Desamark

Desarrollo web y Marketing digital en Bilbao

  • English
    • Home
    • Seo Bilbao
    • Posicionamiento web Bilbao
    • Diseño web Bilbao
    • Drupal Bilbao
    • Pluggins
    • Ipage
    • Raiola Networks

    Inicio » Certifications

    Google Cybersecurity Professional Certificate Answers

    29 November, 2024 Por Vicen Martínez Arias

    Google Cybersecurity Professional Certificate Answers – Coursera

    Google Cybersecurity Professional Certificate Answers - Coursera

    Prepare for a career as a cybersecurity analyst with a professional certificate from Google. Learn job-ready skills that are in-demand, like how to identify common risks, threats, and vulnerabilities, as well as the techniques to mitigate them.

    Cybersecurity analysts are responsible for monitoring and protecting networks, devices, people, and data. They use a collection of methods and technologies to safeguard against outside threats and unauthorized access — and to create and implement solutions should a threat get through.

    This certification is part of Google Career Certificates .

    Complete a Google Career Certificate to get exclusive access to CareerCircle, which offers free 1-on-1 coaching, interview and career support, and a job board to connect directly with employers, including over 150 companies in the Google Career Certificates Employer Consortium.

    All answers to pass this certification are only in our .PDF file, you can buy and download here:

     

    Google Cybersecurity Professional Certificate Answers

     

     

    Questions:

     

    Course 1 – Foundations of Cybersecurity

     

    Week 1

     

    Test your knowledge: Introduction to cybersecurity

     

    What are the three key elements of the CIA triad?

    • Customer trust, increased revenue, and advancement
    • Compliance standards, instructions, and access
    • Confidentiality, integrity, and availability of information
    • Continuity, invulnerability, and attainment of business goals

     

    What are the primary responsibilities of an entry-level security analyst? Select three answers.

    • Create compliance laws
    • Protect information
    • Search for weaknesses
    • Monitor systems

     

    Fill in the blank: Performing _____ enables security professionals to review an organization’s security records, activities, and related documents.

    • penetration tests
    • software developments
    • ethical hacking
    • security audits

     

    In what ways do security teams bring value to an organization? Select two answers.

    • Protecting against external and internal threats
    • Reducing business productivity
    • Achieving regulatory compliance
    • Increasing operational expenses

     

    Test your knowledge: Core skills for cybersecurity professionals

     

    Which of the following proficiencies are transferable skills, likely to be applicable in almost any field? Select all that apply.

    • Written and verbal communication
    • Problem-solving
    • Analysis
    • Programming

     

    Which of the following proficiencies are technical skills that are needed to become an entry-level security analyst? Select all that apply.

    • Regulation writing
    • Software development
    • Data analysis
    • Programming

     

    Fill in the blank: _____ identify, analyze, and preserve criminal evidence within networks, computers, and electronic devices.

    • Business intelligence professionals
    • Digital forensic investigators
    • Security operations center analysts
    • Ethical hackers

     

    What are examples of sensitive personally identifiable information (SPII) that cybersecurity professionals need to protect? Select two answers.

    • Bank account numbers
    • Email addresses
    • Medical records
    • Last names

     

    Weekly challenge 1

     

    Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from _____ or criminal exploitation.

    • changing business priorities
    • unauthorized access
    • poor financial management
    • market shifts

     

    Which of the following tasks are typically responsibilities of entry-level security analysts? Select all that apply.

    • changing business priorities
    • unauthorized access
    • poor financial management
    • market shifts

    or

    • Installing prevention software
    • Creating organizational policies
    • Conducting periodic security audits
    • Protecting computer and network systems

    or

    • Installing prevention software
    • Creating organizational policies
    • Examining in-house security issues
    • Protecting computer and network systems

     

    An employee receives an email that they believe to be legitimate. They click on a compromised link within the email. What type of internal threat does this scenario describe?

    • Abusive
    • Intentional
    • Accidental
    • Operational

     

    Fill in the blank: Identity theft is the act of stealing _____ to commit fraud while impersonating a victim.

    • trade secrets
    • hardware
    • personal information
    • business records

     

    What are some key benefits associated with an organization meeting regulatory compliance? Select two answers.

    • Avoiding fines
    • Recruiting employees
    • Upholding ethical obligations
    • Increasing productivity

     

    An individual is in their first job as an entry-level security professional. They apply the problem-solving proficiencies that they learned in past roles to their current security career. What does this scenario describe?

    • Having expertise with a specific procedure
    • Understanding business standards
    • Taking on-the-job training
    • Using transferable skills

     

    Fill in the blank: Security information and _____ management (SIEM) tools enable security professionals to identify and analyze threats, risks, and vulnerabilities.

    • employer
    • event
    • emergency
    • enterprise

     

    What do security professionals typically do with SIEM tools?

    • Identify threat actors and their locations
    • Locate and preserve criminal evidence
    • Educate others about potential security threats, risks, and vulnerabilities
    • Identify and analyze security threats, risks, and vulnerabilities

     

    Which of the following statements accurately describe personally identifiable information (PII) and sensitive personally identifiable information (SPII)? Select all that apply.

    • An example of SPII is someone’s financial information.
    • The theft of PII is often more damaging than the theft of SPII.
    • Both PII and SPII are vulnerable to identity theft.
    • An example of PII is someone’s date of birth.

    or

    • An example of PII is someone’s phone number.
    • An example of SPII is someone’s biometric data.
    • Only SPII is vulnerable to identity theft.
    • PII is any information used to infer an individual’s identity.

    or

    • SPII is a type of PII that falls under stricter handling guidelines.
    • The theft of SPII is often more damaging than the theft of PII.
    • An example of SPII is someone’s last name.
    • An example of PII is someone’s email address.

