week 02 Quiz Answers

Further discussion of confidentiality, integrity and availability

Q1. In the Alice, Bob and Trudy examples, who is always portrayed as the intruder ?

  • Trudy

Q2. Which aspect of the CIA Triad would cover preserving authorized restrictions on information access and disclosure ?

  • Confidentiality

Q3. A message that Bob receives from Alice is genuine and can be verified as such demonstrates which key property ?

  • Authenticity

Quiz 02 Principles of the CIA Triad

Q1. The unauthorized disclosure of information would violate which aspect of the CIA Triad ?

  • Confidentiality

Q2. Which aspect of the CIA Triad would cover ensuring information non-repudiation and authenticity ?

  • Integrity

Q3. If Trudy intercepts and reads a message that Alice is sending to Bob, and then she deletes it without allowing it to be delivered, which 2 aspects of the CIA Triad have been violated ?

  • Availability & Confidentiality

Quiz 03 What is AAA ?

Q1. Which is the correct order for gaining access to a resource ?

  • Identification, Authentication, Authorization, Accountability

Q2. Which type of method would include Something you know, such as a password ?

  • Authentication

Quiz 04 Access Control

Q1. Which three (3) are common methods of access control ?

  • Role Based Access Control (RBAC)
  • Discretionary Access Control (DAC)
  • Mandatory Access Control (MAC)

Q2. Which three (3) items would be considered Physical Access Control methods ?

  • Perimetral
  • Building
  • Work areas

Authentication and Access control

Q1. Identify the three (3) security functions associated with AAA.

  • Authorization
  • Accountability (Accounting)
  • Authentication

Q2 . Which statement best describes DAC (Discretionary Access Control) ?

  • Each object (folder or file) has an owner and the owner defines the rights and privilege.

Q3. Which is an example of technical uses of physcial security controls ?

  • All of the above.

Q4. Name one of the three control types.

  • Technical

Q5 . Which of the following is NOT an authentication method ?

  • Something you get

Q6. Hamid has access to certain resources because he is a Quality Control Inspector and he has access to other resources because he is the manager of that team. Which form of access control is his company most likely using ?

  • Role Based Access Control (RBAC)

Q7. Which two (2) of these are useful tools used to monitor network access control processes ?

  • Sniffers
  • HoneyPots

Cybersecurity Roles, Processes & Operating System Security Week 03 Quiz Answers

User and Kernel Modes

Q1. How many unique address spaces are used by applications running in kernel mode ?

  • 1

Quiz 02 File Systems and Directory Structure

Q1. Which two (2) of these file systems could you use to format a 64 GB USB drive ?

  • NTFS
  • FAT32

Q2. Where does Windows 10 store 64-bit applications ?

  • \Program Files
  • Shortcuts and Commands

Q3. Which shortcut will close all applications ?

  • Alt+F4

Q4. What is the shortcut for saving a screenshot ?

  • Win+PrtScn

Quiz 03 Shortcuts and Commands


Q1. Which shortcut will close all applications ?

  • Alt+F4

Q2. What is the shortcut for saving a screenshot ?

  • Win+PrtScn

Windows Operating System Security Basics


Q1. What Windows mode do users interact with directly ?

  • User mode

Q2. What does Windows create every time an applications is started in user mode ?

  • A process.

Q3. If you are setting up a new Windows laptop with a 128Gb hard drive and you want only a single file partition on the drive, which file systems can choose from ?

  • NTFS

Q4. A file name in Windows must be unique where ?

  • Within the same directory.

Q5. Windows 10 can be purchased for which versions ?

  • 32 bit or 64 bit.

Q6. If you want to roll back or undo an action, what shortcut should you use ?

  • Ctrl-Z

Q7. Which shortcut will switch between running applications ?

  • Alt-Tab

Q8. Where does Windows 10 store 32-bit applications ?

