Wednesday, September 28, 2022

Compliance Frameworks and Industry Standards Answers | Cybersecurity Compliance Framework & System Administration Week 1 | Coursera | IBM

Compliance Frameworks and Industry Standards Quiz Answers | Cybersecurity Compliance Framework & System Administration Week 1 |  IBM | Coursera

Compliance Frameworks and Industry Standards


Greetings!! Today, we'll publish the complete week's worth of quiz answers from Coursera's Cybersecurity Compliance Framework & System Administration course. This blog will specifically answer Week 1 i.e. Compliance Frameworks and Industry Standards course.


Cybersecurity Scope


Cybersecurity is a rapidly growing field with a wide range of job titles and positions. Here are some of the most common positions related to cybersecurity and their probable earnings:


  • Information Security Analyst: Information security analysts are responsible for analyzing and monitoring an organization's computer networks and systems for potential security threats. The average salary for an information security analyst is around $80,000 to $100,000 per year.
  • Cybersecurity Consultant: Cybersecurity consultants provide expert advice and guidance to organizations on how to protect their computer networks and systems from cyber threats. The average salary for a cybersecurity consultant is around $100,000 to $140,000 per year.
  • Security Engineer: Security engineers are responsible for designing, implementing, and maintaining an organization's computer security systems and processes. The average salary for a security engineer is around $100,000 to $130,000 per year.
  • Security Architect: Security architects are responsible for designing and implementing an organization's overall security strategy and ensuring that its computer networks and systems are properly secured. The average salary for a security architect is around $120,000 to $160,000 per year.
  • Chief Information Security Officer (CISO): CISOs are responsible for developing and implementing an organization's overall information security strategy. They also oversee all aspects of an organization's cybersecurity program. The average salary for a CISO is around $200,000 to $300,000 per year.
  • Ethical Hacker/Penetration Tester: Ethical hackers and penetration testers are responsible for identifying vulnerabilities in an organization's computer networks and systems and testing them for potential security threats. The average salary for an ethical hacker or penetration tester is around $100,000 to $140,000 per year.


It's important to note that these salaries are estimates and can vary based on factors such as industry, company size, location, and level of experience. Additionally, the demand for cybersecurity professionals is expected to continue to grow as cyber threats become more sophisticated, and as organizations increasingly rely on technology to conduct their business.


About the Course:


This course provides you with the foundational knowledge required to understand the key cybersecurity industry and compliance criteria. No matter what cybersecurity position you already have or wish to hold in an organization, it will be crucial for you to acquire this knowledge. You will become familiar with the fundamental user and server administration commands as they relate to security. You'll require this ability to understand operating system vulnerabilities in your organization. The ideas of endpoint security and patch management will be covered. To keep systems up to date and prevent cybersecurity incidents against a business, both these topics are crucial.

Finally, you will get in-depth knowledge of cryptography and encryption so that you can understand how these concepts impact software in an organization. This course is intended for anybody who wishes to get a fundamental grasp of Security Frameworks, Compliance, endpoint management, encryption, or cryptography.


What will you learn:

  • List and discuss many important NIST, GDPR, HIPAA, SANS, and PCI compliance and industry standards.
  • Give a brief description of the design, function, and roles of server and user administration.
  • Understand the relationship between client system administration and the concepts of patching and endpoint security.
  • Give definitions of cryptography terms such as encryption, encoding, hashing, and digital certificates.


Compliance and Regulations for Cybersecurity ( PRACTICE QUIZ )



Q1) Which of the bad guys are described as "They are "in" an organization but are human and make mistakes"?

  • Inadvertant Actor

 

Q2) Which is NOT one of the security controls?

  • Testing

 

Q3) What year did the GDPR come into effect?

  • 2018

 

Q4) Which three (3) of these obligations are part of the 5 key GDPR obligations? Check all that apply

  • Accountability of Compliance
  • Consent
  • Rights of EU Data Subject 


System and Organization Controls Report (SOC) Overview ( PRACTICE QUIZ )


Q1) Which is the foundational principle that everyone will get during a SOC audit?

  • Security



Industry Standards ( PRACTICE QUIZ )


Q1) The HIPAA security rule requires covered entites to maintain which two (2) reasonable safeguards for protecting e-PHI ?

  • Physical
  • Technical

 

Q2) HIPAA Administrative safeguards include which two (2) of the following ?

  • Security Personnel
  • Workforce Training and Management

 

Q3) PCI includes 264 requirements grouped under how many main requirements ?

  • 12

 

 

CIS Critical Security Controls ( PRACTICE QUIZ )


Q1) If you are a mature organization which CIS Controls Implementation Group would you use?

  • Implementation Group 3

 


Compliance Frameworks and Industry Standards ( MAIN QUIZ)


Q1) A security attack is defined as which of the following?

  • An event that has been identified by correlation and analytics tools as a malicious activity.

 

Q2) Which order does a typical compliance process follow?

  • Establish scope, readiness assessment, gap remediation, testing/auditing, management reporting

 

Q3) Under GDPR who determines the purpose and means of processing of personal data?

  • Controller

 

Q4) Under the International Organization for Standardization (ISO) which standard focuses on Privacy?

  • ISO 27018

 

Q5) Which SOC report is closest to an ISO report?

  • Type 1

 

Q6) What is an auditor looking for when they test control the control for implementation over an entire offering with no gaps?

  • Completeness

 

Q7) The HIPAA Security Rule requires covered entities to maintain which three (3) reasonable safeguards for protecting e-PHI?

  • physical
  • technical
  • administrative

 

Q8) HIPAA Administrative safeguards include which two (2) of the following?

  • Workforce training and management
  • Security Personnel

 

Q9) Who is the governing entity for HIPAA?

  • US Department of Health and Human Services Office of Civil Rights

 

Q10) HIPAA Physical safeguards include which two (2) of the following?

  • Workstation and Device Security
  • Facility Access and Control

 

Q11) PCI uses which three (3) of the following Card Holder Data Environment categories to determine scope?

  • Technology
  • Processes
  • People

 

Q12) One PCI Requirement is using an approved scanning vendor to scan at what frequency?

  • Quarterly

 

Q13) In which CIS control category will you find Incident Response and Management?

  • Organizational

Conclusion

 

With any luck, this post will help you quickly and easily uncover Week 1 assessment answers for Coursera's Cybersecurity Compliance Framework & System Administration Quiz. If this article has been helpful to you in any way, please let your friends and family know on social media about this wonderful training. Be patient with us as we release a tonne more free courses along with the exam/quiz solutions, and keep checking our QueHelp Blog for updates.

No comments:

Post a Comment