     

    Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from _____ or unauthorized access.

    • poor financial management
    • market shifts
    • criminal exploitation
    • changing business priorities

     

    Which of the following entities may be an internal threat to an organization? Select three answers.

    • Trusted partners
    • Vendors
    • Employees
    • Customers

     

    An individual has their personal information stolen. They discover that someone is using that information to impersonate them and commit fraud. What does this scenario describe?

    • Data breach
    • Secured customer data
    • Network infiltration
    • Identity theft

     

    Fill in the blank: An organization that is in regulatory compliance is likely to _____ fines.

    • rectify
    • avoid
    • encounter
    • incur

     

    An individual is in their first job as an entry-level security professional. They take training to learn more about the specific tools, procedures, and policies that are involved in their career. What does this scenario describe?

    • Gaining new technical skills
    • Improving management capabilities
    • Understanding different perspectives
    • Transferring capabilities from one career to another

     

    Fill in the blank: The purpose of _____ is to protect networks, devices, people, and data from unauthorized access or criminal exploitation.

    • cybersecurity
    • change-management
    • planning
    • business continuity

     

    A security professional collaborates with information technology teams to deploy an application that helps identify risks and vulnerabilities. What does this scenario describe?

    • Upgrading network capacity
    • Installing detection software
    • Conducting a security audit
    • Ethical hacking

     

    Someone outside of an organization attempts to gain access to its private information. What type of threat does this scenario describe?

    • Internal
    • External
    • Ethical
    • Accidental

     

    What is identity theft?

    • Failing to maintain and secure user, customer, and vendor data
    • Trying to gain access to an organization’s private networks
    • Stealing personal information to commit fraud while impersonating a victim
    • A data breach that affects an entire organization

     

    A security professional receives an alert about an unknown user accessing a system within their organization. They attempt to identify, analyze, and preserve the associated criminal evidence. What security task does this scenario describe?

    • Resolving error messages
    • Programming with code
    • Software upgrades
    • Computer forensics

     

    What is regulatory compliance?

    • Sites and services that require complex passwords to access
    • Laws and guidelines that require implementation of security standards
    • Expenses and fines associated with vulnerabilities
    • Threats and risks from employees and external vendors

     

    Fill in the blank: Security information and event _____ (SIEM) tools enable security professionals to identify and analyze threats, risks, and vulnerabilities.

    • monitoring
    • mitigation
    • maturity
    • management

     

    Which of the following proficiencies are examples of technical skills? Select two answers.

    • Prioritizing collaboration
    • Communicating with employees
    • Applying computer forensics
    • Automating tasks with programming

     

    Week 2

     

    What historical event occurred as a result of trying to track illegal copies of medical software and prevent pirated licenses? 

    • LoveLetter attack
    • Morris worm
    • Equifax breach
    • Brain virus

     

    Which of the following threats are most likely to occur in the event of a phishing attack? Select all that apply.

    • Malicious software being deployed
    • Overtaxing systems with too many internal emails
    • Theft of the organization’s hardware
    • Employees inadvertently revealing sensitive data

     

    Test your knowledge: The history of cybersecurity

     

    Fill in the blank: A computer virus is malicious _____ that interferes with computer operations and causes damage.

    • code
    • sequencing
    • hardware
    • formatting

     

    What is one way that the Morris worm helped shape the security industry?

    • It prevented the development of illegal copies of software.
    • It inspired threat actors to develop new types of social engineering attacks.
    • It led to the development of computer emergency response teams.
    • It made organizations more aware of the significant financial impact of security incidents.

     

    What were the key impacts of the Equifax breach? Select two answers.

    • Millions of customers’ PII was stolen.
    • The significant financial consequences of a breach became more apparent.
    • Developers were able to track illegal copies of software and prevent pirated licenses.
    • Phishing became illegal due to significant public outcry.

     

    Social engineering, such as phishing, is a manipulation technique that relies on computer error to gain private information, access, or valuables.

    • True
    • False

     

    Test your knowledge: The eight CISSP security domains

     

    Fill in the blank: Examples of security _____ include security and risk management and security architecture and engineering.

    • domains
    • data
    • networks
    • assets

     

    A security professional is responsible for ensuring that company servers are configured to securely store, maintain, and retain SPII. These responsibilities belong to what security domain?

    • Security architecture and engineering
    • Asset security
    • Security and risk management
    • Communication and network security

     

    Your supervisor asks you to audit the human resources management system at your organization. The objective of your audit is to ensure the system is granting appropriate access permissions to current human resources administrators. Which security domain is this audit related to?

    • Software development security
    • Security assessment and testing
    • Security operations
    • Identity and access management

     

    Why is it useful to understand the eight CISSP security domains? Select two answers.

    • To develop programming skills
    • To identify potential career opportunities
    • To better understand your role within an organization
    • To improve your communication skills

     

    Weekly challenge 2

     

    What is the term for software that is designed to harm devices or networks?

    • Bug
    • Social application
    • Malware
    • Error message

     

    What historical event resulted in one of the largest known thefts of sensitive data, including social security numbers and credit card numbers?

    • LoveLetter attack
    • Equifax breach
    • Morris worm
    • Brain virus

     

    Fill in the blank: Social engineering is a manipulation technique that exploits _____ error to gain access to private information.

    • network
    • human
    • computer
    • coding

     

    Fill in the blank: Social engineering is a _____ that exploits human error to gain private information, access, or valuables.

