Wednesday, October 19, 2016

CyberSecurity and X-Factor: Threat Intelligence - Quiz

Coursera - Hundreds of Specializations and courses in business, computer science, data science, and more Top Computer Science Specializations on Coursera Top Data Science Specializations on Coursera 


1. The pre-requisites for a security incident include threat and vulnerability.
  • True
  • False

Robotics Specialization from University of Pennsylvania Business Foundations from the Wharton School Business and Financial Modeling from the Wharton School 

 2.
Which of the following is a threat to you as a Coursera learner?

  • Loss of confidentiality
  • System unavailability
  • Loss of privacy

  Online business courses to jumpstart your future. 

 3.
What format does threat intelligence come in?

  • Written report, interview, web
  • Internet, file and mobile
  • Internet, blog, mobile
  • Google search

Career skills to jumpstart your future. Start your future with a Business Analytics Certificate. Online data science courses to jumpstart your future. 

 4.
Cybercrimes perpetrated by Hactivists are rarely prosecuted because (select all that apply)


  • Attribution can be difficult
  • Damages are usually minor
  • Crimes often occur across borders requiring significant international cooperation

Online learning to jumpstart your future. Start your future on Coursera today. Online computer science courses to jumpstart your future. 

 5.
Locky is a form of ransomware

  • False
  • True

Coursera Purple CS Design 3 Coursera DS Design 10 Coursera Business Vertical Orange Design 10 

 6.
How does Locky get on your machine

  • The cyber criminal gains access to a users credentials and logs into the organization's systems and uploads the file
  • Spam email with an attachment. The attached document file is encrypted and requires the user to enable macros
  • Embedded link
  • It launches from a thumb drive

Coursera AH Purple Design 2 Coursera General Design 2 Green Coursera CS 

 7.
Cyber insurance protects organizations and individuals from cyber crimes.

  • False
  • True

Coursera Data Science Coursera Business Vertical Coursera Arts & Humanities 

 8.
Which of the following is an example of ransomware (select all that apply)?


  • Cryptowall
  • TeslaCrypt
  • Locky
  • Macro encoded into a Word document

Default Creative-30percent April2516-25off-sitewide300X250 April1816-30off-programwide300X250 

 9.
Producers of ransomware operate in a highly professional looking manner


  • True
  • False

April0416-20off-sitewide300X250 Course-specific creative-Building a Personal Brand by Gary Vaynerchuk Course-specific creative-JavaScript: Understanding the Weird Parts 

 10.
Threat intelligence must take into consideration generational differences

  • True
  • False
Course-specific creative-The Complete iOS 9 Developer Course - Build 18 Apps Course-specific creative-iOS 9 and Swift 2: From Beginner to Paid Professional Course-specific creative-The Complete Ethical Hacking Course: Beginner to Advanced!

9 comments:

  1. Cyber Security framework helps you understand the risks that can affect the system brutally, how to customize the effects of risks, the way to respond to them, what other ways should be implemented in order to make your system secure and robust from various attacks.

    ReplyDelete