Introduction to Cybersecurity Tools & Cyber Attacks, Course by IBM on Coursera Week 2 Quiz to pass the Week. Following are the answers to the quiz:
Introduction to Cybersecurity Tools & Cyber Attacks, Course by IBM on Coursera Week 2 Quiz
- Which hacker organization hacked into the Democratic National Convention and released Hillary Clinton’s emails?
- a) Fancy Bears
- b) Anonymous
- c) Syrian Electronic Army
- d) Guardians of the Peace
- e) All of the above
- Correct Answer: a) Fancy Bears
- What challenges are expected in the future?
- a) Enhanced espionage from more countries
- b) Far more advanced malware
- c) New consumer technology to exploit
- d) All of the above
- Correct Answer: d) All of the above
- Why are cyber attacks using SWIFT so dangerous?
- a) SWIFT is the protocol used to transmit all diplomatic telegrams between governments around the world
- b) SWIFT is the flight plan and routing system used by all cooperating nations for international commercial flights
- c) SWIFT is the protocol used by all banks to transfer money
- d) SWIFT is the protocol used by all US healthcare providers to encrypt medical records
- Correct Answer: c) SWIFT is the protocol used by all banks to transfer money
- Which statement best describes Authentication?
- a) Assurance that a resource can be accessed and used
- b) Prevention of unauthorized use of a resource
- c) Protection against denial by one of the parties in communication
- d) Assurance that the communicating entity is the one claimed
- Correct Answer: d) Assurance that the communicating entity is the one claimed
- Trusted functionality, security labels, event detection, security audit trails and security recovery are all examples of which type of security mechanism?
- a) Passive security mechanism
- b) Active security mechanism
- c) Contingent security mechanism
- d) External security mechanism
- Correct Answer: b) Active security mechanism
- If an organization responds to an intentional threat, that threat is now classified as what?
- a) An open case
- b) A malicious threat
- c) An attack
- d) An active threat
- Correct Answer: d) An active threat (sometimes it also known as, a) an open case) so both are correct
- An attack that is developed particularly for a specific customer and occurs over a long period of time is a form of what type of attack?
- a) Denial of Service (DOS)
- b) Water Hole
- c) Advanced Persistent Threat
- d) Spectra
- Correct Answer: c) Advanced Persistent Threat
- Which of these approaches could be used by hackers as part of a Business Email Compromise attack?
- a) Account compromise
- b) Request to make a payment
- c) Attorney impersonation
- d) CEO Fraud, where CEO sends email to an employee
- Correct Answer: d) CEO Fraud, where CEO sends email to an employee
- Which type of actor was not one of the four types of actors mentioned in the video A brief overview of types of actors and their motives?
- a) Hackers
- b) Governments
- c) Hactivists
- d) Black Hats
- e) Internal
- Correct Answer: d) Black Hats
- A political motivation is often attributed to which type of actor?
- a) Internal
- b) Hactivist
- c) Hackers
- d) Security Analysts
- Correct Answer: b) Hactivist
- The video Hacking organizations called out several countries with active government-sponsored hacking operations in effect. Which one of these was among those named?
- a) Israel
- b) Egypt
- c) South Africa
- d) Canada
- Correct Answer: a) Israel
- Which of these is not a known hacking organization?
- a) The Ponemon Institute
- b) Fancy Bears
- c) Syrian Electronic Army
- d) Anonymous
- e) Guardians of the Peace
- Correct Answer: a) The Ponemon Institute
- Which type of actor hacked the 2016 US Presidential Elections?
- a) Internal
- b) Hactivists
- c) Hackers
- d) Government
- Correct Answer: c) Government
- True or False: Passive attacks are easy to detect because the original messages are usually altered or undelivered.
- Correct Answer: False
- True or False: Authentication, Access Control, and Data Confidentiality are all addressed by the ITU X.800 standard.
- Correct Answer: True
- Cryptography, digital signatures, access controls, and routing controls considered which?
- a) Security Policy
- b) Specific security mechanisms
- c) Pervasive security mechanisms
- d) Business Policy
- Correct Answer: b) Specific security mechanisms
- True or False: A tornado threatening a data center can be classified as an attack.
- Correct Answer: False
- Traffic flow analysis is classified as which?
- a) A passive attack
- b) An active attack
- c) An origin attack
- d) A masquerade attack
- Correct Answer: a) A passive attack
- How would you classify a piece of malicious code designed to cause damage, can self-replicate and spreads from one computer to another by attaching itself to files?
- a) Virus
- b) Ransomware
- c) Worm
- d) Adware
- e) Spyware
- f) Trojan Horse
- Correct Answer: c) Worm
- Botnets can be used to orchestrate which form of attack?
- a) Distribution of Spam
- b) DDoS attacks
- c) Phishing attacks
- d) Distribution of Spyware
- e) As a Malware launchpad
- f) All of the above
- Correct Answer: f) All of the above
- Policies and training can be classified as which form of threat control?
- a) Active controls
- b) Administrative controls
- c) Passive controls
- d) Technical controls
- Correct Answer: b) Administrative controls
- Which type of attack can be addressed using a switched Ethernet gateway and software on every host on your network that makes sure their NICs are not running in promiscuous mode?
- a) Packet Sniffing
- b) Host Insertion
- c) Trojan Horse
- d) Ransomware
- e) All of the above
- Correct Answer: a) Packet Sniffing
- A flood of maliciously generated packets swamp a receiver’s network interface, preventing it from responding to legitimate traffic. This is characteristic of which form of attack?
- a) A Denial of Service (DOS) attack
- b) A Trojan Horse
- c) A Masquerade attack
- d) A Ransomware attack
- Correct Answer: a) A Denial of Service (DOS) attack
- A person calls you at work and tells you he is a lawyer for your company and that you need to send him specific confidential company documents right away, or else! Assuming the caller is not really a lawyer for your company but a bad actor, what kind of attack is this?
- a) A Social Engineering attack
- b) A Trojan Horse
- c) A Denial of Service attack
- d) A Worm attack
- Correct Answer: a) A Social Engineering attack
- True or False: An individual hacks into a military computer and uses it to launch an attack on a target he personally dislikes. This is considered an act of cyberwarfare.
- Correct Answer: False
Introduction to Cybersecurity Tools & Cyber Attacks, Course by IBM on Coursera Week 2 Quiz to pass the Week.