    • type of malware
    • replicating virus
    • manipulation technique
    • business breach

     

    A security professional is asked to teach employees how to avoid inadvertently revealing sensitive data. What type of training should they conduct?

    • Training about network optimization
    • Training about business continuity
    • Training about security architecture
    • Training about social engineering

     

    Which domain involves defining security goals and objectives, risk mitigation, compliance, business continuity, and the law?

    • Security assessment and testing
    • Security architecture and engineering
    • Identity and access management
    • Security and risk management

     

    Which of the following tasks may be part of the security architecture and engineering domain? Select all that apply.

    • Validating the identities of employees
    • Configuring a firewall
    • Securing hardware
    • Ensuring that effective systems and processes are in place

     

    Which of the following tasks may be part of the asset security domain? Select all that apply.

    • Ensuring users follow established policies
    • Securing digital and physical assets
    • Data storage and maintenance
    • Proper disposal of digital assets

     

    A security professional is auditing user permissions at their organization in order to ensure employees have the correct access levels. Which domain does this scenario describe?

    • Security assessment and testing
    • Security and risk management
    • Asset security
    • Communication and network security

     

    Which domain involves keeping data secure by ensuring users follow established policies to control and manage physical assets?

    • Identity and access management
    • Communication and network security
    • Security assessment and testing
    • Security and risk management

     

    Which domain involves conducting investigations and implementing preventive measures?

    • Security operations
    • Security and risk management
    • Asset security
    • Identity and access management

     

    A security professional receives an alert that an unknown device has connected to their organization’s internal network. They follow policies and procedures to quickly stop the potential threat. Which domain does this scenario describe?

    • Security operations
    • Security and risk management
    • Asset security
    • Identity and access management

     

    Shuffle Q/A

     

    Which of the following threats are examples of malware? Select two answers.

    • Viruses
    • Bugs
    • Worms
    • Error messages

     

    Fill in the blank: Exploiting human error to gain access to private information is an example of _____ engineering.

    • network
    • communication
    • social
    • digital

     

    Which of the following tasks may be part of the security operations domain? Select all that apply.

    • Implementing preventive measures
    • Investigating an unknown device that has connected to an internal network
    • Conducting investigations
    • Using coding practices to create secure applications

     

    A security professional conducts internal training to teach their coworkers how to identify a social engineering attack. What types of security issues are they trying to avoid? Select all that apply.

    • Employees inadvertently revealing sensitive data
    • Overtaxing systems with too many internal emails
    • Phishing attacks
    • Malicious software being deployed

     

    Which of the following tasks are part of the security and risk management domain? Select all that apply.

    • Securing physical assets
    • Defining security goals and objectives
    • Compliance
    • Business continuity

     

    Which domain involves optimizing data security by ensuring that effective tools, systems, and processes are in place?

    • Communication and network security
    • Security and risk management
    • Identity and access management
    • Security architecture and engineering

     

    Which domain involves securing digital and physical assets, as well as managing the storage, maintenance, retention, and destruction of data?

    • Asset security
    • Communication and network security
    • Security assessment and testing
    •  Security operations

     

    Which of the following tasks may be part of the security assessment and testing domain? Select all that apply.

    • Auditing user permissions
    • Securing physical networks and wireless communications
    • Conducting security audits
    • Collecting and analyzing data

     

    A security professional is setting up access keycards for new employees. Which domain does this scenario describe?

    • Identity and access management
    • Communication and network security
    • Security and risk management
    • Security assessment and testing

     

    A security professional is optimizing data security by ensuring that effective tools, systems, and processes are in place. Which domain does this scenario describe?

    • Communication and network security
    • Security architecture and engineering
    • Security and risk management
    • Identity and access management

     

    Which of the following tasks may be part of the identity and access management domain? Select all that apply.

    • Conducting security control testing
    • Setting up an employee’s access keycard
    • Ensuring users follow established policies
    • Controlling physical assets

     

    Week 3

     

    Test your knowledge: Frameworks and controls

     

    Fill in the blank: A security _____ is a set of guidelines used for building plans to help mitigate risk and threats to data and privacy.

    • control
    • framework
    • regulation
    • lifecycle

     

    An organization requires its employees to complete a new data privacy training program each year to reduce the risk of a data breach. What is this training requirement an example of?

    • Security control
    • Data confidentiality
    • Cybersecurity Framework (CSF)
    • Personally identifiable information (PII)

     

    What is a foundational model that informs how organizations consider risk when setting up systems and security policies?

    • Cybersecurity Framework (CSF)
    • Sensitive personally identifiable information (SPII)
    • Confidentiality, integrity, and availability (CIA) triad
    • General Data Protection Regulation law (GDPR)

     

    Security teams use the NIST Cybersecurity Framework (CSF) as a baseline to manage short and long-term risk.

    • True
    • False

     

    Test your knowledge: Ethics in cybersecurity

     

    An employee trained to handle PII and SPII leaves confidential patient information unlocked in a public area. Which ethical principles does this violate? Select all that apply.

    • Confidentiality
    • Laws
    • Privacy protections
    • Remaining unbiased

     

    Fill in the blank: Privacy protection means safeguarding _____ from unauthorized use.

    • business networks
    • personal information
    • documentation
    • compliance processes

     

    You receive a text message on your personal device from your manager stating that they cannot access the company’s secured online database. They’re updating the company’s monthly party schedule and need another employee’s birth date right away. Your organization’s policies and procedures state that employee information should never be accessed or shared through personal communication channels. What should you do?

