Cookie Consent by Free Privacy Policy Generator Cybersecurity for Everyone Week 5 Quiz Answers - Coursera!

Cybersecurity affects everyone, including in the delivery of basic products and services. If you or your organization want to better understand how to address your cybersecurity, this is the course for you and your colleagues to take from seasoned professionals to your non-technical colleagues.

The course is currently offered by The University of Maryland through coursera platform.

You can enroll here:

https://www.coursera.org/learn/cybersecurity-for-everyone

Coursera Cybersecurity for Everyone Quiz Answers Week 3

Coursera X Cybersecurity for Everyone Week 5 Quiz Answers!

Question 1. The best way to describe hacking is as a single effort or activity conducted quickly and effortlessly by the threat actor.

True
False

Question 2. Spear phishing is a tactic in which part of the Lockheed Martin Attack Kill Chain Model?

Delivery
Reconnaissance
Weaponization
Installation
Command and Control

Question 3. Investigating the organizational chart of a target is part of which phase of the Lockheed Martin Attack Kill Chain Model?

Delivery
Reconnaissance
Weaponization
Installation
Command and Control

Question 4. IT System Administrators often can easily identify who attackers are and submit their identities to law enforcement for prosecution.

True
False

Question 5. The phase of the hacking process where a threat actor’s code is executed onto a victim’s device is called:

Delivery
Reconnaissance
Exploitation
Installation
Command and Control

Question 6. Writing an exploit to leverage a vulnerability in the windows 10 operating system would be included in which phase of the Lockheed Martin Cyber Kill Chain?

Delivery
Reconnaissance
Weaponization
Installation
Command and Control

Question 7. The use of _______ often makes it difficult for victims of cyber-attack to identify the threat actor involved.

Social media
IXP
Proxy servers
ISP
Routers

Question 8. Attribution can be difficult for victims of cyber attack primarily due to: 

The difficulty for IT workers to work with technology in their own network
The interplay between proxies, encryption, and threat actors hiding in plain network traffic
The difficulty of security organizations to communicate with one another
The generally slow nature of government response to cyber attack
None of the Above

Post a Comment

Previous Post Next Post