Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.
After completing this course, a learner will be able to:
● Define key concepts and terminology in Cybersecurity
● Identify threats to cybersecurity
● Identify strategies to identify and remediate vulnerabilities in information assets
● Identify the systemic components (including personnel) necessary for an effective cybersecurity program
Q1. Which of the following is not a term that is part of the history of cybersecurity?
Q2. Which of these is the best definition of cybersecurity?
Q3. Which if these is not one of the identified good security practices?
Q1. The three core characteristics of information are what give it value. Which of these is not one of those characteristics?
Q2. In the context of cybersecurity, _____ is the right of the individual or group to protect themselves and their information from unauthorized access.
Q3. A threat to privacy is information ______ where adversaries assemble of a portfolio of information from a number of different sources which can be assembled to create a more complete picture of an individual.
Q1. _____ are those information-based items of value to the organization.
Q2. _____ are events or circumstances that have the potential to adversely affect operations and assets.
Q3. A technique used to compromise a system is known as a(n) ____.
Answer: Exploit
Q1. _____ are events or circumstances that have the potential to adversely affect operations and assets.
Q2. A person who accesses systems and information without authorization and often illegally is called a(n) _____.
Q3. Which of these is the best definition of cybersecurity?
Q4. Which if these is not one of the identified good security practices?
Q5. The three core characteristics of information are what give it value. Which of these is not one of those characteristics?
Q6. In the context of cybersecurity, _____ is the right of the individual or group to protect themselves and their information from unauthorized access.
Q7. A threat to privacy is information ______ where adversaries assemble of a portfolio of information from a number of different sources which can be assembled to create a more complete picture of an individual.
Q8. _____ are those information-based items of value to the organization.
Q9. _____ is an instance of an information asset suffering damage or destruction, unintended or unauthorized modification or disclosure, or denial of use.
Q10. Potential weaknesses in an asset or its defensive control systems are known as _____.
Answer:
Q1. Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) ______.
Q2. The creation, ownership, and control of original ideas as well as the representation of those ideas is known as _____.
Q3. When power is interrupted for a long term (called an outage) it is called a _____.
Q1. Forces of _____ are also known as force majeure, or acts of God, includes natural disasters, fires, floods, earthquakes, lightning strikes.
Answer:
Q2. When an employee or other stakeholder of an organization, makes a mistake, that’s called _____.
Q3. If someone tricks a user into sharing their credentials, by pretending to be someone that the user would trust that’s called _____.
Q1. The threat category known as _____ includes malware such as viruses, worms, macros, as well as denial of service attacks and script injections.
Q2. _____ software looks like legitimate software but is either malware in disguise or legitimate software embedded with malware
Q3. An attack that attempts to overwhelm a computer target’s ability to handle incoming communications is known as _____.
Q1. The category of threat that represents a situation where, for some reason, our technology equipment fails is known as _____.
Q2. The category of threat that represents a situation where, for some reason, our programming or operating systems fail is known as _____.
Q3. The category of threat that represents a situation where we must rely on technology that cannot be easily replaced is known as _____.
Q1. Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) ______.
Q2. The creation, ownership, and control of original ideas as well as the representation of those ideas is known as _____.
Q3. The threat catagory known as Deviations in Quality of Service are usually seen as _____ usually from a service provider.
Q4. If someone tricks a user into sharing their credentials, by pretending to be someone that the user would trust that’s called _____.
Q5. The category of threat that represents a situation where we must rely on technology that cannot be easily replaced is known as _____.
Q1. In a manager’s decisional role they _____.
Q2. Management and leadership are interchangeable and have the same necessary skills.
Q3. Controlling is _____.
Q1. Cybersecurity professionals have to have _____.
Q2. The _____ develops the strategic plans for the cybersecurity function.
Q3. The job with the title of _____ is frequently called on to manage the day-to-day operations of security technology as well as to assist in training programs, developing policies.
Q1. The responsibility for the entire cybersecurity program should rests solely on the CISO or VP for Cybersecurity.
