Cybersecurity Roles, Processes & Operating System Security complete course is currently being offered by IBM through Coursera platform and is being taught by IBM Global Subject Matter Experts.
About this Course
This course gives you the background needed to understand basic Cybersecurity around people. process and technology.
You will learn:
● Understand the key cybersecurity roles within an Organization.
● List key cybersecurity processes and an example of each process.
● Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile.
● Understand the concept of Virtualization as it relates to cybersecurity
Also Check: How to Apply for Coursera Financial Aid

Welcome to People, Process and Operating System Fundamentals for Cybersecurity
Q1) In the video Welcome to
People, Process and Operating System Fundamentals for Cybersecurity, Alex
mentions especially needing which two (2) technical skills and which two (2)
soft skills ?
Effective Communications and
Critical Thinking
Firewalls and Antivirus
Q2) The statement: “The
protection of computer systems from theft or damage to the hardware, software
or information on them, as well as from disruption or misdirection of the
services they provide.” Is a good definition for what ?
IT Security
Frameworks, Policies and Roles
Q1) When looking at security
standard and compliance, which three (3) are characteristics of best practices,
baselines and frameworks ?
They seek to improve
performance, controls and metrics.
They help translate the
business needs into technical or operational needs.
They are used to improved
controls, methodologies and governance for the IT department.
Q2) Which three (3) of these roles would likely exist in an Information Security organization ?
CISO, Chief Information
Security Officer
Information Security
Architect
Vulnerability Assessor
Business Process Management and IT Infrastructure Library Basics
Q1) In the video Introduction
to Process, which three (3) items were called out as critical to the success of
a Security Operations Center (SOC) ?
Tools
People
Process
Q2) Process performance
metrics typically measure items in which four (4) categories ?
Rework
Cost
Quality (defect rate)
Cycle time
Q3) Service Portfolio
Management, Financial Management, Demand Management and Business Relationship
Management belong to which ITIL Service Lifecycle Phase ?
Service Strategy
Q4) Log, Assign, Track,
Categorize, Prioritize, Resolve and Close are all steps in which ITIL process ?
Incident Management
People, Process and
Technology
Q1) The process in ITIL where changes are released to an IT environment is called what ?
Release Management
Q2) Which two (2) processes
are operational processes? (Select 2)
Incident Management
Change Management
Q3) Which two (2) of these
are considered best practices? (Select 2)
ITIL
Project Manager methodologies
Q4) Which service management
process has the responsibility of understanding the root cause of a problem ?
Problem Management
Q5) In the video What is IT
Security, Elio Sanabria Echeverria put forth a definition that included which
factors ?
All of the above.
Q6) This description belongs
to which information security role? “This position is in charge of testing the
effectiveness of computer information systems, including the security of the
systems and reports their findings.”
Information Security Auditor
Q7) Which of these statements
more accurately conveys what was stated in the video Introduction to Process ?
As volumes of security alerts and false positives grow, more burden is placed upon Security Analysts & Incident Response teams.
Q8) Continual Process
Improvement consists of which four (4) items? (Select 4)
Process Metrics
Customer Feedback
Maturity Assessments
Financial performance
Q9) Event Management,
Incident Management, and Problem Management belong to which ITIL Service
Lifecycle Phase ?
Service Operations
Q10) Maintaining Information
Security Policy (ISP) and specific security policies that address each aspect
of strategy, objectives and regulations is the part of which ITIL process ?
Information Security
Management
Cybersecurity Roles, Processes & Operating System Security Week 2 Quiz Answers - Coursera!
Further discussion of confidentiality, integrity and availability
Q1) In the Alice, Bob and
Trudy examples, who is always portrayed as the intruder ?
Trudy
Q2) Which aspect of the CIA
Triad would cover preserving authorized restrictions on information access and
disclosure ?
Confidentiality
Q3) A message that Bob
receives from Alice is genuine and can be verified as such demonstrates which
key property ?
Authenticity
Principles of the CIA Triad
Q1) The unauthorized
disclosure of information would violate which aspect of the CIA Triad ?
Confidentiality
Q2) Which aspect of the CIA
Triad would cover ensuring information non-repudiation and authenticity ?
Integrity
Q3) If Trudy intercepts and
reads a message that Alice is sending to Bob, and then she deletes it without
allowing it to be delivered, which 2 aspects of the CIA Triad have been
violated ?
Availability & Confidentiality
What is AAA ?
Q1) Which is the correct
order for gaining access to a resource ?
Identification, Authentication, Authorization, Accountability
Q2) Which type of method would
include Something you know, such as a password ?
Authentication
Access Control
Q1) Which three (3) are
common methods of access control ?
Role Based Access Control
(RBAC)
Discretionary Access Control
(DAC)
Mandatory Access Control (MAC)
Q2) Which three (3) items
would be considered Physical Access Control methods ?
Perimetral
Building
Work areas
Quiz 5 Authentication and Access control
Q1) Identify the three (3)
security functions associated with AAA.
Authorization
Accountability (Accounting)
Authentication
Q2) Which statement best
describes DAC (Discretionary Access Control) ?