    • Request identification from your manager to ensure the text message is authentic; then, provide the birth date.
    • Respectfully decline, then remind your manager of the organization’s guidelines.
    • Give your manager the employee’s birth date; a party is a friendly gesture.
    • Ask your manager to provide proof of their inability to access the database.

     

    You work for a U.S.-based utility company that suffers a data breach. Several hacktivist groups claim responsibility for the attack. However, there is no evidence to verify their claims. What is the most ethical way to respond to this incident?

    • Escalate the situation by involving other organizations that have been targeted.
    • Improve the company’s defenses to help prevent future attacks.
    • Target a specific hacktivist group as a warning to the others.
    • Conduct cyberattacks against each hacktivist group that claimed responsibility.

     

    Weekly challenge 3

     

    What are some of the primary purposes of security frameworks? Select three answers.

    • Protecting PII data
    • Managing organizational risks
    • Safeguarding specific individuals
    • Aligning security with business goals

    or

    • Protecting PII data
    • Managing organizational risks
    • Safeguarding specific individuals
    • Identifying security weaknesses

     

    Which of the following are core components of security frameworks? Select two answers.

    • Managing data requests
    • Identifying and documenting security goals
    • Monitoring and communicating results
    • Monitoring personally identifiable information

    or

    • Establishing regulatory compliance measures
    • Implementing security processes
    • Setting guidelines to achieve security goals
    • Monitoring personally identifiable information

     

    Fill in the blank: A security professional has been tasked with implementing safeguards to reduce suspicious activity on their company’s network. They use _____ to help them reduce this type of risk.

    • security controls
    • public websites
    • security ethics
    • private information

     

    You are helping your security team consider risk when setting up a new software system. Using the CIA triad, you focus on confidentiality, availability, and what else?

    • Integrity
    • Information
    • Inconsistencies
    • Intelligence

     

    Fill in the blank: _____ are items perceived as having value to an organization.

    • Incidents
    • Lifecycles
    • Assets
    • Alerts

     

    Which of the following statements accurately describe the NIST CSF? Select all that apply.

    • It is only effective at managing long-term risk.
    • Its purpose is to help manage cybersecurity risk.
    • It is a voluntary framework.
    • It consists of standards, guidelines, and best practices.

    or

    • It is a voluntary framework.
    • Security teams use it as a baseline to manage risk.
    • It is only effective at managing short-term risk.
    • Its purpose is to help manage cybersecurity risk.

     

    Fill in the blank: Some of the most dangerous threat actors are _____ because they often know where to find sensitive information, can access it, and may have malicious intent.

    • past vendors
    • disgruntled employees
    • senior partners
    • dissatisfied customers

     

    Fill in the blank: As a security professional, you monitor the potential threats associated with _____ because they often have access to sensitive information, know where to find it, and may have malicious intent.

    • past vendors
    • disgruntled employees
    • senior partners
    • dissatisfied customers

     

    A security professional is updating software on a coworker’s computer and happens to see a very interesting email about another employee. The security professional chooses to follow company guidelines with regards to privacy protections and does not share the information with coworkers. Which concept does this scenario describe?

    • Preserving evidence
    • Security controls
    • Security ethics
    • Business email compromise

     

    A security professional overhears two employees discussing an exciting new product that has not been announced to the public. The security professional chooses to follow company guidelines with regards to confidentiality and does not share the information about the new product with friends. Which concept does this scenario describe?

    • Preserving evidence
    • Security controls
    • Security ethics
    • Business email compromise

     

    Fill in the blank: The ethical principle of _____ involves safeguarding an organization’s human resources records that contain personal details about employees.

    • honesty
    • privacy protection
    • unlimited access
    • non-bias

     

    You are a security professional working for a state motor vehicle agency that stores drivers’ national identification numbers and banking information. Which ethical principle involves adhering to rules that are intended to protect these types of data?

    • Restrictions
    • Laws
    • Guidelines
    • Investigations

     

    Shuffle Q/A

     

    Fill in the blank: A security professional has been tasked with implementing strict password policies on workstations to reduce the risk of password theft. This is an example of _____.

    • Conformity
    • Communication
    • Confidentiality
    • Consent

     

    Fill in the blank: A key aspect of the CIA triad is ensuring that data is correct, _____, and reliable.

    • authentic
    • public
    • centralized
    • updated

     

    For what reasons might disgruntled employees be some of the most dangerous threat actors? Select all that apply.

    • They know where to find sensitive information.
    • They are less productive than other employees.
    • They have access to sensitive information.
    • They may have malicious intent.

     

    Fill in the blank: The ethical principle of _____ involves adhering to compliance regulations.

    • protections
    • restrictions
    • laws
    • guidelines

     

    Which ethical principle describes the rules that are recognized by a community and enforced by a governing entity?

    • Restrictions
    • Guidelines
    • Protections
    • Laws

     

    You are helping your security team consider risk when setting up a new software system. Using the CIA triad, you focus on confidentiality, integrity, and what else?

    • Activity
    • Applications
    • Accuracy
    • Availability

     

    Week 4

     

    Test your knowledge: Important cybersecurity tools

     

    What tool is designed to capture and analyze data traffic within a network?

    • network protocol analyzer (packet sniffer)
    • Structured Query Language (SQL)
    • Google Chronicle
    • Splunk Enterprise

     

    Which of the following are examples of SIEM tools? Select two answers.

    • Python
    • Google Chronicle
    • Linux
    • Splunk Enterprise

     

    How are logs primarily used by security professionals?

    • Identify vulnerabilities and potential security breaches
    • Collect and analyze data to monitor critical activities in an organization
    • Select which security team members will respond to an incident
    • Research and optimize processing capabilities within a network

     

    Fill in the blank: A _____ is a manual that provides details about operational actions.