Q2. In recent years, there is a strong trend to make cybersecurity the responsibility of _____.
Q3. _____ is an approach to cybersecurity management requiring direct oversignt by the board of directors or senior management.
Q1. What is a system development lifecycle or SDLC approach?
Q2. The _____ phase of the SecSDLC begins with instructions from upper management specifying the process, outcomes, and goals of the project as well as its budget and other constraints.
Q3. The _____ phase of the SecSDLC is where the components of the recommended program are acquired, tested, implemented, and retested.
Q1. What are ‘non-normal’ operations?
Q2. Contingency planning is accomplished with all of the following except _____.
Q3. Crisis management planning is focused on the _____.
Q1. In a manager’s interpersonal role they _____.
Q2. Organizing is _____.
Q3. Which of these is not one of the three general categories of Cybersecurity policy?
Q4. The _____ develops the strategic plans for the cybersecurity function.
Q5. _____ is an approach to cybersecurity management requiring direct oversignt by the board of directors or senior management.
Q6. What is a system development lifecycle or SDLC approach?
Q7. The _____ phase of the SecSDLC is where the components of the recommended program are acquired, tested, implemented, and retested.
Q8. The BIA is also known as the _____.
Q9. A(n) _____ is an adverse event that could result in the loss, damage, destruction, or disclosure of an information asset.
Q10. Crisis management planning is focused on the _____.
Q1. In cybersecurity, risk is focused on the loss of confidentiality, integrity, and availability of information assets.
Q2. The probability that a specific vulnerability within an organization will be attacked by a threat is called _____.
Q3. The consequence of a loss from the outcome of a successful attack on an information asset, known as the “magnitude of harm” is known as the _____.
Q1. _____ can be defined as the quantity and nature of risk that the organization is willing to accept as it evaluates the trade-offs between security and accessibility.
Q2. _____ can be defined as the risk you have left after you’re done reducing risk to an acceptable level.
Q3. In the risk management methodology, finding where and what is the risk is known as _____.
Q1. The _____ is a high-level executive who can ensure that all subordinate managers will support the effort, without territory disputes, in-fighting, and other political games that can jeopardize the program.
Q2. The team that will perform the risk management assessment and recommends remediations, where shortcomings are found is known as the _____ team.
Q3. Threat assessment – also known as threat intelligence is used to review the valuation of the assets that may be at risk.
Q1. In cybersecurity, risk is focused on the loss of confidentiality, integrity, and availability of information assets.
Q2. The probability that a specific vulnerability within an organization will be attacked by a threat is called _____.
Q3. The consequence of a loss from the outcome of a successful attack on an information asset, known as the “magnitude of harm” is known as the _____.
Q4. _____ can be defined as the quantity and nature of risk that the organization is willing to accept as it evaluates the trade-offs between security and accessibility.
Q5. _____ can be defined as the risk you have left after you’re done reducing risk to an acceptable level.
Q6. In the risk management methodology, finding where and what is the risk is known as _____.
Q7. The _____ is a high-level executive who can ensure that all subordinate managers will support the effort, without territory disputes, in-fighting, and other political games that can jeopardize the program.
Q8. The team that will perform the risk management assessment and recommends remediations where shortcomings are found is known as the _____ team.
Q9. Threat assessment – also known as threat intelligence is used to review the valuation of the assets that may be at risk.
Q10. In cybersecurity risk is the probability of loss, damage, destruction or disclosure of an information asset.
Q1. Which of these is the best definition of cybersecurity?
Q2. The three core characteristics of information are what give it value. Which of these is not one of those characteristics?
Q3. In the context of cybersecurity, _____ is the right of the individual or group to protect themselves and their information from unauthorized access.
Q4. A(n) _____ is an instance of an information asset suffering damage or destruction, unintended or unauthorized modification or disclosure, or denial of use.
Q5. Potential weaknesses in an asset or its defensive control systems are known as _____.
Answer:
Q6. A technique used to compromise a system is known as a(n) ____.
