Skip to main content

Cybersecurity Capstone: Breach Response Case Studies All Quiz Answer | Third-Party Breach Graded Assessment & Ransomware Graded Assessment | Week 3

 #cybersecurity #coursera #quiz #solution #answer 



Third-Party Breach Graded Assessment


Question 1) True or False. According to a 2018 Ponemon study, organizations surveyed cited "A third-party misused or shared confidential information..." as their top cyber security concern for the coming year.

  • True
  • False



Question 2) How effective were the processes for vetting third-parties as reported by the majority (64%) of the companies surveyed?

  • Highly effective
  • Effective
  • Somewhat or not effective
  • Not effective at all



Question 3) In the first few months of 2020 data breaches were reported from Instagram, Carson City, Amazon, GE, T-Mobile, radio.com, MSU, and Marriot. While different data were stolen from each organization, which two data elements were stolen from all of them ? (Select 2)


  • Corporate financial data
  • Confidential corporate strategy data
  • Customer financial information
  • Personal information



Question 4) True or False. More than 63% of data breaches can be linked to a third-party.

  • True
  • False



Question 5) According to a 2019 Ponemon study, which is the most common course of action for a consumer who has lost personal data in a breach ?

  • Tell others of their experience
  • Use social media to complain about their experience
  • Comment directly on the company's website

  • File a complaint with the FTC or other regulatory body





Ransomware Graded Assessment


Question 1) You get a pop-up message on your screen telling you have been locked out of your computer and that access will remain blocked until you pay a fee to have your access restored. What type of ransomware has attacked your system ?


  • Blockware
  • Leakware/Doxware
  • Locker
  • Crypto



Question 2) You get a pop-up message on your screen telling you that embarrassing photos taken of you at a college party many years ago have been downloaded and will be made public unless you pay a fee. What type of ransomware has attacked your system ?


  • Leakware/Doxware
  • Crypto
  • Locker
  • Blockware



Question 3) You get an email from your Internet service provider addressed to "Dear Customer" asking you to log in and verify your credentials due to "suspicious activity" detected in your account. This email is most likely trying to exploit which attack vector ?


  • Malicious Links
  • Remote Desktop Protocol (RDP)
  • Software Vulnerabilities
  • Phishing



Question 4) A person you meet at a party offers to help you optimize your computer so you arrange for her to log in remotely. The next time you reboot your system, you get a pop-up message telling you all your critical files have been encrypted and you must pay a ransome to get the encryption key. What attack vector was used to exploit your system?


  • Remote Desktop Protocol (RDP)
  • Software Vulnerabilities
  • Phishing
  • Malicious Links



Question 5) You fear that the security patches sent out by the vendor of one of your products may introduce changes to what you are used to so you never allow the updates. What attack vector are you setting yourself up for ?


  • Malicious Links
  • Remote Desktop Protocol (RDP)
  • Software Vulnerabilities
  • Phishing



Question 6) You log into your bank and see an offer for a 0% interest rate loan. You click on the link to check out the details and suddenly your computer is locked and there is a message demanding payment in order to unlock it. Your bank's website was hacked! What attack vector was being used to install ransomware on your system ?


  • Remote Desktop Protocol (RDP)
  • Phishing
  • Software Vulnerabilities
  • Malicious Links



Question 7) True or False. Being vigilant about email you receive, links your follow and websites you visit is an effective way to keep yourself safe from a ransomware attack.


  • True
  • False



Question 8) Which ransomware used fake Adobe Flash download websites to distribute and install ransomware?


  • Jigsaw
  • GoldenEye
  • WannaCry
  • Bad Rabbit



Question 9) True or False. It is feared that in the future our cars, homes and factories may fall victim to ransomware attacks as more and more devices join the Internet of Things.


  • True
  • False

Comments

Popular posts from this blog

Weekly challenge 3 data analyst google professional certificate

1 . Question 1 The manage stage of the data life cycle is when a business decides what kind of data it needs, how the data will be handled, and who will be responsible for it. 1 / 1  point True False Correct During planning, a business decides what kind of data it needs, how it will be managed throughout its life cycle, who will be responsible for it, and the optimal outcomes. 2 . Question 2 A data analyst is working at a small tech startup. They’ve just completed an analysis project, which involved private company information about a new product launch. In order to keep the information safe, the analyst uses secure data-erasure software for the digital files and a shredder for the paper files. Which stage of the data life cycle does this describe? 1 / 1  point Archive Plan Manage Destroy Correct This describes the destroy phase, during which data analysts use secure data-erasure software and shred paper files to protect private information. 3 . Question 3 In the analyze phase of the d

Prepare Data for Exploration: Weekly challenge 4

Prepare Data for Exploration: Weekly challenge 4 1 . Question 1 A data analytics team labels its files to indicate their content, creation date, and version number. The team is using what data organization tool? 1 / 1  point File-naming verifications File-naming references File-naming conventions File-naming attributes Correct 2 . Question 2 Your boss assigns you a new multi-phase project and you create a naming convention for all of your files. With this project lasting years and incorporating multiple analysts it’s crucial that you create data explaining how your naming conventions are structured. What is this data called? 0 / 1  point Descriptive data Named convention Metadata Labeled data Incorrect Please review the video on naming conventions . 3 . Question 3 A grocery store is collecting inventory data from their produce section. What is an appropriate naming convention for this file? 0 / 1  point Todays_Produce Produce_Inventory_2022-09-15_V01 Todays Produce 2022-15-09 Inventory

Prepare Data for Exploration : weekly challenge 1

Prepare Data for Exploration : weekly challenge 1 #coursera #exploration #weekly #challenge 1 #cybersecurity #coursera #quiz #solution #network Are you prepared to increase your data exploration abilities? The goal of Coursera's Week 1 challenge, "Prepare Data for Exploration," is to provide you the skills and resources you need to turn unprocessed data into insightful information. With the knowledge you'll gain from this course, you can ensure that your data is organised, clean, and ready for analysis. Data preparation is one of the most important processes in any data analysis effort. Inaccurate results and flawed conclusions might emerge from poorly prepared data. You may prepare your data for exploration with Coursera's Weekly Challenge 1. You'll discover industry best practises and insider advice. #answers #questions #flashcard 1 . Question 1 What is the most likely reason that a data analyst would use historical data instead of gathering new data? 1 / 1