    • case history
    • directory
    • playbook
    • checklist

     

    Test your knowledge: Core cybersecurity knowledge and skills

     

    What do security professionals use to interact with and request information from a database?

      • Confidentiality, integrity, availability (CIA) triad
    • Structured Query Language (SQL)
    • Linux
    • Python

     

    What is programming typically used for? Select two answers.

      • Enable open-source operations
    • Create a specific set of instructions for a computer to execute tasks
    • Complete repetitive tasks and processes
    • Record events that occur within an organization’s systems

     

    Fill in the blank: Linux is an open-source _____ that can be used to examine logs.

    • operating system
    • database
    • algorithm
    • programming language

     

    A playbook is a manual that provides details about how to respond to an incident only after it has occurred.

      • True
    • False

     

    Weekly challenge 4

     

    Which of the following statements correctly describe logs? Select two answers.

    • A business might log each time an employee signs into their computer.
      • A log is used as a formal guide to incident response.
      • Security professionals use logs to visualize data.
    • A log is a record of events that occur within an organization’s systems. 

     

    Which of the following tasks can be performed using SIEM tools? Select three answers.

    • Providing alerts for specific types of risks
    • Performing incident analysis
    • Proactively searching for threats
    • Notifying authorities of illegal activity

     

    What is a benefit of a tool, such as Google’s Chronicle, being cloud-native?

      • It requires hardware to deploy.
      • It is a static resource.
    • It allows for fast delivery of new features.
    • It performs best when downloaded to a network.

     

    Fill in the blank: A security professional uses a _____ as a manual to guide operational activities.

      • spreadsheet
      • toolkit
      • review
    • playbook

     

    As a security analyst, you are monitoring network traffic to ensure that SPII data is not being accessed by unauthorized users. What does this scenario describe?

    • Using a network protocol analyzer (packet sniffer)
    • Programming with code
    • Calculating with formulas
    • Gathering data in a spreadsheet

     

    Fill in the blank: The wide exposure and immediate access to the source code of open-source tools makes it _____ likely that issues will occur.

      • very
      • more
    • less
    • equally

     

    What are some key benefits of programming languages? Select all that apply.

      • They install security hardware.
    • They create a specific set of instructions for a computer to execute tasks.
    • They execute repetitive processes accurately.
    • They filter through data points faster than humans can working manually.

     

    How is an open-source operating system, such as Linux, different from other operating systems?

    • It relies on a command line.
    • It is only a desktop tool.
    • It is proprietary.
    • It must be downloaded from the cloud.

     

    Fill in the blank: A database is a _____ of organized data stored in a computer system.

      • visualization
    • collection
    • model
    • frame

     

    What are some key benefits of using Python to perform security tasks? Select all that apply.

    • It is designed for high levels of accuracy.
      • It makes static data more dynamic.
    • It simplifies repetitive tasks.
    • It helps security professionals be more accurate.

     

    Shuffle Q/A

     

    Which of the following tasks can be performed using SIEM tools? Select three answers.

    • Helping security analysts identify potential breaches
    • Collecting and analyzing data
    • Providing alerts for specific types of risks and threats
    • Requesting security data from government agencies

     

    Why might a security professional choose Google Chronicle to store security data for later analysis?

    • It is cloud-native, which means it delivers new features quickly.
    • It requires hardware to deploy, so it is more secure.
    • It is a static resource, so the user interface never changes.
    • It performs best when downloaded to a network, which enables efficient processing.

     

    A security team wants to examine logs to understand what is occurring within their systems. Why might they choose Linux to perform this task? Select two answers.

    • It allows for text-based commands by users.
      • It is an efficient programming language.
      • It is proprietary.
    • It is open source.

     

    Fill in the blank: Security professionals can use _____ to interact with and request information from a database.

      • Chronicle
      • network protocol analyzers (packet sniffers)
      • Splunk Enterprise
    • SQL

     

    What are some key benefits of using Python to perform security tasks? Select all that apply.

    • It saves time.
      • It clearly maps data.
    • It helps ensure accuracy.
    • It uses a command-line interface.

     

    What are some key benefits of using Python to perform security tasks? Select all that apply.

     

    • It helps security professionals work with high levels of detail.
    • It enables security professionals to be more accurate.
    • It simplifies repetitive tasks.
    • It automatically eliminates sensitive information.

     

    As a security analyst, you are monitoring network traffic and detect a large number of failed login attempts. Which of the following tools would help you investigate this incident? Select two answers.

    • An intrusion detection system (IDS)
    • A network protocol analyzer (packet sniffer)
    • A cryptographic encoder
    • A command-line interface

     

    What are some key benefits of programming languages? Select all that apply.

    • They create a specific set of instructions for a computer to execute tasks.
    • They reduce the risk of human error.
      • They describe how data is organized.
    • They complete tasks faster than if working manually.

    What are some key benefits of programming languages? Select all that apply.

     

    • Execute repetitive processes very accurately
    • Complete repetitive tasks with a high degree of efficiency
      • Implement security protocols
    • Create a specific set of instructions for a computer to execute tasks

     

    Fill in the blank: To request information from a _____, security professionals can use SQL.

      • spreadsheet
    • database
    • network
    • dashboard

     

    Which of the following tasks can be performed using SIEM tools? Select three answers.

      • Implementing security software programs
    • Saving time by reducing the amount of data to be reviewed
    • Analyzing filtered events and patterns
    • Monitoring critical activities

     

    What term is used to describe publicly available systems, such as Linux?

