Wednesday, September 28, 2022

Cryptography and Compliance Pitfalls Answers | Cybersecurity Compliance Framework & System Administration Week 4 | Coursera | IBM

 

Cryptography and Compliance Pitfalls Quiz Answers | Cybersecurity Compliance Framework & System Administration Week 4 |  IBM | Coursera


Cryptography and Compliance Pitfalls


Greetings!! Today, we'll publish the complete week's worth of quiz answers from Coursera's Cybersecurity Compliance Framework & System Administration course. This blog will specifically answer Week 4 i.e. Cryptography and Compliance Pitfalls course.


Cybersecurity Scope


Cybersecurity is a rapidly growing field with a wide range of job titles and positions. Here are some of the most common positions related to cybersecurity and their probable earnings:


  • Information Security Analyst: Information security analysts are responsible for analyzing and monitoring an organization's computer networks and systems for potential security threats. The average salary for an information security analyst is around $80,000 to $100,000 per year.
  • Cybersecurity Consultant: Cybersecurity consultants provide expert advice and guidance to organizations on how to protect their computer networks and systems from cyber threats. The average salary for a cybersecurity consultant is around $100,000 to $140,000 per year.
  • Security Engineer: Security engineers are responsible for designing, implementing, and maintaining an organization's computer security systems and processes. The average salary for a security engineer is around $100,000 to $130,000 per year.
  • Security Architect: Security architects are responsible for designing and implementing an organization's overall security strategy and ensuring that its computer networks and systems are properly secured. The average salary for a security architect is around $120,000 to $160,000 per year.
  • Chief Information Security Officer (CISO): CISOs are responsible for developing and implementing an organization's overall information security strategy. They also oversee all aspects of an organization's cybersecurity program. The average salary for a CISO is around $200,000 to $300,000 per year.
  • Ethical Hacker/Penetration Tester: Ethical hackers and penetration testers are responsible for identifying vulnerabilities in an organization's computer networks and systems and testing them for potential security threats. The average salary for an ethical hacker or penetration tester is around $100,000 to $140,000 per year.


It's important to note that these salaries are estimates and can vary based on factors such as industry, company size, location, and level of experience. Additionally, the demand for cybersecurity professionals is expected to continue to grow as cyber threats become more sophisticated, and as organizations increasingly rely on technology to conduct their business.


About the Course:


This course provides you with the foundational knowledge required to understand the key cybersecurity industry and compliance criteria. No matter what cybersecurity position you already have or wish to hold in an organization, it will be crucial for you to acquire this knowledge. You will become familiar with the fundamental user and server administration commands as they relate to security. You'll require this ability to understand operating system vulnerabilities in your organization. The ideas of endpoint security and patch management will be covered. To keep systems up to date and prevent cybersecurity incidents against a business, both these topics are crucial.

Finally, you will get in-depth knowledge of cryptography and encryption so that you can understand how these concepts impact software in an organization. This course is intended for anybody who wishes to get a fundamental grasp of Security Frameworks, Compliance, endpoint management, encryption, or cryptography.


What will you learn:

  • List and discuss many important NIST, GDPR, HIPAA, SANS, and PCI compliance and industry standards.
  • Give a brief description of the design, function, and roles of server and user administration.
  • Understand the relationship between client system administration and the concepts of patching and endpoint security.
  • Give definitions of cryptography terms such as encryption, encoding, hashing, and digital certificates.

Cryptography Basics ( PRACTICE QUIZ )

 

Q1) Which of the cryptography basics ensures authentication, non-repudiation and integrity?

  • Digital Signatures

 

Q2) Complete the following statement.

Data can be encrypted_____

  • at rest, in use, and in transit.

 

Q3) Which is NOT a pitfall of encryption?

  • Implementing a reliable and proven cryptography

 

Q4) True or False: Internal commands are built into the shell program and are shell dependent.

  • True

 

 

Cryptography and Compliance Pitfalls ( Main QUIZ )

 

Q1) True or False: A whole branch of hacking - Reverse Engineering - is devoted to discovering hidden algorithms and data.

  • True

 

Q2) Which is not a key takeaway of best practices of cryptography?

  • Do rely on your own encryption algorithms.

 

Q3) Which three (3) are true of digital signatures?

  • Ensures authentication, non-reputiation, and integrity

 

Q4) What is the recommendation to avoid the encrypting data at rest pitfall "Using hardcoded/easily guessed keys"?

  • Select cryptographically-random keys, do not reuse keys for different installs.

 

Q5) Which two (2) statements are true of the Hash function ?

  • Hashing provides integrity.
  • Maps data of arbitrary size to data of a fixed size.


Conclusion

 

With any luck, this post will help you quickly and easily uncover Week 4 assessment answers for Coursera's Cybersecurity Compliance Framework & System Administration Quiz. If this article has been helpful to you in any way, please let your friends and family know on social media about this wonderful training. Be patient with us as we release a tonne more free courses along with the exam/quiz solutions, and keep checking our QueHelp Blog for updates.

No comments:

Post a Comment