Which of the following threats are examples of malware? Select two answers.
- Viruses
- Bugs
- Worms
- Error messages
Home ยป Google Cybersecurity Professional Certificate Answers - Coursera ยป Page 7
Google Cybersecurity Professional Certificate Answers - Coursera
Prepare for a career as a cybersecurity analyst with a professional certificate from Google. Learn job-ready skills that are in-demand, like how to identify common risks, threats, and vulnerabilities, as well as the techniques to mitigate them.
Cybersecurity analysts are responsible for monitoring and protecting networks, devices, people, and data. They use a collection of methods and technologies to safeguard against outside threats and unauthorized access โ and to create and implement solutions should a threat get through.
This certification is part of Google Career Certificates .
Complete a Google Career Certificate to get exclusive access to CareerCircle, which offers free 1-on-1 coaching, interview and career support, and a job board to connect directly with employers, including over 150 companies in the Google Career Certificates Employer Consortium.
All answers to pass this certification are only in our .PDF file, you can buy and download here:
Questions:
Test your knowledge: Introduction to cybersecurity
What are the three key elements of the CIA triad?
What are the primary responsibilities of an entry-level security analyst? Select three answers.
In what ways do security teams bring value to an organization? Select two answers.
Test your knowledge: Core skills for cybersecurity professionals
Weekly challenge 1
or
or
What do security professionals typically do with SIEM tools?
or
or
Which of the following entities may be an internal threat to an organization? Select three answers.
Fill in the blank: An organization that is in regulatory compliance is likely to _____ fines.
What is regulatory compliance?
Which of the following proficiencies are examples of technical skills? Select two answers.
Test your knowledge: The history of cybersecurity
What is one way that the Morris worm helped shape the security industry?
What were the key impacts of the Equifax breach? Select two answers.
Test your knowledge: The eight CISSP security domains
Why is it useful to understand the eight CISSP security domains? Select two answers.
Weekly challenge 2
What is the term for software that is designed to harm devices or networks?
Which of the following tasks may be part of the asset security domain? Select all that apply.
Which domain involves conducting investigations and implementing preventive measures?
Shuffle Q/A
Which of the following threats are examples of malware? Select two answers.
Which of the following tasks may be part of the security operations domain? Select all that apply.
Test your knowledge: Frameworks and controls
Test your knowledge: Ethics in cybersecurity
Fill in the blank: Privacy protection means safeguarding _____ from unauthorized use.
Weekly challenge 3
What are some of the primary purposes of security frameworks? Select three answers.
or
Which of the following are core components of security frameworks? Select two answers.
or
Fill in the blank: _____ are items perceived as having value to an organization.
Which of the following statements accurately describe the NIST CSF? Select all that apply.
or
Shuffle Q/A
Fill in the blank: The ethical principle of _____ involves adhering to compliance regulations.
Test your knowledge: Important cybersecurity tools
What tool is designed to capture and analyze data traffic within a network?
Which of the following are examples of SIEM tools? Select two answers.
How are logs primarily used by security professionals?
Fill in the blank: A _____ is a manual that provides details about operational actions.
Test your knowledge: Core cybersecurity knowledge and skills
What do security professionals use to interact with and request information from a database?
What is programming typically used for? Select two answers.
Fill in the blank: Linux is an open-source _____ that can be used to examine logs.
A playbook is a manual that provides details about how to respond to an incident only after it has occurred.
Weekly challenge 4
Which of the following statements correctly describe logs? Select two answers.
Which of the following tasks can be performed using SIEM tools? Select three answers.
What is a benefit of a tool, such as Googleโs Chronicle, being cloud-native?
Fill in the blank: A security professional uses a _____ as a manual to guide operational activities.
As a security analyst, you are monitoring network traffic to ensure that SPII data is not being accessed by unauthorized users. What does this scenario describe?
Fill in the blank: The wide exposure and immediate access to the source code of open-source tools makes it _____ likely that issues will occur.