  • \Program Files (x86)

Q9. What is the shortcut to open the Task Manager

  • Ctrl+Shift+Esc

Quiz 04 Key Components


Q1. Which three (3) statements about Linux are True ?

  • Linux guarantees end users freedom to run, study, share, and modify the software.
  • Linux is an open source operating system.
  • Linux is licensed under the General Public License (GNU).

File systems


Q1. Executable files such as ping, grep and cp are stored in which directory ?

  • /bin

Linux Basic Commands


Q1. The Linux “kill” command does which of the following ?

  • Stop an executing process.

Q2. What permissions can be set on a file in Linux ?

  • read, write, execute

Q3. Which basic Linux command deletes an empty directory ?

  • rmdir

Q4. Which is not a group that can own a file ?

  • anybody

Linux Operating System security basics\


Q1. Which three (3) groups can “own” a file in Linux ?

  • user, group, everybody

Q2. What can be known about a file with permissions set to “-rwxr-x-r–” ?

  • The file is not a directory; the user can read, write and execute the file; the group cannot modify the file, and others not in the group an read it only.

Q3. A person using Linux would normally interact directly with which ?

  • The shell.

Q4. In the Linux file system, what is the highest level in the directory structure ?

  • root

Q5. In Linux, a directory is a special type of ____.

  • file

Q6. What does the nano command do ?

  • nano is a basic text file editor.

Q7. Application configuration files are usually stored in which directory ?

  • /etc

macOS Resources Knowledge Check


Q1. What application can you use to see all the active running applications and processes on macOS ?

  • Activity Monitor

Q2. What feature in macOS prevents unauthorized applications from being installed ?

  • Gatekeeper

Q3. Which three (3) utilities are found when booting macOS to the recovery partition? (Select 3)

  • Safari
  • Time Machine
  • Disk Utility

Cybersecurity Roles, Processes & Operating System Security Week 04 Quiz Answers

Virtualization Basics and Cloud Computing

Q1. Where does the hypervisor sit in a virtual architecture ?

  • Between the hardware and the operating system(s).

Q2. Which are the first two steps to perform in a cloud deployment ?

  • Consolidate and Virtualize

Q3. Which are the three (3) most common forms of Cloud computing ?

  • Hybrid Cloud
  • Public Cloud
  • Private Cloud

Q4. Which type of cloud is the best choice for a start-up company with no existing IT infrastructure and limited funds ?

  • Public Cloud

Q5. Which three (3) are the primary benefits of cloud computing ?

  • Efficiency
  • Flexibility
  • Strategic Value

Q6. Which is a primary security consideration in a cloud environment ?

  • All of the above.

Quiz 02 Virtualization Basics


Q1. Virtualization allows you to create multiple simulated environments or dedicated resources from how many physical hardware systems ?

  • 1

Q2. What relays requests from the VM to the actual hardware ?

  • hypervisor

Q3. Which two steps of a cloud deployment are performed after you move your applications to the cloud ?

  • Integrate and Optimize

Q4. Which type of cloud is the best choice for a company with a robust existing IT infrastructure and very serious data privacy concerns ?

  • Private Cloud

Q5. Which is a primary security consideration in a cloud environment ?

  • All of the above.

All Course Quiz Answers of IBM Cybersecurity Analyst Professional Certificate

Course 01: Introduction to Cybersecurity Tools & Cyber Attacks

Course 02: Cybersecurity Roles, Processes & Operating System Security

Course 03: Cybersecurity Compliance Framework & System Administration

Course 04: Network Security & Database Vulnerabilities

Course 05: Penetration Testing, Incident Response, and Forensics

Course 06: Cyber Threat Intelligence

Course 07: Cybersecurity Capstone: Breach Response Case Studies

Course 08: IBM Cybersecurity Analyst Assessment

Share your love

Newsletter Updates

Enter your email address below and subscribe to our newsletter

Leave a Reply

Your email address will not be published. Required fields are marked *