    • Open-source
    • Unregulated
    • Restricted
    • Free-for-all

    A cybersecurity analyst is tasked with proactively searching for threats and performing incident analysis. What type of tool should they use?

      • Structured Query Language (SQL)
      • Chain of custody playbook
      • Linux operating system
    • Security information and event management (SIEM)

     

    Course 2 – Play It Safe: Manage Security Risks

     

    Week 1

     

    1. Fill in the blank: The _____ domain is focused on access and authorization to keep data secure by making sure that users follow established policies to control and manage assets.
    • security operations
    • identity and access management
    • asset security
    • communication and network security
    1. What is the focus of the security and risk management domain?
    • Manage and secure wireless communications
    • Secure physical networks and wireless communications
    • Optimize data security by ensuring effective processes are in place
    • Define security goals and objectives, risk mitigation, compliance, business continuity, and regulations
    1. In which domain would a security professional conduct security control testing; collect and analyze data; and perform security audits to monitor for risks, threats, and vulnerabilities?
    • Communication and network engineering
    • Security architecture and engineering
    • Identity and access management
    • Security assessment and testing
    1. Fill in the blank: The _____ domain concerns conducting investigations and implementing preventive measures.
    • security operations
    • communications and networking engineering
    • asset security
    • software development security

     

    Test your knowledge: Navigate threats, risks, and vulnerabilities

    1. What is a vulnerability?
    • An organization’s ability to manage its defense of critical assets and data and react to change
    • Anything that can impact the confidentiality, integrity, or availability of an asset
    • Any circumstance or event that can negatively impact assets
    • A weakness that can be exploited by a threat
    1. Fill in the blank: Information protected by regulations or laws is a _____. If it is compromised, there is likely to be a severe negative impact on an organization’s finances, operations, or reputation.
    • low-risk asset
    • new-risk asset
    • medium-risk asset
    • high-risk asset
    1. What are the key impacts of threats, risks, and vulnerabilities? Select three answers.
    • Damage to reputation
    • Employee retention
    • Identity theft
    • Financial damage
    1. Fill in the blank: The steps in the Risk Management Framework (RMF) are prepare, _____, select, implement, assess, authorize, and monitor.
    • communicate
    • categorize
    • produce
    • reflect

     

    Weekly challenge 1

    1. Fill in the blank: Security _____ refers to an organization’s ability to manage its defense of critical assets and data, as well as its ability to react to change.
    • posture
    • architecture
    • governance
    • hardening
    1. Which of the following examples are key focus areas of the security and risk management domain? Select three answers.
    • Mitigate risk
    • Be in compliance
    • Secure digital and physical assets
    • Define security goals and objectives

    Which of the following examples are key focus areas of the security and risk management domain? Select three answers.

    • Follow legal regulations
    • Conduct control testing
    • Define security goals
    • Maintain business continuity

     

    1. What term describes an organization’s ability to maintain its everyday productivity by establishing risk disaster recovery plans?
    • Mitigation
    • Daily defense
    • Recovery
    • Business continuity
    1. What security concept involves all individuals in an organization taking an active role in reducing risk and maintaining security?
    • Shared responsibility
    • Remote services
    • Secure coding
    • Employee retention
    1. A security analyst researches ways to improve access and authorization at their business. Their primary goal is to keep data secure. Which security domain does this scenario describe?
    • Security assessment and testing
    • Communication and network security
    • Asset security
    • Identity and access management
    1. What are the key areas of focus in the security assessment and testing domain? Select three answers.
    • Collect and analyze data
    • Perform security audits
    • Conduct security control testing
    • Use secure coding practices
    1. Fill in the blank: The software development _____ process may involve penetration testing during the deployment and implementation phase of developing software products.
    • positioning
    • access
    • operational
    • lifecycle

     

    1. Which of the following statements accurately describe risk? Select all that apply.
    • Another way to think of risk is the likelihood of a threat occurring.
    • A high-risk asset is any information protected by regulations or laws.
    • If compromised, a medium-risk asset may cause some damage to an organization’s ongoing operations.
    • If compromised, a low-risk asset would have a severe negative impact on an organization’s ongoing reputation.

     

    Which of the following statements accurately describe risk? Select all that apply.

      • If compromised, a high-risk asset is unlikely to cause financial damage.
      • Website content or published research data are examples of low-risk assets.
    • Organizations often rate risks at different levels: low, medium, and high.
    • If compromised, a medium-risk asset may cause some damage to an organization’s finances.

     

    1. A business experiences an attack. As a result, sensitive personally identifiable information (SPII) is leaked through the dark web. What type of consequence does this scenario describe?
      • Financial gain
      • Identity theft
    • Reputation
    • Customer
    1. In the Risk Management Framework (RMF), which step involves knowing how current systems are operating and if they support security goals?
    • Monitor
    • Assess
    • Authorize
    • Categorize

     

    Shuffle Q/A

    1. Fill in the blank: Security posture refers to an organization’s ability to react to _____ and manage its defense of critical assets and data.
    • change
    • tasks
    • sustainability
    • competition
    1. How does business continuity enable an organization to maintain everyday productivity?
    • By ensuring return on investment
    • By exploiting vulnerabilities
    • By outlining faults to business policies
    • By establishing risk disaster recovery plans
    1. Which of the following activities may be part of establishing security controls? Select three answers.
    • Monitor and record user requests
    • Collect and analyze security data regularly
    • Evaluate whether current controls help achieve business goals
    • Implement multi-factor authentication

     

