Skip to content

Week 2 Introduction to Cybersecurity MCQs | IBM Coursera

quiz, question, game-2004350.jpg

Introduction to Cybersecurity Tools & Cyber Attacks, Course by IBM on Coursera Week 2 Quiz to pass the Week. Following are the answers to the quiz:

Introduction to Cybersecurity Tools & Cyber Attacks, Course by IBM on Coursera Week 2 Quiz

  1. Which hacker organization hacked into the Democratic National Convention and released Hillary Clinton’s emails?
    • a) Fancy Bears
    • b) Anonymous
    • c) Syrian Electronic Army
    • d) Guardians of the Peace
    • e) All of the above
    • Correct Answer: a) Fancy Bears
  2. What challenges are expected in the future?
    • a) Enhanced espionage from more countries
    • b) Far more advanced malware
    • c) New consumer technology to exploit
    • d) All of the above
    • Correct Answer: d) All of the above
  3. Why are cyber attacks using SWIFT so dangerous?
    • a) SWIFT is the protocol used to transmit all diplomatic telegrams between governments around the world
    • b) SWIFT is the flight plan and routing system used by all cooperating nations for international commercial flights
    • c) SWIFT is the protocol used by all banks to transfer money
    • d) SWIFT is the protocol used by all US healthcare providers to encrypt medical records
    • Correct Answer: c) SWIFT is the protocol used by all banks to transfer money
  4. Which statement best describes Authentication?
    • a) Assurance that a resource can be accessed and used
    • b) Prevention of unauthorized use of a resource
    • c) Protection against denial by one of the parties in communication
    • d) Assurance that the communicating entity is the one claimed
    • Correct Answer: d) Assurance that the communicating entity is the one claimed
  5. Trusted functionality, security labels, event detection, security audit trails and security recovery are all examples of which type of security mechanism?
    • a) Passive security mechanism
    • b) Active security mechanism
    • c) Contingent security mechanism
    • d) External security mechanism
    • Correct Answer: b) Active security mechanism
  6. If an organization responds to an intentional threat, that threat is now classified as what?
    • a) An open case
    • b) A malicious threat
    • c) An attack
    • d) An active threat
    • Correct Answer: d) An active threat (sometimes it also known as, a) an open case) so both are correct
  7. An attack that is developed particularly for a specific customer and occurs over a long period of time is a form of what type of attack?
    • a) Denial of Service (DOS)
    • b) Water Hole
    • c) Advanced Persistent Threat
    • d) Spectra
    • Correct Answer: c) Advanced Persistent Threat
  8. Which of these approaches could be used by hackers as part of a Business Email Compromise attack?
    • a) Account compromise
    • b) Request to make a payment
    • c) Attorney impersonation
    • d) CEO Fraud, where CEO sends email to an employee
    • Correct Answer: d) CEO Fraud, where CEO sends email to an employee
  1. Which type of actor was not one of the four types of actors mentioned in the video A brief overview of types of actors and their motives?
    • a) Hackers
    • b) Governments
    • c) Hactivists
    • d) Black Hats
    • e) Internal
    • Correct Answer: d) Black Hats
  2. A political motivation is often attributed to which type of actor?
    • a) Internal
    • b) Hactivist
    • c) Hackers
    • d) Security Analysts
    • Correct Answer: b) Hactivist
  3. The video Hacking organizations called out several countries with active government-sponsored hacking operations in effect. Which one of these was among those named?
    • a) Israel
    • b) Egypt
    • c) South Africa
    • d) Canada
    • Correct Answer: a) Israel
  4. Which of these is not a known hacking organization?
    • a) The Ponemon Institute
    • b) Fancy Bears
    • c) Syrian Electronic Army
    • d) Anonymous
    • e) Guardians of the Peace
    • Correct Answer: a) The Ponemon Institute
  5. Which type of actor hacked the 2016 US Presidential Elections?
    • a) Internal
    • b) Hactivists
    • c) Hackers
    • d) Government
    • Correct Answer: c) Government
  6. True or False: Passive attacks are easy to detect because the original messages are usually altered or undelivered.
    • Correct Answer: False
  7. True or False: Authentication, Access Control, and Data Confidentiality are all addressed by the ITU X.800 standard.
    • Correct Answer: True
  8. Cryptography, digital signatures, access controls, and routing controls considered which?
    • a) Security Policy
    • b) Specific security mechanisms
    • c) Pervasive security mechanisms
    • d) Business Policy
    • Correct Answer: b) Specific security mechanisms
  9. True or False: A tornado threatening a data center can be classified as an attack.
    • Correct Answer: False
  10. Traffic flow analysis is classified as which?
    • a) A passive attack
    • b) An active attack
    • c) An origin attack
    • d) A masquerade attack
    • Correct Answer: a) A passive attack
  11. How would you classify a piece of malicious code designed to cause damage, can self-replicate and spreads from one computer to another by attaching itself to files?
    • a) Virus
    • b) Ransomware
    • c) Worm
    • d) Adware
    • e) Spyware
    • f) Trojan Horse
    • Correct Answer: c) Worm
  12. Botnets can be used to orchestrate which form of attack?
    • a) Distribution of Spam
    • b) DDoS attacks
    • c) Phishing attacks
    • d) Distribution of Spyware
    • e) As a Malware launchpad
    • f) All of the above
    • Correct Answer: f) All of the above
  13. Policies and training can be classified as which form of threat control?
    • a) Active controls
    • b) Administrative controls
    • c) Passive controls
    • d) Technical controls
    • Correct Answer: b) Administrative controls
  14. Which type of attack can be addressed using a switched Ethernet gateway and software on every host on your network that makes sure their NICs are not running in promiscuous mode?
    • a) Packet Sniffing
    • b) Host Insertion
    • c) Trojan Horse
    • d) Ransomware
    • e) All of the above
    • Correct Answer: a) Packet Sniffing
  15. A flood of maliciously generated packets swamp a receiver’s network interface, preventing it from responding to legitimate traffic. This is characteristic of which form of attack?
    • a) A Denial of Service (DOS) attack
    • b) A Trojan Horse
    • c) A Masquerade attack
    • d) A Ransomware attack
    • Correct Answer: a) A Denial of Service (DOS) attack
  16. A person calls you at work and tells you he is a lawyer for your company and that you need to send him specific confidential company documents right away, or else! Assuming the caller is not really a lawyer for your company but a bad actor, what kind of attack is this?
    • a) A Social Engineering attack
    • b) A Trojan Horse
    • c) A Denial of Service attack
    • d) A Worm attack
    • Correct Answer: a) A Social Engineering attack
  17. True or False: An individual hacks into a military computer and uses it to launch an attack on a target he personally dislikes. This is considered an act of cyberwarfare.
    • Correct Answer: False

Introduction to Cybersecurity Tools & Cyber Attacks, Course by IBM on Coursera Week 2 Quiz to pass the Week.

Leave a Reply

Your email address will not be published. Required fields are marked *