Answer:
Q7. Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) ______.
Q8. The creation, ownership, and control of original ideas as well as the representation of those ideas is known as _____.
Q9. _____ is the unauthorized entry into the real or virtual property of another party.
Q10. When an employee or other stakeholder of an organization, makes a mistake, that’s called _____.
Q11. If an adversary can increase their level of access by changing the type of access they have from user, to administrator, that’s called _____.
Q12. When an adversary steals your information, then tries to blackmail you into paying for it’s return it is known as _____.
Q13. _____ are malicious software elements designed to infect a user’s computer and either steal information and send it to the attacker, or damage, destroy or deny service to the computers.
Q14. _____ software looks like legitimate software but is either malware in disguise or legitimate software embedded with malware
Q15. An attack that attempts to overwhelm a computer target’s ability to handle incoming communications is known as _____.
Q16. An attack in which an attacker intercepts a communications stream between two users or systems and inserts himself in the conversation is known as a(n) _____ attack.
Q17. The category of threat that represents a situation where we must rely on technology that cannot be easily replaced is known as _____.
Q18. In a manager’s informational role they _____.
Q19. Management and leadership are interchangeable and have the same necessary skills.
Q20. Controlling is _____.
Q21. Which of these is not one of the three general categories of Cybersecurity policy?
Q22. Cybersecurity professionals have to have _____.
Q23. Those cybersecurity professional that define cybersecurity can_____
Q24. Thos cybersecurity proffessional that build cybersecurity can _____
Q25. The _____ develops the strategic plans for the cybersecurity function.
Q26. The job with the title of _____ is frequently called on to manage the day-to-day operations of security technology as well as to assist in training programs, developing policies.
Q27. The job with the title of _____ is someone who may configure security technologies like firewalls and IDPSs, implement security software, diagnose and troubleshoot problems with cybersecurity technologies
Q28. In recent years, there is a strong trend to make cybersecurity the responsibility of _____.
Q29. _____ is an approach to cybersecurity management requiring direct oversignt by the board of directors or senior management.
Q30. Cybersecurity governance, if properly implemented, can yield _____ benefits.
Q31. The ISO 27014:2013 is the ISO 27000 series standard for _____.
Q32. What is a system development lifecycle or SDLC approach?
Q33. Where does the name ‘waterfall model’ come from?
Q34. The _____ phase of the SecSDLC begins with instructions from upper management specifying the process, outcomes, and goals of the project as well as its budget and other constraints.
Q35. The _____ phase of the SecSDLC is where the components of the recommended program are acquired, tested, implemented, and retested.
Q36. In the area of system development CIP stands for _____.
Q37. What are ‘non-normal’ operations?
Q38. Contingency planning is accomplished with all of the following except _____.
Q39. When something has gone wrong, the organization should respond _____.
Q40. The BIA is also known as the _____.
Q41. A(n) _____ is an adverse event that could result in the loss, damage, destruction, or disclosure of an information asset.
Q42. Crisis management planning is focused on the _____.
Q43. In cybersecurity, risk is focused on the loss of confidentiality, integrity, and availability of information assets.
Q44. The probability that a specific vulnerability within an organization will be attacked by a threat is called _____.
Q45. The consequence of a loss from the outcome of a successful attack on an information asset, known as the “magnitude of harm” is known as the _____.
Q46. _____ can be defined as the quantity and nature of risk that the organization is willing to accept as it evaluates the trade-offs between security and accessibility.
Q47. _____ can be defined as the risk you have left after you’re done reducing risk to an acceptable level.
Q48. In the risk management methodology, finding where and what is the risk is known as _____.
Q49. The _____ is a high-level executive who can ensure that all subordinate managers will support the effort, without territory disputes, in-fighting, and other political games that can jeopardize the program.
Q50. The team that will perform the risk management assessment and recommends remediations where shortcomings are found is known as the _____ team.
I hope this Cybersecurity Foundations for Risk Management Coursera Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.
This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.
Keep Learning!
More Coding Solutions >>