    1. A business experiences an attack. As a result, a major news outlet reports the attack, which creates bad press for the organization. What type of consequence does this scenario describe?
    • Increase in profits
    • Damage to reputation
    • Loss of identity
    • Lack of engagement
    1. In the Risk Management Framework (RMF), which step involves having effective security and privacy plans in place in order to minimize the impact of ongoing risks?
    • Authorize
    • Prepare
    • Categorize
    • Implement

     

    1. What is the goal of business continuity?
    • Reduce personnel
    • Remove access to assets
    • Destroy publicly available data
    • Maintain everyday productivity
    1. Shared responsibility is a core concept of which domain?
    • Security and risk management
    • Security architecture and engineering
    • Asset security
    • Communication and network security
    1. How does security control testing enable companies to identify new and better ways to mitigate threats? Select two answers.
    • By revising project milestones
    • By evaluating whether the current controls help achieve goals
    • By granting employee access to physical spaces
    • By examining organizational goals and objectives
    1. A business experiences an attack. As a result, its critical business operations are interrupted and it faces regulatory fines. What type of consequence does this scenario describe?
    • Practical
    • Reputation
    • Financial
    • Identity

     

    1. In the Risk Management Framework (RMF), which step involves being aware of how systems are operating?
    • Monitor
    • Categorize
    • Implement
    • Authorize

     

    A security analyst considers ways to enhance data security at their business. They decide to write a proposal to their supervisor that concerns employee authorization and asset management. Which security domain does this scenario describe?

      • Software development security
      • Security assessment and testing
      • Communication and network security
    • Identity and access management

     

    Week 2

     

    1. How do security frameworks enable security professionals to help mitigate risk?
    • They are used to establish laws that reduce a specific security risk.
    • They are used to create unique physical characteristics to verify a person’s identity.
    • They are used to refine elements of a core security model known as the CIA triad.
    • They are used to establish guidelines for building security plans.
    1. Competitor organizations are the biggest threat to a company’s security.
    • True
    • False
    1. Fill in the blank: Security controls are safeguards designed to reduce _____ security risks.
    • public
    • broadscale
    • specific
    • general
    1. A security analyst works on a project designed to reduce the risk of vishing. They develop a plan to protect their organization from attackers who could exploit biometrics. Which type of security control does this scenario describe?
    • Authentication
    • Encryption
    • Authorization
    • Ciphertext

     

    Test your knowledge: The CIA triad

     

    1. What is the CIA triad?
    • Ongoing validation processes involving all employees in an organization
    • A foundational security model used to set up security policies and systems
    • A set of security controls used to update systems and networks
    • A mandatory security framework involving the selection of appropriate controls
    1. Which element of the CIA triad specifies that only authorized users can access specific information?
    • Access
    • Confirmation
    • Integrity
    • Confidentiality
    1. A security analyst discovers that certain data is inaccessible to authorized users, which is preventing these employees from doing their jobs efficiently. The analyst works to fix the application involved in order to allow for timely and reliable access. Which element of the CIA triad does this scenario describe?
    • Applicability
    • Capacity
    • Integrity
    • Availability
    1. Fill in the blank: According to the CIA triad, _____ refers to ensuring that an organization’s data is verifiably correct, authentic, and reliable.
    • Availability
    • Credibility
    • Accuracy
    • Integrity

     

    Test your knowledge: NIST frameworks

    1. What is the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)?
    • A collection of security principles focused on maintaining confidentiality, integrity, and availability
    • A required business framework for ensuring security updates and repairs are successful
    • A set of security controls that help analysts determine what to do if a data breach occurs
    • Standards, guidelines, and best practices that organizations follow voluntarily in order to manage cybersecurity risk
    1. Fill in the blank: The five core functions that make up the CSF are: identify, protect, detect, _____, and recover.
    • regulate
    • respond
    • reevaluate
    • reflect
    1. Fill in the blank: By enabling security professionals to determine which devices have been affected, the CSF _____ function helps organizations manage cybersecurity risks and their effects.
    • protect
    • identify
    • detect
    • recover
    1. What does a security analyst’s work involve during the CSF recover function?
    • Return affected systems back to normal operation
    • Protect an organization through the implementation of employee training
    • Contain, neutralize, and analyze security incidents
    • Pinpoint threats and improve monitoring capabilities

     

    Weekly challenge 2

     

    1. What does a security professional use to create guidelines and plans that educate employees about how they can help protect the organization?
    • Security posture
    • Security audit
    • Security framework
    • Security hardening
    1. Fill in the blank: A security professional uses _____ to convert data from a readable format to an encoded format.
    • authorization
    • authentication
    • encryption
    • confidentiality
    1. Which of the following characteristics are examples of biometrics? Select all that apply.
    • Voice
    • Fingerprint
    • Eye scan
    • Password
    1. You work as a security analyst at a bank and need to ensure that customers can access their account information. Which core principle of the CIA triad are you using to confirm their data is accessible to them?
    • Confidentiality
    • Availability
    • Integrity
    • Accuracy
    1. Which of the following statements accurately describe the CSF? Select all that apply.
    • The CSF is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.
    • Implementing improvements to a security process is part of the respond function of the CSF.
    • The identify function of the CSF involves managing cybersecurity risk and its effects on an organization’s people and assets.
    • The protect function of the CSF involves returning affected systems back to normal operation.
    1. A security team has just finished addressing a recent security incident. They now conduct tests to ensure that all of their repairs were successful. Which OWASP principle does this scenario describe?
    • Minimize attack surface area
    • Fix security issues correctly
    • Principle of least privilege
    • Separation of duties
    1. What are some of the primary objectives of an internal security audit? Select all that apply.
    • Determine what needs to be improved in order to achieve the desired security posture
    • Help security teams identify organizational risk
    • Avoid fines due to a lack of compliance
    • Reduce the amount of data on a network

     

    What are some of the primary objectives of an internal security audit? Select three answers.

