![]() |
Cybersecurity Roles, Processes & Operating System Security | Coursera |
In today's interconnected world, cybersecurity is paramount for safeguarding sensitive information and maintaining the integrity of digital systems. Cybersecurity roles encompass various positions, from security analysts to ethical hackers, each playing a crucial part in defending against cyber threats. Understanding the processes involved, such as risk assessment, incident response, and continuous monitoring, is essential for effective cybersecurity management. Additionally, operating system security forms the backbone of a secure IT infrastructure, incorporating measures like access control, encryption, and regular updates to protect against vulnerabilities. By comprehensively addressing these aspects, organizations can fortify their defenses and navigate the digital landscape with confidence.
Module 1 – People Process & Technology >
Welcome to People, Process and Operating System Fundamentals for Cybersecurity
1. In the video Welcome to People, Process and Operating System Fundamentals for Cybersecurity, Alex mentions especially needing which two (2) technical skills and which two (2) soft skills?- Networking and Programming
- Effective Communications and Critical Thinking
- Teamwork and Public Speaking
- Leadership and Organization
- Firewalls and Antiviru
- System administration and Scripting
- IT Security
- The CIA Triad.
- The Open Web Application Security Project (OWASP) Framework.
- The Information Technology Infrastructure Library (ITIL) framework.
- The Business Process Management Framework.
Frameworks, Policies and Roles
1. When looking at security standards and compliance, which three (3) are characteristics of best practices, baselines and frameworks?- They are used to improved controls, methodologies and governance for the IT department.
- They enforce government, industry or client regulations.
- They are rules to follow for a specific industry.
- They help translate the business needs into technical or operational needs.
- They seek to improve performance, controls and metrics.
- Product Development Manager
- Regional Sales Executive
- Vulnerability Assessor
- Director of Human Resources
- CISO, Chief Information Security Officer
- Information Security Architect
Business Process Management and It Infrastructure Library Basics
1. In the video Introduction to Process, which three (3) items were called out as critical to the success of a Security Operations Center (SOC)?- People
- Tools
- Process
- Bandwidth
- Faraday Cages
- Uninterruptible Power Supplies for all critical systems.
- Rework
- Cost
- Injuries
- Quality (defect rate)
- Backlog of pending orders
- Cycle time
- Parts Inventory on hand
- Service Operations
- Service Transition
- Service Improvement
- Service Strategy
- Service Design
- Event Management
- Change Management
- Incident Management
- Problem Management
- Separation of duties is critical
- Approver should be the requestor
- Approver should be the supplier
People, Process and Technology
1. The process in ITIL where changes are released to an IT environment is called what?- Release Management
- Incident Management
- Problem Management
- Change Management
- Problem Management
- Incident Management
- Change Management
- Configuration Management
- The protection of computer hardware.
- The protection of computer software.
- The protection of data.
- The disruption or misdirection of services provided by your systems.
- All of the above.
- Information Security Auditor
- Information Security Architect
- Information Security Analyst
- Chief Information Security Officer
- Solid and well documented security processes are making the role of the security analyst increasingly obsolete.
- As volumes of security alerts and false positives grow, more burden is placed upon Security Analysts & Incident Response teams.
- As security monitoring and analysis tools advance and incorporate artificial intelligence, Information Security organizations are challenged to find new work for underutilized security analysts.
- Service Operations
- Service Improvement
- Service Design
- Service Transition
- Service Strategy
- Information Security Management
- Problem Management
- Service Level Management
- Change Management
Module 2 – Examples & Principles of the CIA Triad
Further Discussion of Confidentiality, Integrity and Availability
1. In the Alice, Bob and Trudy examples, who is always portrayed as the intruder?- Alice
- Bob
- Natasha
- Trudy
- Confidentiality
- Integrity
- Availability
- Accountability
- Availability
- Authenticity
- Confidentiality
Principles of the Cia Triad
1. The unauthorized disclosure of information would violate which aspect of the CIA Triad?- Confidentiality
- Integrity
- Availability
- Authorization
- Confidentiality
- Integrity
- Availability
- The time window during which data transmission is allowed for a given system.
- Availability & Integrity
- Availability & Confidentiality
- Integrity & Confidentiality
Module 3 – Authentication and Access Control
What is AAA?
1. Which is the correct order for gaining access to a resource?- Identification, Authorization, Authentication, Accountability
- Authentication Identification, Authorization, Accountability
- Identification, Authentication, Authorization, Accountabilit
- Accountability, Identification, Authentication, Authorization
- Accountability
- Authorization
- Authentication
- Identification
Access Control
1. Which three (3) are common methods of access control?- Role Based Access Control (RBAC)
- Discretionary Access Control (DAC)
- Perimeter Access Control (PAC)
- CIA Triad Access Control (CTAC)
- Mandatory Access Control (MAC)
- Work areas
- Perimetral
- Building
- Password policies
- Access Control Lists (ACL)
Authentication and Access Control
1. Which statement best describes Discretionary Access Control (DAC)?- Limits connections to computer networks, system files and data.
- Each object (folder or file) has an owner and the owner defines the rights and privilege.
- Uses labels to regulate the access.
- Limits access to campuses, buildings, rooms.