What are some key benefits of programming languages? Select all that apply.
How is an open-source operating system, such as Linux, different from other operating systems?
Fill in the blank: A database is a _____ of organized data stored in a computer system.
What are some key benefits of using Python to perform security tasks? Select all that apply.
Shuffle Q/A
Which of the following tasks can be performed using SIEM tools? Select three answers.
Why might a security professional choose Google Chronicle to store security data for later analysis?
A security team wants to examine logs to understand what is occurring within their systems. Why might they choose Linux to perform this task? Select two answers.
Fill in the blank: Security professionals can use _____ to interact with and request information from a database.
What are some key benefits of using Python to perform security tasks? Select all that apply.
What are some key benefits of using Python to perform security tasks? Select all that apply.
As a security analyst, you are monitoring network traffic and detect a large number of failed login attempts. Which of the following tools would help you investigate this incident? Select two answers.
What are some key benefits of programming languages? Select all that apply.
What are some key benefits of programming languages? Select all that apply.
Fill in the blank: To request information from a _____, security professionals can use SQL.
Which of the following tasks can be performed using SIEM tools? Select three answers.
What term is used to describe publicly available systems, such as Linux?
A cybersecurity analyst is tasked with proactively searching for threats and performing incident analysis. What type of tool should they use?
Test your knowledge: Navigate threats, risks, and vulnerabilities
Weekly challenge 1
Which of the following examples are key focus areas of the security and risk management domain? Select three answers.
Which of the following statements accurately describe risk? Select all that apply.
Shuffle Q/A
A security analyst considers ways to enhance data security at their business. They decide to write a proposal to their supervisor that concerns employee authorization and asset management. Which security domain does this scenario describe?
Test your knowledge: The CIA triad
Test your knowledge: NIST frameworks
Weekly challenge 2
What are some of the primary objectives of an internal security audit? Select three answers.
Shuffle Q/A
Which of the following statements accurately describe the CSF? Select all that apply.
Test your knowledge: Identify threats and vulnerabilities with SIEM tools
Weekly challenge 3
Which of the following statements correctly describe logs? Select three answers.
A security team chooses to implement a SIEM tool that they will install, operate, and maintain using their own physical infrastructure. What type of tool are they using?
Fill in the blank: SIEM tools are used to search, analyze, and _____ an organization's log data to provide security information and alerts in real-time.
A security analyst receives an alert about hundreds of login attempts from unusual geographic locations within the last few minutes. What can the analyst use to review a timeline of the login attempts, locations, and time of activity?
Shuffle Q/A
Test your knowledge: Use a playbook to respond to an incident
Weekly challenge 4
Which of the following statements accurately describe playbooks? Select three answers.
Shuffle Q/A
A security analyst reports to stakeholders about a security breach. They provide details based on the organizationโs established standards. What phase of an incident response playbook does this scenario describe?
Test your knowledge: Network communication
Test your knowledge: Local and wide network communication
Weekly challenge 1
Shuffle Q/A
Test your knowledge: System identification
Weekly challenge 2
A firewall administrator installs a firewall function to either block or allow certain port numbers to limit unwanted communication. What function does this scenario describe?
Which of the following types of firewalls can perform deep packet inspection and intrusion detection?
How do VPNs preserve confidentiality?
Fill in the blank: A VPN uses _____ to transfer encrypted data between a device and the VPN server.
Fill in the blank. A controlled zone protects a company's internal network from a(n)___ security zone.
What is one way forward proxies secure internal networks?
Shuffle Q/A
Answers
A security analyst implements a system to service client requests by forwarding them to other servers. What do they use?
Test your knowledge: Network interception attack tactics
Weekly challenge 3
Which of the following statements accurately describe Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks? Select three answers.
Fill in the blank: The _____ network attack occurs when an attacker delays a data packet after intercepting it in transit.
