You have a request ? Contact Us Join Us

Cybersecurity Roles, Processes & Operating System Security | Coursera Quiz Answers

Answer of Coursera Cybersecurity Roles, Processes & Operating System Security. IBM Cybersecurity Analyst Professional Certificate.
Coursera: Cybersecurity Roles, Processes & Operating System Security
Cybersecurity Roles, Processes & Operating System Security | Coursera

In today's interconnected world, cybersecurity is paramount for safeguarding sensitive information and maintaining the integrity of digital systems. Cybersecurity roles encompass various positions, from security analysts to ethical hackers, each playing a crucial part in defending against cyber threats. Understanding the processes involved, such as risk assessment, incident response, and continuous monitoring, is essential for effective cybersecurity management. Additionally, operating system security forms the backbone of a secure IT infrastructure, incorporating measures like access control, encryption, and regular updates to protect against vulnerabilities. By comprehensively addressing these aspects, organizations can fortify their defenses and navigate the digital landscape with confidence.


Module 1 – People Process & Technology >

Welcome to People, Process and Operating System Fundamentals for Cybersecurity

1. In the video Welcome to People, Process and Operating System Fundamentals for Cybersecurity, Alex mentions especially needing which two (2) technical skills and which two (2) soft skills?
  • Networking and Programming
  • Effective Communications and Critical Thinking
  • Teamwork and Public Speaking
  • Leadership and Organization
  • Firewalls and Antiviru
  • System administration and Scripting
2. The statement: “The protection of computer systems from theft or damage to the hardware, software or information on them, as well as from disruption or misdirection of the services they provide.” Is a good definition for what?
  • IT Security
  • The CIA Triad.
  • The Open Web Application Security Project (OWASP) Framework.
  • The Information Technology Infrastructure Library (ITIL) framework.
  • The Business Process Management Framework.

Frameworks, Policies and Roles

1. When looking at security standards and compliance, which three (3) are characteristics of best practices, baselines and frameworks?
  • They are used to improved controls, methodologies and governance for the IT department.
  • They enforce government, industry or client regulations.
  • They are rules to follow for a specific industry.
  • They help translate the business needs into technical or operational needs.
  • They seek to improve performance, controls and metrics.
2. Which three (3) of these roles would likely exist in an Information Security organization?
  • Product Development Manager
  • Regional Sales Executive
  • Vulnerability Assessor
  • Director of Human Resources
  • CISO, Chief Information Security Officer
  • Information Security Architect

Business Process Management and It Infrastructure Library Basics

1. In the video Introduction to Process, which three (3) items were called out as critical to the success of a Security Operations Center (SOC)?
  • People
  • Tools
  • Process
  • Bandwidth
  • Faraday Cages
  • Uninterruptible Power Supplies for all critical systems.
2. Process performance metrics typically measure items in which four (4) categories?
  • Rework
  • Cost
  • Injuries
  • Quality (defect rate)
  • Backlog of pending orders
  • Cycle time
  • Parts Inventory on hand
3. Service Portfolio Management, Financial Management, Demand Management and Business Relationship Management belong to which ITIL Service Lifecycle Phase?
  • Service Operations
  • Service Transition
  • Service Improvement
  • Service Strategy
  • Service Design
4. Log, Assign, Track, Categorize, Prioritize, Resolve and Close are all steps in which ITIL process?
  • Event Management
  • Change Management
  • Incident Management
  • Problem Management
5. What critical item is noted when discussing process roles?
  • Separation of duties is critical
  • Approver should be the requestor
  • Approver should be the supplier