- Tokens
- Tramps
- Lists and logs
- All of the above.
- Something you are
- Something you get
- Something you have
- Something you know
- Mandatory Access Control (MAC)
- Discretionary Access Control (DAC)
- Role Based Access Control (RBAC)
- Hierarchical Access Control (HAC)
- Authorization
- Accountability
- Authentication
- Identification
Module 4 – Window Operating System Security Basics
User and Kernel Modes
- 0
- 1
- 4
- As many as there are processes running
File Systems and Directory Structure
- FAT16
- NTFS
- FAT32
- \System32
- \System
- \Program Files (x86)
- \Program Files
Shortcuts and Commands
- Alt+F4
- Ctrl+Z
- Ctrl+X
- Alt+Tab
- Win+PrtScn
- Ctrl+Alt+P
- Ctrl+Alt+PrtScn
- Win+P
Windows Operating System Security Basics
- Kernel mode
- User mode
- Desktop mode
- Shell mode
- A process.
- A task.
- A kernel.
- A shell.
- NTFS or FAT32
- NTFS, FAT32 or FAT16
- NTFS
- FAT32 or FAT16
- Within the same partition.
- Within the same storage device (hard drive or SSD).
- Within the same directory.
- There is no uniqueness requirement for file names in Windows.
- 64 bit only.
- 32 bit or 64 bit.
- 16 bit, 32 bit or 64 bit.
- 32 bit only.
- Ctrl-W
- Ctrl-Z
- Ctrl-V
- Ctrl-C
- Win-S
- Win-Tab
- Ctrl-S
- Alt-Tab
- \System
- \System32
- \Program Files
- \Program Files (x86)
- Ctrl+Shift+T
- Ctrl+T
- Ctrl+Alt+Del
- Ctrl+Shift+Esc
Module 5 – Linux Operating System Security Basics
Key Components
- Linux is licensed under the General Public License (GNU).
- Linux was developed and is now owned by Red Hat.
- Linux is an open source operating system.
- Linux guarantees end users freedom to run, study, share, and modify the software.
File Systems
- /sbin
- /root
- /bin
- /etc
Linux Basic Commands
- Permanently delete a file.
- Performs an emergency system down.
- Permanently delete a system directory.
- Stop an executing process.
- read, edit, run
- read, write, execute
- read, edit, delete
- view, modify, remove
- mv
- rmdir
- rm
- less
- anybody
- everybody
- group
- user
- sudogroupadd -g legal jjsmith
- sudousermod -a -G legal jjsmith
- sudogroupmod -g -n legal jjsmith
- sudogetent group legal jjsmith
Linux Operating System Security Basics
1. Which three (3) groups can “own” a file in Linux?- user, group, everybody
- user, team, world
- system, user, group
- self, other, all
- The file is a directory and the rwx indicators apply to all files within that directory.
- The file is a directory, the user can read, write and execute the file; others can read and execute the file, and the group can execute it only.
- The file is not a directory; the user can read, write and execute the file; the group cannot modify the file, and others not in the group an read it only.
- The user can read, write and execute the file; the group cannot modify the file, and others not in the group an read it only. You cannot tell the file/directory type from this string.
- The HCL.
- The API.
- The shell.
- The kernel.
- root
- bin
- home
- kernel
- nano is a file compression utility.
- nano displays the first 10 lines of any text file.
- nano is a basic text file editor.
- nano deletes all empty files and directories.
- /log
- in the same directory where the application is located
- /var
- /bin
- Puts the file system catalog into edit mode for rapid deletion or insertion of files and directories.
- Copies file properties.
- Concatenates 2 or more files together.
- Creates a catalog of all files in the file system.
- sudoufw deny 21
- sudoufw allow 21
- sudoufw delete 21
- sudoufw reload 21
Module 6 – macOS Security Basics – Resources Knowledge Check
Macos Resources Knowledge Check
1. What application can you use to see all the active running applications and processes on macOS?- Activity Monitor
- System information
- Disk Utility
- Console
- FileVault
- Firewall
- Gatekeeper
- Apple Watch
- Safari
- Keychain Access
- Disk Utility
- Time Machine
Module 7 – Overview of Virtualization
Virtualization Basics and Cloud Computing
1. Where does the hypervisor sit in a virtual architecture?- Between the hardware and the operating system(s).
- Between the operating system and the applications.
- Between the applications and the user.
- Remotely to coordinate tasks between different physical computers.
- Integrate and Optimize
- Automate and Manage
- Consolidate and Virtualize
- Hybrid Cloud
- Private Cloud
- Universal Cloud
- Public Cloud
- Public Cloud
- Private Cloud
- Hybrid Cloud
- All of the above.
- Security
- Efficiency
- Flexibility
- Strategic Value
- Disaster Recovery and Business Continuity Plan
- Governance Plan
- Compliance
- All of the above.
Virtualization Basics
1. Virtualization allows you to create multiple simulated environments or dedicated resources from how many physical hardware systems?- unlimited
- 3
- 1
- 2
- Integrate and Optimize
- Consolidate and Virtualize
- Automate and Manage
- Public Cloud
- Private Cloud
- Hybrid Cloud
- All of the above.
- Availability
- Data Security
- Identity and Access Management
- All of the above.