Which attack is a combination of a DDoS and an IP spoofing attack, during which the malicious actor overwhelms a target computer?
Shuffle Q/A
Test your knowledge: Network hardening
Test your knowledge: Cloud hardening
Weekly challenge 4
In what way might port filtering be used to protect a network from an attack?
Shuffle Q/A
Which of the following are OS hardening tasks? Select three answers.
Test your knowledge: The operating system at work
Test your knowledge: The user interface
Weekly challenge 1
Shuffle Q/A
Which of the following statements correctly describe GUIs and CLIs? Select three answers.
Which layer is responsible for establishing a connection between a source and a destination device?
Test your knowledge: Linux distributions
(KALI LINUX โข is a trademark of OffSec.)
Test your knowledge: The shell
Weekly challenge 2
(KALI LINUX โข is a trademark of OffSec.)
Shuffle Q/A
Fill in the blank: When you communicate with the shell, the commands in the shell can ___. Select all that apply.
Which of the following is a Linux distribution that is built for enterprise use and offers a dedicated support team for customers?
Fill in the blank: Package managers are used to distribute Linux _____.
Which of the following components are part of the Linux architecture? Select all that apply.
Test your knowledge: Manage file content in Bash
Test your knowledge: Authenticate and authorize users
Test your knowledge: Get help in Linux
Weekly challenge 3
Which command searches a specified file and returns all lines in the file containing a specified string?
Which of these commands creates a new file?
A security analyst is updating permissions on the file access.txt. They want to add write permissions for the user and remove read permissions for the group.ย What do they enter on the command line?
Given the following permissions drw-rw-r--, which character indicates if this is a file or directory?
Shuffle Q/A
Test your knowledge: SQL queries
What is Andrew Adams' phone number?
Answers
Test your knowledge: More SQL filters
How many customers are from Brazil or Argentina?
SELECT *
FROM customers
WHERE country = 'USA' AND state = 'NV'
What will this query return?
Test your knowledge: SQL joins
SELECT *
FROM employees
_____ machines ON employees.employee_id = machines.employee_id;
What is the value in the trackid column of the first row that is returned from this query?
Weekly challenge 4
SELECT *
FROM employees
RIGHT JOIN machines ON employees.device_id = machines.device_id;
In what country is JetBrains s.r.o. located?
How many invoices have a total that is more than 20?
You are working with the Chinook database and are responsible for filtering for customers that live in the country of 'USA' and the state with an abbreviation of 'CA'. Replace --??? with the missing information to complete the query. (If you want to undo your changes to the query, you can click the Reset button.)
SELECT firstname,lastname, address, country
FROM customers
--???
What are the first names of the customers that live in the USA and the state with an abbreviation of CA?
How many customers live in Mountain View and work for Google Inc.?
Shuffle Q/A
SELECT *
FROM employees
WHERE department = 'Sales';
What is the employee ID number of the employee with an email of laura@chinookcorp.com?
How many customers live in the USA and have the name Frank?
What is the title of the employee with the last name of Callahan?
How many employees were hired on or after October 17, 2003?
Which of these SQL statements queries the employees table? Select all that apply.
FROM employee_id;
FROM *;
FROM employees;
FROM employees
WHERE employee_id > 1100;
What type of join compares tables and returns only the rows that have a matching value in a specified column?
Test your knowledge: Digital and physical assets
Test your knowledge: Risk and asset security
Weekly challenge 1
Which of the following are examples of a vulnerability? Select two answers.
Which of the following can be prevented with effective information security? Select all that apply.
What is an example of digital data at rest? Select two answers.
What NIST Cybersecurity Framework (CSF) tier is an indication that compliance is being performed at an exemplary standard?
What are some benefits of the NIST Cybersecurity Framework? Select three answers.
Shuffle Q/A
Which of the following refers to the process of tracking assets and the risks that affect them?