People, Process and Technology

1. The process in ITIL where changes are released to an IT environment is called what?
  • Release Management
  • Incident Management
  • Problem Management
  • Change Management
2. Which service management process has the responsibility of understanding the root cause of a problem?
  • Problem Management
  • Incident Management
  • Change Management
  • Configuration Management
3. In the video What is IT Security, Elio Sanabria Echeverria put forth a definition that included which factors?
  • The protection of computer hardware.
  • The protection of computer software.
  • The protection of data.
  • The disruption or misdirection of services provided by your systems.
  • All of the above.
4. This description belongs to which information security role? “This position is in charge of testing the effectiveness of computer information systems, including the security of the systems and reports their findings.”
  • Information Security Auditor
  • Information Security Architect
  • Information Security Analyst
  • Chief Information Security Officer
5. Which of these statements most accurately conveys what was stated in the video Introduction to Process?
  • Solid and well documented security processes are making the role of the security analyst increasingly obsolete.
  • As volumes of security alerts and false positives grow, more burden is placed upon Security Analysts & Incident Response teams.
  • As security monitoring and analysis tools advance and incorporate artificial intelligence, Information Security organizations are challenged to find new work for underutilized security analysts.
6. Event Management, Incident Management, and Problem Management belong to which ITIL Service Lifecycle Phase?
  • Service Operations
  • Service Improvement
  • Service Design
  • Service Transition
  • Service Strategy
7. Maintaining Information Security Policy (ISP) and specific security policies that address each aspect of strategy, objectives and regulations is the part of which ITIL process?
  • Information Security Management
  • Problem Management
  • Service Level Management
  • Change Management

Module 2 – Examples & Principles of the CIA Triad

Further Discussion of Confidentiality, Integrity and Availability

1. In the Alice, Bob and Trudy examples, who is always portrayed as the intruder?
  • Alice
  • Bob
  • Natasha
  • Trudy
2. Which aspect of the CIA Triad would cover preserving authorized restrictions on information access and disclosure?
  • Confidentiality
  • Integrity
  • Availability
3. A message that Bob receives from Alice is genuine and can be verified as such demonstrates which key property?
  • Accountability
  • Availability
  • Authenticity
  • Confidentiality

Principles of the Cia Triad

1. The unauthorized disclosure of information would violate which aspect of the CIA Triad?
  • Confidentiality
  • Integrity
  • Availability
  • Authorization
2. Which aspect of the CIA Triad would cover ensuring information non-repudiation and authenticity?
  • Confidentiality
  • Integrity
  • Availability
  • The time window during which data transmission is allowed for a given system.
3. If Trudy intercepts and reads a message that Alice is sending to Bob, and then she deletes it without allowing it to be delivered, which 2 aspects of the CIA Triad have been violated?
  • Availability & Integrity
  • Availability & Confidentiality
  • Integrity & Confidentiality

Module 3 – Authentication and Access Control

What is AAA?

1. Which is the correct order for gaining access to a resource?
  • Identification, Authorization, Authentication, Accountability
  • Authentication Identification, Authorization, Accountability
  • Identification, Authentication, Authorization, Accountabilit
  • Accountability, Identification, Authentication, Authorization
2. Which type of method would include “Something you know”, such as a password?
  • Accountability
  • Authorization
  • Authentication
  • Identification

Access Control

1. Which three (3) are common methods of access control?
  • Role Based Access Control (RBAC)
  • Discretionary Access Control (DAC)
  • Perimeter Access Control (PAC)
  • CIA Triad Access Control (CTAC)
  • Mandatory Access Control (MAC)
2. Which three (3) items would be considered Physical Access Control methods?
  • Work areas
  • Perimetral
  • Building
  • Password policies
  • Access Control Lists (ACL)

Authentication and Access Control

1. Which statement best describes Discretionary Access Control (DAC)?
  • Limits connections to computer networks, system files and data.
  • Each object (folder or file) has an owner and the owner defines the rights and privilege.
  • Uses labels to regulate the access.
  • Limits access to campuses, buildings, rooms.
2. Which is an example of technical uses of physcial security controls?
  • Tokens
  • Tramps
  • Lists and logs
  • All of the above.
3. Which of the following is NOT an authentication method?
  • Something you are
  • Something you get
  • Something you have
  • Something you know
4. Hamid has access to certain resources because he is a Quality Control Inspector and he has access to other resources because he is the manager of that team. Which form of access control is his company most likely using?
  • Mandatory Access Control (MAC)
  • Discretionary Access Control (DAC)
  • Role Based Access Control (RBAC)
  • Hierarchical Access Control (HAC)
5. Which type of method would include something you are, such as a fingerprint?
  • Authorization
  • Accountability
  • Authentication
  • Identification