Each object (folder or file) has an owner and the owner defines the rights and privilege.
Q3) Which is an example of
technical uses of physcial security controls ?
All of the above.
Q4) Name one of the three
control types.
Technical
Q5) Which of the following is
NOT an authentication method ?
Something you get
Q6) Hamid has access to
certain resources because he is a Quality Control Inspector and he has access
to other resources because he is the manager of that team. Which form of access
control is his company most likely using ?
Role Based Access Control (RBAC)
Q7) Which two (2) of these
are useful tools used to monitor network access control processes ?
Sniffers
HoneyPots
Cybersecurity Roles, Processes & Operating System Security Week 3 Quiz Answers - Coursera!
User and Kernel Modes
Q1) How many unique address
spaces are used by applications running in kernel mode ?
1
File Systems and Directory Structure
Q1) Which two (2) of these
file systems could you use to format a 64 GB USB drive ?
NTFS
FAT32
Q2) Where does Windows 10
store 64-bit applications ?
\Program Files
Shortcuts and Commands
Q1) Which shortcut will close
all applications ?
Alt+F4
Q2) What is the shortcut for
saving a screenshot ?
Win+PrtScn
Windows Operating System Security Basics
Q1) What Windows mode do
users interact with directly ?
User mode
Q2) What does Windows create
every time an applications is started in user mode ?
A process.
Q3) If you are setting up a
new Windows laptop with a 128Gb hard drive and you want only a single file
partition on the drive, which file systems can choose from ?
NTFS
Q4) A file name in Windows
must be unique where ?
Within the same directory.
Q5) Windows 10 can be
purchased for which versions ?
32 bit or 64 bit.
Q6) If you want to roll back
or undo an action, what shortcut should you use ?
Ctrl-Z
Q7) Which shortcut will
switch between running applications ?
Alt-Tab
Q8) Where does Windows 10
store 32-bit applications ?
\Program Files (x86)
Q9) What is the shortcut to
open the Task Manager
Ctrl+Shift+Esc
Key Components
Q1) Which three (3)
statements about Linux are True ?
Linux guarantees end users
freedom to run, study, share, and modify the software.
Linux is an open source
operating system.
Linux is licensed under the General Public License (GNU).
File systems
Q1) Executable files such as
ping, grep and cp are stored in which directory ?
/bin
Linux Basic Commands
Q1) The Linux “kill” command
does which of the following ?
Stop an executing process.
Q2) What permissions can be
set on a file in Linux ?
read, write, execute
Q3) Which basic Linux command
deletes an empty directory ?
rmdir
Q4) Which is not a group that
can own a file ?
anybody
Linux Operating System security basics
Q1) Which three (3) groups
can "own" a file in Linux ?
user, group, everybody
Q2) What can be known about a
file with permissions set to "-rwxr-x-r--" ?
The file is not a directory; the user can read, write and execute the file; the group cannot modify the file, and others not in the group an read it only.
Q3) A person using Linux
would normally interact directly with which ?
The shell.
Q4) In the Linux file system,
what is the highest level in the directory structure ?
root
Q5) In Linux, a directory is
a special type of ____.
file
Q6) What does the nano
command do ?
nano is a basic text file editor.
Q7) Application configuration
files are usually stored in which directory ?
/etc
macOS Resources Knowledge Check
Q1) What application can you
use to see all the active running applications and processes on macOS ?
Activity Monitor
Q2) What feature in macOS
prevents unauthorized applications from being installed ?
Gatekeeper
Q3) Which three (3) utilities
are found when booting macOS to the recovery partition? (Select 3)
Safari
Time Machine
Disk Utility
Cybersecurity Roles, Processes & Operating System Security Week 4 Quiz Answers - Coursera!
Virtualization Basics and Cloud Computing
Q1) Where does the hypervisor sit in a virtual architecture ?
Between the hardware and the operating system(s).
Q2) Which are the first two steps to perform in a cloud deployment ?
Consolidate and Virtualize
Q3) Which are the three (3) most common forms of Cloud computing ?
Hybrid Cloud
Public Cloud
Private Cloud
Q4) Which type of cloud is the best choice for a start-up company with no existing IT infrastructure and limited funds ?
Public Cloud
Q5) Which three (3) are the primary benefits of cloud computing ?
Efficiency
Flexibility
Strategic Value
Q6) Which is a primary security consideration in a cloud environment ?
All of the above.
Virtualization Basics
Q1) Virtualization allows you
to create multiple simulated environments or dedicated resources from how many
physical hardware systems ?
1
Q2) What relays requests from
the VM to the actual hardware ?
hypervisor
Q3) Which two steps of a
cloud deployment are performed after you move your applications to the cloud ?
Integrate and Optimize
Q4) Which type of cloud is
the best choice for a company with a robust existing IT infrastructure and very
serious data privacy concerns ?
Private Cloud
Q5) Which is a primary
security consideration in a cloud environment ?
All of the above.
Also Check: Cryptography All Weeks Quiz Answers - Coursera!
Post a Comment