Test your knowledge: Encryption methods
Test your knowledge: Authentication, authorization, and accounting
Weekly challenge 2
What are two advantages of using single sign-on (SSO) systems to authenticate users? Select two answers.
Which security controls are used in public key infrastructure? Select three answers.
Shuffle Q/A
What do symmetric encryption algorithms use to encrypt and decrypt information?
Test your knowledge: Identify system vulnerabilities
Test your knowledge: Cyber attacker mindset
Weekly challenge 3
A cloud service provider has misconfigured a cloud drive. Theyโve forgotten to change the default sharing permissions. This allows all of their customers to access any data that is stored on the drive.
This misconfigured cloud drive is an example of what?
Which vulnerability management steps should they take to prepare these workstations? Select three answers.
What is the purpose of performing a risk assessment?
What attack vectors did the malicious hackers use to steal user information? Select two answers.
Which steps of an attacker mindset should the team perform to figure this out? Select three answers.
You are working as a security professional for a school district. An application developer with the school district created an app that connects students to educational resources. Youโve been assigned to evaluate the security of the app.
Using an attacker mindset, which of the following steps would you take to evaluate the application? Select two answers.
Shuffle Q/A
The applicationโs broken access controls are an example of what?
What are the attack vectors used in this situation? Select two answers.
The outdated WiFi router is an example of what?
What are two steps that you might take next to complete the vulnerability assessment? Select two answers.
Which of the following are types of attack surfaces? Select three answers.
Fill in the blank: An attack _____ refers to the pathways attackers use to penetrate security defenses.
What are ways to protect an organization from common attack vectors? Select three answers.
Test your knowledge: Malware
Test your knowledge: Web-based exploits
Weekly challenge 4
The malware hidden in this editing software is an example of which type of malware?
What type of attack did the researchers perform?
This is an example of what type of injection attack?
Shuffle Q/A
What type of attack is this an example of?
This is an example of what type of injection attack?
Which key step of a threat model does this scenario represent?
What type of attack did the hacktivist group perform?
This is an example of what kind of attack?
Test your knowledge: Incident response operations
Test your knowledge: Detection and documentation tools
Weekly challenge 1
Shuffle Q/A
What are examples of tools used for documentation? Select two answers.
Fill in the blank: An intrusion detection system (IDS) _____ system activity and alerts on possible intrusions.
Test your knowledge: Capture and view network traffic
Test your knowledge: Packet inspection
Weekly challenge 2
22:00:19.538395 IP (tos 0x10, ttl 64, id 33842, offset 0, flags [P], proto TCP (6), length 196) 198.168.105.1.41012 > 198.111.123.1.61012: Flags [P.], cksum 0x50af (correct), seq 169, ack 187, win 501, length 42
What is the source IP address?
Shuffle Q/A
22:00:19.538395 IP (tos 0x10, ttl 64, id 33842, offset 0, flags [P], proto TCP (6), length 196) 198.168.105.1.41012 > 198.111.123.1.61012: Flags [P.], cksum 0x50af (correct), seq 169, ack 187, win 501, length 42
Which protocols are being used? Select two answers.
Fill in the blank: The transmission of data between devices on a network is governed by a set of standards known as _____.
22:00:19.538395 IP (tos 0x10, ttl 64, id 33842, offset 0, flags [P], proto TCP (6), length 196) 198.168.105.1.41012 > 198.111.123.1.61012: Flags [P.], cksum 0x50af (correct), seq 169, ack 187, win 501, length 42
What is the value of the Type of Service field?
Test your knowledge: Response and recovery
Activity: Review a final report
Weekly challenge 3
Which statement best describes the functionality of automated playbooks?
Shuffle Q/A
Which of the following is an example of a recovery task?
Fill in the blank: A lessons learned meeting should be held within ____ weeks of an incident.
Which documentation provides a comprehensive review of an incident?
What are examples of how transparent documentation can be useful? Select all that apply.