Module 4 – Window Operating System Security Basics

User and Kernel Modes

1. How many unique address spaces are used by applications running in kernel mode?
  • 0
  • 1
  • 4
  • As many as there are processes running

File Systems and Directory Structure

1. Which two (2) of these file systems could you use to format a 64 GB USB drive?
  • FAT16
  • NTFS
  • FAT32
2. Where does Windows 10 store 64-bit applications?
  • \System32
  • \System
  • \Program Files (x86)
  • \Program Files

Shortcuts and Commands

1. Which shortcut will close all applications?
  • Alt+F4
  • Ctrl+Z
  • Ctrl+X
  • Alt+Tab
2. What is the shortcut for saving a screenshot?
  • Win+PrtScn
  • Ctrl+Alt+P
  • Ctrl+Alt+PrtScn
  • Win+P

Windows Operating System Security Basics

1. What Windows mode do users interact with directly?
  • Kernel mode
  • User mode
  • Desktop mode
  • Shell mode
2. What does Windows create every time an applications is started in user mode?
  • A process.
  • A task.
  • A kernel.
  • A shell.
3. If you are setting up a new Windows laptop with a 128Gb hard drive and you want only a single file partition on the drive, which file systems can choose from?
  • NTFS or FAT32
  • NTFS, FAT32 or FAT16
  • NTFS
  • FAT32 or FAT16
4. A file name in Windows must be unique where?
  • Within the same partition.
  • Within the same storage device (hard drive or SSD).
  • Within the same directory.
  • There is no uniqueness requirement for file names in Windows.
5. Windows 10 can be purchased for which versions?
  • 64 bit only.
  • 32 bit or 64 bit.
  • 16 bit, 32 bit or 64 bit.
  • 32 bit only.
6. If you want to roll back or undo an action, what shortcut should you use?
  • Ctrl-W
  • Ctrl-Z
  • Ctrl-V
  • Ctrl-C
7. Which shortcut will switch between running applications?
  • Win-S
  • Win-Tab
  • Ctrl-S
  • Alt-Tab
8. Where does Windows 10 store 32-bit applications?
  • \System
  • \System32
  • \Program Files
  • \Program Files (x86)
9. What is the shortcut to open the Task Manager?
  • Ctrl+Shift+T
  • Ctrl+T
  • Ctrl+Alt+Del
  • Ctrl+Shift+Esc

Module 5 – Linux Operating System Security Basics

Key Components

1. Which three (3) statements about Linux are True?
  • Linux is licensed under the General Public License (GNU).
  • Linux was developed and is now owned by Red Hat.
  • Linux is an open source operating system.
  • Linux guarantees end users freedom to run, study, share, and modify the software.

File Systems

1. Executable files such as ping, grep and cp are stored in which directory?
  • /sbin
  • /root
  • /bin
  • /etc

Linux Basic Commands

1. The Linux “kill” command does which of the following?
  • Permanently delete a file.
  • Performs an emergency system down.
  • Permanently delete a system directory.
  • Stop an executing process.
2. What permissions can be set on a file in Linux?
  • read, edit, run
  • read, write, execute
  • read, edit, delete
  • view, modify, remove
3. Which basic Linux command deletes an empty directory?
  • mv
  • rmdir
  • rm
  • less
4. Which is not a group that can own a file?
  • anybody
  • everybody
  • group
  • user
5. Your organization uses a Linux-based network. The legal department has a user group called legal, and this group has access to all the directories that legal employees need. A new legal employee, John J. Smith, just started, and his username is jjsmith. Which command can you use to grant John access to the same directories as all other legal employees?
  • sudogroupadd -g legal jjsmith
  • sudousermod -a -G legal jjsmith
  • sudogroupmod -g -n legal jjsmith
  • sudogetent group legal jjsmith

