and CORRECT Answers
1. Fill in the blank: Examples of security include domains
security and risk management and security architec-
ture and engineering.
2. A security professional is asked to destroy and dis- Asset security
pose of old hard drives that include confidential cus-
tomer information. Which security domain is this task
related to?
3. Your supervisor asks you to audit user permissions Security assessment and
for payroll data to ensure no unauthorized employ- testing
ees have access to it. Which security domain is this
audit related to?
4. You are asked to investigate an alert related to an Security operations
unknown device that is connected to the company's
internal network. After you complete your investiga-
tion, you follow company policies and procedures to
implement preventative measures that will stop the
potential threat posed by the device. Which security
domain is this scenario related to?
5. Fill in the blank: A is malicious code written to in- computer virus
terfere with computer operations and cause damage
to data.
6. The spread globally within a couple of months Brain virus
due to users inserting a disk into their computers
that was meant to track illegal copies of medical soft-
ware.
7. human
1/9
, Cybersecurity Intro Coursera Notes UPDATED ACTUAL Questions
and CORRECT Answers
Fill in the blank: Social engineering is a manipulation
technique that exploits error to gain access to
private information.
8. A security professional conducts internal training to Malicious software being
teach their coworkers how to identify a social engi- deployed
neering attack. What types of security issues are they Phishing attacks
trying to avoid? Select all that apply. Employees inadvertently re-
vealing sensitive data
9. Which of the following tasks are part of the security Compliance
and risk management domain? Select all that apply Business continuity
Defining security goals and
objectives
10. A security professional is optimizing data security by Security architecture and en-
ensuring that effective tools, systems, and processes gineering
are in place. Which domain does this scenario de-
scribe?
11. Which domain involves securing digital and physi- Asset security
cal assets, as well as managing the storage, mainte-
nance, retention, and destruction of data?
12. A security professional is auditing user permissions Security assessment and
at their organization in order to ensure employees testing
have the correct access levels. Which domain does
this scenario describe?
13. Which of the following tasks may be part of the iden- Ensuring users follow estab-
tity and access management domain? Select three lished policies
answers. Managing and controlling
physical and logical assets
2/9