[ALLOW: wikipedia.org] Source: 192.167.1.1 Friday, 10 June 2022 11:36:12
Test your knowledge: Log components and formats
[2022/12/20 08:20:38.921286] User nuhara logged in successfully
What type of information does this log contain? Select two answers.
Test your knowledge: Overview of intrusion detection systems (IDS)
Activity: Perform a query with Splunk
Test your knowledge: Overview of SIEM tools
Weekly challenge 4
{
โnameโ: โSystem testโ,
โhostโ: "167.155.183.139",
โidโ: 11111,
โMessageโ: [error] test,
}
Which log format is this log entry in?
A security analyst at a midsized company is tasked with installing and configuring a host-based intrusion detection system (HIDS) on a laptop. The security analyst installs the HIDS and wants to test whether it is working properly by simulating malicious activity. The security analyst runs unauthorized programs on the laptop, which the HIDS successfully detects and alerts on.
What is the laptop an example of?
Shuffle Q/A
LoginEvent[2021/10/13 10:32:08.958711] auth_session_authenticator.cc:304 Regular user login 1
Which type of log is this?
Which step in the SIEM process involves the processing of raw data into a standardized and structured format?
[2022/12/21 17:46:35.232748] NOTIFY: NetworkPropertiesUpdated: wifi_psk_13
Which type of log is this?
<111>1 2020-04-12T23:20:50.52Z my.machine.com evntslog - ID01 [user@98274 iut="2" eventSource="Mobile" eventID="24"][Priority@98274 class="low"] Computer A
What field value indicates the type of device that this event originated from?
ย
Test your knowledge: Core Python components
login_success = ["success", "success", "fail", "success"]
failed_attempts = 3
failed_attempts = 4
print(failed_attempts)
ย
Test your knowledge: Conditional and iterative statements
ip_address = "192.168.183.51"
if ip_address == "192.168.183.51":
print("You're logged in.")
else:
print("Login failed, try again.")
count = 0
while count < 10:
print("security alert")
count = count + 1
ย
Weekly challenge 1
for username in failed_login:
print(username)
var2 = ["a","b","c"]
var2_type = type(var2)
print(var2_type)
for i in [0, 5]:
print(i)
ย
Shuffle Q/A
count = 1
while count < 10:
print("Attempting connection")
count = count + 1
var1 = 9.5
var1_type = type(var1)
print(var1_type)
if attempts >= 5:
print("locked")
else:
print("try again")
If the value in the attempts variable is 3, what will Python do?
count = 1
while count < 5:
print("warning")
count = count + 1
if operating_system == "OS 3":
print("Updates needed")
You want to add to it so that it will print a "No updates needed" message whenever the value of operating_system is not "OS 3". Which lines of code have the correct syntax to do this?
if username == "aestrada":
print("username found")
username = "kcarter"
attempts = 5
print(username)
print(attempts)
print("locked")
if update_status != "incomplete"
print("schedule update")
count = 0
while count <= 10:
print(count)
Test your knowledge: Arguments, parameters, and return statements
Test your knowledge: Arguments, parameters, and return statements
for i in range(5, 12):
print(i)
Test your knowledge: Learn from the Python community
Weekly challenge 2
def echo(name):
return name * 3
def add(num1, num2):
result = num1 + num2
return result
add(2, 3)
Shuffle Q/A
print(type("h32rb17"))
def greet(name):
greeting = "Hello"
return name
greet("John")
def welcome_user(name):
print("Welcome," name)
username="elarson"
welcome_user(username)
def multiples(num):
multiple = num * 3
return num
multiples(2)
# For loop iterates to print an alert message 5 times
for i in range(5):
print("alert")
print(sorted(["h32rb17", "p52jb81", "k11ry83"]))
device_id = "uu0ktt0vwugjyf2"
print(device_id[2:5])
device_id = "Tj1C58Dakx"
print(device_id.lower())
What index does the substring "192.168.243.140" start at?
