Introduction to Cybersecurity Essentials Quiz Answers

Get All Week Introduction to Cybersecurity Essentials Quiz Answers

Introduction to Cybersecurity Essentials Week 01 Quiz Answers

Quiz 1: Common Security Threats and Risks

Q1. In cybersecurity, what does the CIA in CIA Triad refer to?

View
Confidentiality, Integrity, Availability

Q2. When does raw data become information?

View
When it has been cleaned, refined, and organized

Q3. Which malicious software is a virus that starts itself after identifying system weaknesses and spreads between computers and over networks?

View
Worm

Q4. What type of malware locks the user out of their files or device, and then demands an anonymous online payment to restore access?

View
Ransomware

Q5. Employees at your company are having a difficult time accessing the company’s website. Some employees report slow performance, and some cannot access it all. IT staff investigated and found millions of half-open connections on port 443 from thousands of different IP addresses. Which type of attack is occurring?

View
DDoS attack

Quiz 2: Common Security Threats and Risks

Q1. What does confidentiality of data refer to?

View
Rules that restrict access only to those who need to know

Q2. Maria has taken her college entry exam and is waiting to get her results via email. By accident, the university sent Maria’s results to Alexander. What part of the CIA Triad has been broken?

View
Confidentiality

Q3. Your company’s Marketing team will be taking a group of people on a tour of your facility. The company has sent an email to all employees requiring them to clean all whiteboards and to make sure their desktops are cleared. What is the company trying to protect against?

View
A loss of intellectual property

Q4. What does the acronym PII stand for?

View
Personally Identifiable Information

Q5. David noticed an unattended laptop in a coffee shop and decided to steal it. Which of the following types of cybercrime did he commit?

View
Hardware theft

Q6. Someone was recently caught sifting through your company’s trash looking for confidential information. Which type of security threat is this?

View
Dumpster diving

Q7. You’ve started to notice that a co-worker sitting next to you always seems to look your way when you’re trying to enter your username and password to log onto the network. What is this co-worker doing?

View
Shoulder surfing

Q8. You just installed a new search engine on your computer. Afterward, whenever you search the Internet, several pop-up windows appear on your screen directing you to buy products. What type of malware is installed on your machine?

View
Adware

Q9. Your supervisor is extremely busy today and asks you to log into the HR server using her login credentials to retrieve some payroll reports. What should you do?

View
Politely declined the request and reminded her that it is against the company’s security policy to share login credentials.

Q10. Which of the following best describes a Trojan Horse?

View
A type of malware that tricks you into installing software that looks legitimate.

Introduction to Cybersecurity Essentials Week 02 Quiz Answers

Quiz 1: Security Best Practices 

Q1. Which of the following is an example of an effective password policy?

View
Password strength combined with multifactor authentication are essential tools for maintaining security.

Q2. What is the benefit of the principle of least privilege?

View
It improves data security and prevents the spread of malware on your network.

Q3. Which of the following is the correct term used for making a device, operating system, or software application as secure as possible?

View
Hardening

Q4. Which method would prevent an attacker from connecting to your computer remotely from an Internet connection over an open port?

View
Use a host-based firewall, like Windows Firewall.

Q5. Which of the following terms best refers to fixing a known software problem?

View
Patch

Quiz 2: Security Best Practices 

Q1. You are investigating fraudulent activities committed by two employees at your company. You’re asked to provide non-refutable evidence to confirm it. What type of evidence will you provide?

View
Non-repudiation

Q2. Why would you use a VPN?

View
To encrypt data on a public network

Q3. Which of the following authentication methods require more than one authentication process for a logon? (Select two)

View
2FA

Multifactor authentication[
/expand]

Q4. You received an email from your bank alerting you to suspicious activity on your bank account. They inform you that to keep your account safe, you should change your password immediately. They provide you with a link to change your password. Which type of social engineering attack was used against you?

View Phishing

Q5. Recently, your company experienced a data breach. An investigation confirms that the source was a company executive who was using his mobile phone in a public area. Which of the following might have prevented this breach?

View
Disabling Bluetooth

Q6. Using asymmetric encryption is best suited for which one of the following scenarios?

View
Protecting data in transit against eavesdropping and data tampering.

Q7. Which of the following practices can help you manage your email and reduce spam

View
1.Keep your inbox clean and use folders to organize your email by category
2.Only subscribe to legitimate email distribution lists

Q8. You are assigned a task to secure data on the development machines in the lab. None are connected to any external networks. What can you do to prevent data theft?

View
Use drive encryption

Q9. After you have applied an operating system update to your laptop, your sound card is no longer functional. You’ve determined that the sound card driver is no longer compatible and needs an update. Where is the best place to obtain a new driver?

