Get All Week Introduction to Cybersecurity Essentials Quiz Answers
Table of Contents
Introduction to Cybersecurity Essentials Week 01 Quiz Answers
Quiz 1: Common Security Threats and Risks
Q1. In cybersecurity, what does the CIA in CIA Triad refer to?
[expand title=View Answer]Confidentiality, Integrity, Availability [/expand]
Q2. When does raw data become information?
[expand title=View Answer] When it has been cleaned, refined, and organized [/expand]
Q3. Which malicious software is a virus that starts itself after identifying system weaknesses and spreads between computers and over networks?
[expand title=View Answer] Worm [/expand]
Q4. What type of malware locks the user out of their files or device, and then demands an anonymous online payment to restore access?
[expand title=View Answer] Ransomware [/expand]
Q5. Employees at your company are having a difficult time accessing the company’s website. Some employees report slow performance, and some cannot access it all. IT staff investigated and found millions of half-open connections on port 443 from thousands of different IP addresses. Which type of attack is occurring?
[expand title=View Answer]DDoS attack[/expand]
Quiz 2: Common Security Threats and Risks
Q1. What does confidentiality of data refer to?
[expand title=View Answer] Rules that restrict access only to those who need to know [/expand]
Q2. Maria has taken her college entry exam and is waiting to get her results via email. By accident, the university sent Maria’s results to Alexander. What part of the CIA Triad has been broken?
[expand title=View Answer] Confidentiality [/expand]
Q3. Your company’s Marketing team will be taking a group of people on a tour of your facility. The company has sent an email to all employees requiring them to clean all whiteboards and to make sure their desktops are cleared. What is the company trying to protect against?
[expand title=View Answer] A loss of intellectual property [/expand]
Q4. What does the acronym PII stand for?
[expand title=View Answer] Personally Identifiable Information [/expand]
Q5. David noticed an unattended laptop in a coffee shop and decided to steal it. Which of the following types of cybercrime did he commit?
[expand title=View Answer] Hardware theft [/expand]
Q6. Someone was recently caught sifting through your company’s trash looking for confidential information. Which type of security threat is this?
[expand title=View Answer] Dumpster diving [/expand]
Q7. You’ve started to notice that a co-worker sitting next to you always seems to look your way when you’re trying to enter your username and password to log onto the network. What is this co-worker doing?
[expand title=View Answer] Shoulder surfing [/expand]
Q8. You just installed a new search engine on your computer. Afterward, whenever you search the Internet, several pop-up windows appear on your screen directing you to buy products. What type of malware is installed on your machine?
[expand title=View Answer] Adware[/expand]
Q9. Your supervisor is extremely busy today and asks you to log into the HR server using her login credentials to retrieve some payroll reports. What should you do?
[expand title=View Answer] Politely declined the request and reminded her that it is against the company’s security policy to share login credentials. [/expand]
Q10. Which of the following best describes a Trojan Horse?
[expand title=View Answer] A type of malware that tricks you into installing software that looks legitimate. [/expand]
Introduction to Cybersecurity Essentials Week 02 Quiz Answers
Quiz 1: Security Best Practices
Q1. Which of the following is an example of an effective password policy?
[expand title=View Answer]Password strength combined with multifactor authentication are essential tools for maintaining security. [/expand]
Q2. What is the benefit of the principle of least privilege?
[expand title=View Answer] It improves data security and prevents the spread of malware on your network.[/expand]
Q3. Which of the following is the correct term used for making a device, operating system, or software application as secure as possible?
[expand title=View Answer] Hardening[/expand]
Q4. Which method would prevent an attacker from connecting to your computer remotely from an Internet connection over an open port?
[expand title=View Answer]Use a host-based firewall, like Windows Firewall. [/expand]
Q5. Which of the following terms best refers to fixing a known software problem?
[expand title=View Answer] Patch [/expand]
Quiz 2: Security Best Practices
Q1. You are investigating fraudulent activities committed by two employees at your company. You’re asked to provide non-refutable evidence to confirm it. What type of evidence will you provide?
[expand title=View Answer] Non-repudiation [/expand]
Q2. Why would you use a VPN?
[expand title=View Answer] To encrypt data on a public network[/expand]
Q3. Which of the following authentication methods require more than one authentication process for a logon? (Select two)
[expand title=View Answer]
2FA
Multifactor authentication[
/expand]
Q4. You received an email from your bank alerting you to suspicious activity on your bank account. They inform you that to keep your account safe, you should change your password immediately. They provide you with a link to change your password. Which type of social engineering attack was used against you?
[expand title=View Answer] Phishing[/expand]
Q5. Recently, your company experienced a data breach. An investigation confirms that the source was a company executive who was using his mobile phone in a public area. Which of the following might have prevented this breach?
[expand title=View Answer]Disabling Bluetooth [/expand]
Q6. Using asymmetric encryption is best suited for which one of the following scenarios?
[expand title=View Answer] Protecting data in transit against eavesdropping and data tampering. [/expand]
Q7. Which of the following practices can help you manage your email and reduce spam
[expand title=View Answer]
1.Keep your inbox clean and use folders to organize your email by category
2.Only subscribe to legitimate email distribution lists
[/expand]
Q8. You are assigned a task to secure data on the development machines in the lab. None are connected to any external networks. What can you do to prevent data theft?
[expand title=View Answer] Use drive encryption[/expand]
Q9. After you have applied an operating system update to your laptop, your sound card is no longer functional. You’ve determined that the sound card driver is no longer compatible and needs an update. Where is the best place to obtain a new driver?
