Cybersecurity affects everyone, including in the delivery of basic products and services. If you or your organization want to better understand how to address your cybersecurity, this is the course for you and your colleagues to take from seasoned professionals to your non-technical colleagues.

The course is currently offered by The University of Maryland through coursera platform.

You can enroll here:

Coursera Cybersecurity for Everyone Quiz Answers Week 4

Coursera X Cybersecurity for Everyone Week 4 Quiz Answers!

Q.1 APT is an acronym for:

Advanced Process Threat
Advanced Persistent Threat
Aggregated and Pernicious Threat
Advanced Personal Threat
Aggregated Parallel Threat

Q2. Which of the following is NOT considered a cyber threat actor?

Individuals or groups who use information technology to promote a political agenda
Nation states who utilize information technology and network access to acquire data or to disrupt operations.
Criminal gangs who use information technology and the internet to steal information for profit, or utilize technology to solicit a ransom.
People who are curious about how technology works and report vulnerabilities to organizations and authorities they discover in their own devices and networks.
None of the Above

Q3. A hacker who defaces a government website to protest the arrest of a political prisoner would be considered what type of threat actor?

Freedom Fighter
White Hat Hacker
None of the above

Q4. How would you best describe the capabilities and motives of an APT?

They are lightly skilled, uncoordinated and primarily motivated by curiosity.
They are lightly skilled, coordinated and primarily motivated by economic incentives.
They are heavily skilled, highly coordinated, and usually motivated by national objectives such as espionage.
They are heavily skilled, uncoordinated, and motivated due to moral objections to corporate policies.
None of the Above

Q5. Fancy Bear is a threat actor that is best categorized as what type of threat actor?

Basement Hacker
Criminal Syndicate
None of the Above

Q6. Criminal organizations engage in hacking activity primarily to:

Steal national secrets
Protest unpopular policy positions by a national government
Illegally obtain monies from their victims
Increase their reputation in the hacking community or to simply understand how to take advantage of vulnerabilities in technology 
None of the Above

Post a Comment

Previous Post Next Post