Test your knowledge: Work with lists and develop algorithms
my_list = ["a", "b", "c", "d"]
my_list[2] = 4
print(my_list)
What will it display?
access_list = ["elarson", "bmoreno", "tshah", "sgilmore"]
Test your knowledge: Regular expressions
Weekly challenge 3
In the string "network", which character has an index of 1?
What string does the code output?
You need to take a slice from a network ID. Specifically, you must extract the characters with indices of 6 through 10. Complete the Python code to take this slice and display it. (If you want to undo your changes to the code, you can click the Reset button.)
network_id = "l693m585n528"
print(### YOUR CODE HERE ###)
What string does the code output?
list1 = [1, 2, 3]
list2 = ["a", "b", "c"]
print(list1 + list2)
Shuffle Q/A
print(len("125"))
username_list = ["elarson", "bmoreno", "tshah"]
device_id_list = ["us2c0R5", "2R78TBR", "bt3MIEz"]
print(username_list + device_id_list)
approved_users = ["bmoreno", "elarson", "tshah", "eraab"]
print(approved_users[1])
What does the code device_ids.append("h32rb17") do?
Test your knowledge: Debug Python code
Based on what you discover, how can you fix the error?
Weekly challenge 4
How can you fix the error?
How can you fix the error?
You did not define a function before calling it. What type of error is this?
Shuffle Q/A
What is the error related to?
with open("logs.txt", "r") as file:
What does the following code do?
logins = "pwashing jhill tshah"
usernames = logins.split()
How can you fix this error?
read_text = text.read()
What does the following code do?
new_format = old_format.read()
Test your knowledge: Your impact on data protection
Weekly challenge 1
Shuffle Q/A
Fill in the blank: A security analyst should _____ escalate potential security events.
What is the correct term for a security event that results in a data breach?
Which of the following are examples of sensitive customer data that most organizations prioritize? Select two answers.
Test your knowledge: Timing is everything
Weekly challenge 2
Shuffle Q/A
Which of the following is an essential part of incident escalation?
Which incident type involves an employee violating an organizationโs acceptable use policy?
Weekly challenge 3
Shuffle Q/A
What is a stakeholder?
Which individuals are considered security stakeholders? Select three answers.
You are alerted that a malicious actor has gained unauthorized access to one of your organizationโs manufacturing applications. You need to inform the operations manager as soon as possible. What is the best way to communicate this information?
An analyst finishes an incident review. Next, they want to clearly communicate meaningful data from their findings. What action can they take to share this information?
Weekly challenge 4
Shuffle Q/A
Fill in the blank: The _____ is a standard awareness document that lists the top 10 most critical security risks to web applications.
Fill in the blank: _____ is an online security resource that provides information on analytics and application security, mobile and cloud security, and the Internet of Things (IoT).ย
Which of the following is a good way to use social media to connect with security professionals? Select two answers.
Test your knowledge: Develop an elevator pitch
Weekly challenge 5
Shuffle Q/A
Fill in the blank: To calm your nerves before the interview begins, _____ and remind yourself about the preparation you have put in.
A hiring manager recently reached out to you for a video interview. You have never used the software required for you to join the interview. What should you do to prepare?
Related Google Career Certificates:
By vmartinez
Which of the following threats are examples of malware? Select two answers.
By vmartinez
A security professional receives an alert that an unknown device has connected to their organizationโs internal network. They follow policies and procedures to quickly stop the potential threat. Which domain does this scenario describe?
By vmartinez
Which domain involves conducting investigations and implementing preventive measures?
By vmartinez
Which domain involves keeping data secure by ensuring users follow established policies to control and manage physical assets?
By vmartinez
A security professional is auditing user permissions at their organization in order to ensure employees have the correct access levels. Which domain does this scenario describe?
By vmartinez
Which of the following tasks may be part of the asset security domain? Select all that apply.