[expand title=View Answer] From the original equipment manufacturer (OEM) [/expand]
Q10. Common passwords and phrases are safe for passwords as long as they:
[expand title=View Answer] Are at least 12 characters long and include a number and punctuation mark [/expand]
Introduction to Cybersecurity Essentials Week 03 Quiz Answers
Quiz 1: Safe Browsing Practices
Q1. Why is it important for organizations to secure their business software?
[expand title=View Answer] To prevent hackers from targeting and launching ransomware, exploits, or other cyberattacks against it [/expand]
Q2. What does the HTTPS:// at the beginning of a URL mean, as opposed to a URL that begins with HTTP://?
[expand title=View Answer] That the site is not accessible to certain computers [/expand]
Q3. When a public Wi-Fi network requires a password to use it, does that mean it’s generally safe to use it for sensitive activities like online banking?
[expand title=View Answer] No, it is not safe. [/expand]
Q4. Which of the following statements is true regarding browser plugins, toolbars, and extensions?
[expand title=View Answer] Browsers and their associated add-ons should be updated to the newest versions.[/expand]
Q5. Your co-worker, Rachelle, has recently discovered that when she starts typing her name into a field in a web browser, her whole name and address appears in their respective boxes. What is causing this to happen?
[expand title=View Answer] Autofill [/expand]
Quiz 2: Safe Browsing Practices
Q1. Which of the following best describes the primary reason that hackers target companies?
[expand title=View Answer] To try to steal sensitive data such as intellectual property, trade secrets and other valuable data to sell on the dark web. [/expand]
Q2. Which technology can help reduce security threats when using an unsecure Wi-Fi network?
[expand title=View Answer] Using a virtual private network (VPN) [/expand]
Q3. Which of the following is a strong password?
[expand title=View Answer] X5j13$#eCM19[/expand]
Q4. You’ve been messaging online with a stranger for a few weeks, and he asked you for your email address. He’s been friendly and seems trustworthy, so you give it to him. He then cut off all contact with you and now your Inbox is filling up with thousands of emails from companies, and people you don’t know. What happened?
[expand title=View Answer] The stranger used a phishing attack and social engineering against you to obtain your email address to use for sending spam. [/expand]
Q5. Which of the following statements about cookies is true?
[expand title=View Answer]I can get a cookie from a website I’ve never been to. [/expand]
Q6. Which of the following characteristics should apply to a CA security certificate?
[expand title=View Answer] A security certificate should be issued from a trusted Certificate of Authority.[/expand]
Q7. What is SSL (Secure Socket Layer) used for?
[expand title=View Answer] Preventing the interception and tampering of data [/expand]
Q8. After logging into your computer today, you’ve noticed that every time you try to visit a website, your browser keeps redirecting you to other sites. What is the cause?
[expand title=View Answer] Your computer has been infected with malware that is causing the redirects. [/expand]
Q9. Which of the following is a risk to rooting or jailbreaking a mobile device?
[expand title=View Answer] The device is bricked or becomes unusable.[/expand]
Q10. Which of the following is a genuine Certificate of Authority (root certificate store)?
[expand title=View Answer] Microsoft[/expand]
Introduction to Cybersecurity Essentials Week 04 Quiz Answers
Quiz 1: Final Quiz
Q1. Which of the following attacks would a hacker use to potentially target the theft of intellectual property?
[expand title=View Answer] Impersonation[/expand]
Q2. An attacker was easily able to log in to your company’s security camera by performing a basic Internet search. He found a setup guide for that particular camera brand and model. Which of the following BEST describes the configurations the attacker exploited?
[expand title=View Answer] Default settings [/expand]
Q3. Which of the following is one of the categories used in multifactor authentication?
[expand title=View Answer] Something you have [/expand]
Q4. What does SSL stand for?
[expand title=View Answer]Secure sockets layer[/expand]
Q5. Which of the following are elements of the CIA Triad?
[expand title=View Answer] Confidentiality, Integrity, and Availability [/expand]
Q6. In the context of security and information privacy, what does IP stand for?
[expand title=View Answer] Intellectual Property [/expand]
Q7. Which of the following is a way that a web browser is vulnerable to a breach?
[expand title=View Answer] A browser plug-in can be exploited. [/expand]
Q8. Digital signatures provide which of the following?
[expand title=View Answer] Authentication, data integrity, a form of non-repudiation[/expand]
Q9. What is personally identifiable information, or PII?
[expand title=View Answer]Any data that alone, or in combination with other information, can identify an individual [/expand]
Q10. What is the purpose of Trojan malware?
[expand title=View Answer] To masquerade as non-malicious software while exploiting a system’s weaknesses. [/expand]
Q11. Which of the following best describes a zombie cookie?
[expand title=View Answer] They don’t follow normal protocols and are difficult to remove. [/expand]
Q12. What happens to your data when it’s encrypted?
[expand title=View Answer] It is scrambled to retain privacy from third parties. [/expand]
Q13. There are two types of firewalls. What are they?
[expand title=View Answer] Hardware-based and software-based [/expand]
Q14. Which of the following webpage addresses indicate that the browsing session is secured by SSL?
[expand title=View Answer] The web address begins with https://[/expand]
Q15. When is data at its least vulnerable?
[expand title=View Answer] When it’s at rest. [/expand]
Get All Course Quiz Answers of IBM Technical Support Professional Certificate
Introduction to Hardware and Operating Systems Quiz Answers
Introduction to Software, Programming, and Databases Quiz Answers
Introduction to Networking and Storage Quiz Answers
Introduction to Cybersecurity Essentials Quiz Answers
Introduction to Cloud Computing Coursera Q