Introduction to Cybersecurity Foundations Quiz Answers Coursera

Hello Friends in this article i am gone to share Coursera Course: Introduction to Cybersecurity Foundations All Weeks Quiz Answers with you.. | Introduction to Cybersecurity Foundations Quiz Answers Coursera

Introduction to Cybersecurity Foundations Quiz Answers Coursera

Cybersecurity Fundamentals quiz answers

Question 1)
According to the Cybersecurity Foundations course, which of the following represents competence with a technical skill?

  • Being able to perform the skill now
  • Having read about performing the skill
  • Having performed the skill in the past
  • Having performed the skill recently

Question 2)
Which US government organization defines cybersecurity as “The art of protecting networks, devices, and data from unauthorized access or criminal use while ensuring confidentiality, integrity and availability of the information”?

  • NSA
  • NIST
  • Department of Justice

Question 3)
Which part of the CIA triad deals with making sure data is only modified by authorized sources?

  • Integrity
  • Availibility
  • Intelligence
  • Confidentiality

Question 4)
Which of the following IS NOT true concerning Confidentiality from the CIA triad?

  • Protects the integrity of data and systems
  • Often implemented through the use of encryption
  • Meant to keep secret and sensitive information secret and sensitive
  • Is usually very important in high-security environments that deal with sensitive information

Question 5)
At the time of the creation of this course, how many files does the average US employee have access to?

  • 500
  • 2.5 million
  • 11 million
  • 1 million


Network Fundamentals quiz answers

Question 1)
What is the service that converts domain names (like to IP addresses (like in order to allow our computers to communicate with those domains and addresses?

  • DNS – Domain Name Service
  • DNS – Domain Numbering System
  • SDN – Software Defined Networking
  • DSN – Digital Subscriber Network

Question 2)
This is the most popular packet analysis tool, and it’s used in this course to look at and examine packets. What is it?

  • Sharkwire
  • Wireshark
  • Sharkbait
  • SharkOnthewire

Question 3)
What type of address is this?

  • It’s an IP address
  • It’s a MAC address
  • It’s a home address
  • It’s a planetary coordinate from Mandalorian

Question 4)
When you send data across the internet or a network, that data is first broken into tiny pieces called what?

  • Packets
  • MIcrobes
  • Data dots
  • Net fragments

Question 5)
This protocol is used to connect to devices across the internet or networks. It ALWAYS completes its connections by completing the Three-Way Handshake. What is it?

  • FTP (File Transfer Protocol)
  • UDP (User Datagram Protocol)
  • TCP (Transmission Control Protocol)
  • ICMP (Internet Control Messaging Protocol)


Cloud Computing Quiz Answers

Question 1)
Which services are you able to build in a cloud service environment?

  • Linux server
  • A full network
  • Database service
  • All of these

Question 2)
What is the name of Amazon’s cloud services platform?

  • Amazon Azure
  • AWS (Amazon Web Service)
  • ACP (Amazon Cloud Platform)
  • None of these

Question 3)
Cloud service providers cannot possibly keep backups and records automatically of every single subscriber’s data, services and activities. This creates the most challenge for which part of cybersecurity?

  • DevSecOps
  • Pentesting
  • Application security
  • Forensics and incident response

Question 4)
What is the cloud service provided by Google?

  • GC (Google Cloud)
  • Google Azure
  • GCP (Google Cloud Platform)
  • GWS (Google Web Service)

Question 5)
Which of the following are advantages of using cloud services?

  • Rapid elasticity: The ability to “get big” and “get small” very fast as far as resources
  • The ability to provision services without communicating with the cloud service provider (Amazon, Microsoft, Google)
  • Access to a large amount of resources
  • All of these


Introduction to Cybersecurity Foundations Final Quiz Answers

Question 1)
According to this course, how long does it take on average for an organization to find out they have been hacked or breached after the initial compromise?

  • 45 days
  • 900 days
  • 10 days
  • 207 days

Question 2)
Which of the following best describes encrypting data?

  • Scrambling data so it cannot be read or deciphered.
  • Adding more data to the existing data
  • Generating a hash to represent the data
  • Hiding data so it can’t be seen.

Question 3)
This terminology describes the concept of combining multiple security controls to gain the best levels of protection.

  • Elite security
  • New security
  • Defense-in-depth
  • Next-generation security

Question 4)
How do you know when you’ve reached the point of being 100% secure and being 100% hacker-proof?

  • There is no such thing as 100% secure
  • When you start a valid security program
  • When you have all the requirements of your company’s security policies
  • When you don’t get alerts about hacking attempts or breaches

Question 5)
Once you have connected to a device or established a connection via TCP, what is the “normal” way to disconnect?

  • Two-way FIN/ACK combo
  • Turning off your computer quickly
  • Repeating the three-way handshake
  • Using the four-way FIN/ACK combo to disconnect

Question 6)
From a cybersecurity standpoint, what is the primary difference between using a “cleartext” protocol such as Telnet versus an encrypted protocol such as SSH?

  • There is no difference. They are twin protocols.
  • With SSH, you would see the password and username but not the data.
  • If you did a Wireshark capture of Telnet traffic, you would see the Telnet login and password. With SSH, you would not.
  • If you were to capture the SSH traffic, you would see the SSH login and password. With Telnet, you would not.

Question 7)
Which protocol is usually the protocol of choice to send video streaming traffic like Netflix, Amazon, Hulu and so on?

  • UDP
  • TCP
  • ICMP

Question 8)
Which of the following are considered to be networks?

  • The internet
  • The connected devices at your job
  • The collection of devices connected to the Starbucks Wi-Fi at any given time
  • All of these

Question 9)
This concept in AWS describes your private network that is inside the AWS network. What is it?

  • Cloudnet
  • AWS Private Net
  • VPC (Virtual Private Cloud)
  • VPN (Virtual Private Network)

Question 10)
When you stand up a web service or web page in a cloud service like AWS, Azure or Google, how soon can you make that page available to the world?

  • Within 24 hours
  • Within 72 hours
  • Within 48 hours
  • Instantly

Question 11)
Which of the following DOES NOT represent a cloud service?

  • Dropbox
  • Office 365
  • Yahoo
  • Salesforce

Question 12)
What is the name of Microsoft’s cloud service?

  • Microsoft Azure
  • MSN (Microsoft Services Network)
  • MCP (Microsoft Cloud Platform)
  • MWS (Microsoft Web Service)



Leave a Comment