Linux Operating System Security Basics

1. Which three (3) groups can “own” a file in Linux?
  • user, group, everybody
  • user, team, world
  • system, user, group
  • self, other, all
2. What can be known about a file with permissions set to “-rwxr-x-r–“?
  • The file is a directory and the rwx indicators apply to all files within that directory.
  • The file is a directory, the user can read, write and execute the file; others can read and execute the file, and the group can execute it only.
  • The file is not a directory; the user can read, write and execute the file; the group cannot modify the file, and others not in the group an read it only.
  • The user can read, write and execute the file; the group cannot modify the file, and others not in the group an read it only. You cannot tell the file/directory type from this string.
3. A person using Linux would normally interact directly with which?
  • The HCL.
  • The API.
  • The shell.
  • The kernel.
4. In the Linux file system, what is the highest level in the directory structure?
  • root
  • bin
  • home
  • kernel
5. What does the nano command do?
  • nano is a file compression utility.
  • nano displays the first 10 lines of any text file.
  • nano is a basic text file editor.
  • nano deletes all empty files and directories.
6. When configuring a new application, in which directory should you have it save log files?
  • /log
  • in the same directory where the application is located
  • /var
  • /bin
7. The Linux “cat” command does which of the following?
  • Puts the file system catalog into edit mode for rapid deletion or insertion of files and directories.
  • Copies file properties.
  • Concatenates 2 or more files together.
  • Creates a catalog of all files in the file system.
8. Your organization uses a Linux-based network, and you’re configuring Uncomplicated Firewall (ufw). You want to disable file transfers that use the File Transfer Protocol (FTP), which occurs on port 21. Which command can you use to block all traffic on this port?
  • sudoufw deny 21
  • sudoufw allow 21
  • sudoufw delete 21
  • sudoufw reload 21

Module 6 – macOS Security Basics – Resources Knowledge Check

Macos Resources Knowledge Check

1. What application can you use to see all the active running applications and processes on macOS?
  • Activity Monitor
  • System information
  • Disk Utility
  • Console
2. What feature in macOS prevents unauthorized applications from being installed?
  • FileVault
  • Firewall
  • Gatekeeper
  • Apple Watch
3. Which three (3) utilities are found when booting macOS to the recovery partition? (Select 3)
  • Safari
  • Keychain Access
  • Disk Utility
  • Time Machine

Module 7 – Overview of Virtualization

Virtualization Basics and Cloud Computing

1. Where does the hypervisor sit in a virtual architecture?
  • Between the hardware and the operating system(s).
  • Between the operating system and the applications.
  • Between the applications and the user.
  • Remotely to coordinate tasks between different physical computers.
2. Which are the first two steps to perform in a cloud deployment?
  • Integrate and Optimize
  • Automate and Manage
  • Consolidate and Virtualize
3. Which are the three (3) most common forms of Cloud computing?
  • Hybrid Cloud
  • Private Cloud
  • Universal Cloud
  • Public Cloud
4. Which type of cloud is the best choice for a start-up company with no existing IT infrastructure and limited funds?
  • Public Cloud
  • Private Cloud
  • Hybrid Cloud
  • All of the above.
5. Which three (3) are the primary benefits of cloud computing?
  • Security
  • Efficiency
  • Flexibility
  • Strategic Value
6. Which is a primary security consideration in a cloud environment?
  • Disaster Recovery and Business Continuity Plan
  • Governance Plan
  • Compliance
  • All of the above.

Virtualization Basics

1. Virtualization allows you to create multiple simulated environments or dedicated resources from how many physical hardware systems?
  • unlimited
  • 3
  • 1
  • 2
2. Which two steps of a cloud deployment are performed after you move your applications to the cloud?
  • Integrate and Optimize
  • Consolidate and Virtualize
  • Automate and Manage
3. Which type of cloud is the best choice for a company with a robust existing IT infrastructure and very serious data privacy concerns?
  • Public Cloud
  • Private Cloud
  • Hybrid Cloud
  • All of the above.
4. Which is a primary security consideration in a cloud environment?
  • Availability
  • Data Security
  • Identity and Access Management
  • All of the above.

Related Articles

Post a Comment

Cookie Consent
We serve cookies on this site to analyze traffic, remember your preferences, and optimize your experience.
Oops!
It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.
AdBlock Detected!
We have detected that you are using adblocking plugin in your browser.
The revenue we earn by the advertisements is used to manage this website, we request you to whitelist our website in your adblocking plugin.