View
From the original equipment manufacturer (OEM)

Q10. Common passwords and phrases are safe for passwords as long as they:

View
Are at least 12 characters long and include a number and punctuation mark

Introduction to Cybersecurity Essentials Week 03 Quiz Answers

Quiz 1: Safe Browsing Practices

Q1. Why is it important for organizations to secure their business software?

View
To prevent hackers from targeting and launching ransomware, exploits, or other cyberattacks against it

Q2. What does the HTTPS:// at the beginning of a URL mean, as opposed to a URL that begins with HTTP://?

View
That the site is not accessible to certain computers

Q3. When a public Wi-Fi network requires a password to use it, does that mean it’s generally safe to use it for sensitive activities like online banking?

View
No, it is not safe.

Q4. Which of the following statements is true regarding browser plugins, toolbars, and extensions?

View
Browsers and their associated add-ons should be updated to the newest versions.

Q5. Your co-worker, Rachelle, has recently discovered that when she starts typing her name into a field in a web browser, her whole name and address appears in their respective boxes. What is causing this to happen?

View
Autofill

Quiz 2: Safe Browsing Practices

Q1. Which of the following best describes the primary reason that hackers target companies?

View
To try to steal sensitive data such as intellectual property, trade secrets and other valuable data to sell on the dark web.

Q2. Which technology can help reduce security threats when using an unsecure Wi-Fi network?

View
Using a virtual private network (VPN)

Q3. Which of the following is a strong password?

View
X5j13$#eCM19

Q4. You’ve been messaging online with a stranger for a few weeks, and he asked you for your email address. He’s been friendly and seems trustworthy, so you give it to him. He then cut off all contact with you and now your Inbox is filling up with thousands of emails from companies, and people you don’t know. What happened?

View
The stranger used a phishing attack and social engineering against you to obtain your email address to use for sending spam.

Q5. Which of the following statements about cookies is true?

View
I can get a cookie from a website I’ve never been to.

Q6. Which of the following characteristics should apply to a CA security certificate?

View
A security certificate should be issued from a trusted Certificate of Authority.

Q7. What is SSL (Secure Socket Layer) used for?

View
Preventing the interception and tampering of data

Q8. After logging into your computer today, you’ve noticed that every time you try to visit a website, your browser keeps redirecting you to other sites. What is the cause?

View
Your computer has been infected with malware that is causing the redirects.

Q9. Which of the following is a risk to rooting or jailbreaking a mobile device?

View
The device is bricked or becomes unusable.

Q10. Which of the following is a genuine Certificate of Authority (root certificate store)?

View
Microsoft

Introduction to Cybersecurity Essentials Week 04 Quiz Answers

Quiz 1: Final Quiz

Q1. Which of the following attacks would a hacker use to potentially target the theft of intellectual property?

View
Impersonation

Q2. An attacker was easily able to log in to your company’s security camera by performing a basic Internet search. He found a setup guide for that particular camera brand and model. Which of the following BEST describes the configurations the attacker exploited?

View
Default settings

Q3. Which of the following is one of the categories used in multifactor authentication?

View
Something you have

Q4. What does SSL stand for?

View
Secure sockets layer

Q5. Which of the following are elements of the CIA Triad?

View
Confidentiality, Integrity, and Availability

Q6. In the context of security and information privacy, what does IP stand for?

View
Intellectual Property

Q7. Which of the following is a way that a web browser is vulnerable to a breach?

View
A browser plug-in can be exploited.

Q8. Digital signatures provide which of the following?

View
Authentication, data integrity, a form of non-repudiation

Q9. What is personally identifiable information, or PII?

View
Any data that alone, or in combination with other information, can identify an individual

Q10. What is the purpose of Trojan malware?

View
To masquerade as non-malicious software while exploiting a system’s weaknesses.

Q11. Which of the following best describes a zombie cookie?

View
They don’t follow normal protocols and are difficult to remove.

Q12. What happens to your data when it’s encrypted?

View
It is scrambled to retain privacy from third parties.

Q13. There are two types of firewalls. What are they?

View
Hardware-based and software-based

Q14. Which of the following webpage addresses indicate that the browsing session is secured by SSL?

View
The web address begins with https://

Q15. When is data at its least vulnerable?

View
When it’s at rest.
Get All Course Quiz Answers of IBM Technical Support Professional Certificate

Introduction to Hardware and Operating Systems Quiz Answers

Introduction to Software, Programming, and Databases Quiz Answers

Introduction to Networking and Storage Quiz Answers

Introduction to Cybersecurity Essentials Quiz Answers

Introduction to Cloud Computing Coursera Q

Team Networking Funda
Team Networking Funda

We are Team Networking Funda, a group of passionate authors and networking enthusiasts committed to sharing our expertise and experiences in networking and team building. With backgrounds in Data Science, Information Technology, Health, and Business Marketing, we bring diverse perspectives and insights to help you navigate the challenges and opportunities of professional networking and teamwork.

Leave a Reply

Your email address will not be published. Required fields are marked *