    • Help security teams identify organizational risk
    • Improve security posture
    • Avoid fines due to a lack of compliance
    • Develop a guiding security statement for the business

     

    1. Fill in the blank: In an internal security audit, _____ refers to identifying people, assets, policies, procedures, and technologies that might impact an organization’s security posture.
    • completing a controls assessment
    • implementing administrative controls
    • scope
    • goals
    1. A security analyst performs an internal security audit. They review their company’s existing assets, then evaluate potential risks to those assets. Which aspect of a security audit does this scenario describe?
    • Completing a controls assessment
    • Assessing compliance
    • Establishing the scope and goals
    • Communicating results
    1. What information is typically communicated to stakeholders after completion of an internal security audit? Select three answers.
    • Strategies for improving security posture
    • A summary of the goals
    • Detailed data about past cybersecurity incidents
    • Existing risks that need to be addressed now or in the future

     

    Shuffle Q/A

     

    1. How do organizations use security frameworks to develop an effective security posture?
    • As a policy to protect against phishing campaigns
    • As a policy to support employee training initiatives
    • As a guide to identify threat actor strategies
    • As a guide to reduce risk and protect data and privacy
    1. Fill in the blank: An employee using multi-factor authentication to verify their identity is an example of the _____ process.
    • confidentiality
    • integrity
    • authentication
    • encryption
    1. You work as a security analyst for a supply chain organization and need to confirm all inventory data is correct, authentic, and reliable. Which core principle of the CIA triad are you using?
    • Confidentiality
    • Availability
    • Credibility
    • Integrity
    1. A security team considers how to avoid unnecessarily complicated solutions when implementing security controls. Which OWASP principle does this scenario describe?
    • Fix security issues correctly
    • Keep security simple
    • Defense in depth
    • Principle of least privilege
    1. What are some of the primary objectives of an internal security audit? Select all that apply.
    • Help security teams correct compliance issues
    • Enable security teams to assess controls
    • Limit traffic on an organization’s firewall
    • Identify any security gaps or weaknesses within an organization
    1. A security analyst performs an internal security audit. They focus on the human component of cybersecurity, such as the policies and procedures that define how their company manages data. What are they working to establish?
    • Physical controls
    • Technical controls
    • Administrative controls
    • Compliance controls
    1. What information is typically communicated to stakeholders after completion of an internal security audit? Select three answers.
    • A list of existing risks
    • Results and recommendations
    • Questions about specific controls
    • A summary of the scope
    1. What is the purpose of a security framework?
    • Create security controls to protect marketing campaigns
    • Develop procedures to help identify productivity goals
    • Establish policies to expand business relationships
    • Build plans to help mitigate risks and threats to data and privacy




    1. Fill in the blank: A security professional uses _____ to verify that an employee has permission to access a resource.
    • authorization
    • encryption
    • integrity
    • admission

     

    1. Which of the following statements accurately describe the CSF? Select all that apply.
    • The CSF is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.
    • The detect function of the CSF involves improving monitoring capabilities to increase the speed and efficiency of detections.
    • Restoring affected files or data is part of the recover function of the CSF.
    • The identify function of the CSF involves returning affected systems back to normal operation.

     

    Which of the following statements accurately describe the CSF? Select all that apply.

      • The detect function of the CSF involves making sure proper procedures are used to contain, neutralize, and analyze security incidents.
    • The CSF is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.
    • The protect function of the CSF involves implementing policies, procedures, training, and tools to mitigate threats.
    • Investigating an incident to determine how the threat occurred, what was affected, and where the attack originated is part of the respond function of the CSF.

     

    1. A security team establishes controls, including permission settings that will be used to create multiple security points that a threat actor must get through to breach their organization. Which OWASP principle does this scenario describe?
    • Defense in depth
    • Principle of least privilege
    • Keep security simple
    • Separation of duties
    1. Fill in the blank: In an internal security audit, _____ involves identifying potential threats, risks, and vulnerabilities in order to decide what security measures should be implemented.
    • communicating to stakeholders
    • conducting a risk assessment
    • assessing compliance
    • establishing the scope and goals
    1. A security analyst performs an internal security audit. They determine that the organization needs to install surveillance cameras at various store locations. What are they working to establish?
    • Communication controls
    • Administrative controls
    • Technical controls
    • Physical controls
    1. A person’s fingerprint, eye or palm scan are examples of what?
    • Codes
    • Biometrics
    • Passwords
    • Statistics

     

    1. Which of the following statements accurately describe the CSF? Select all that apply.
    • The protect function of the CSF involves implementing policies, procedures, training, and tools to mitigate threats.
    • Investigating an incident to determine how the threat occurred, what was affected, and where the attack originated is part of the respond function of the CSF.
    • The detect function of the CSF involves making sure proper procedures are used to contain, neutralize, and analyze security incidents.
    • The CSF is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.
    1. What information is typically communicated to stakeholders after completion of an internal security audit? Select three answers.
    • Results and recommendations
    • Comprehensive details about each part of the process
    • Compliance regulations to be adhered to
    • Strategies for improving security posture

     

    Week 3

     

    1. Which log source records events related to websites, emails, and file shares, as well as password and username requests?
    • Receiving
    • Firewall
    • Network
    • Server
    1. Fill in the blank: A security information and _____ management (SIEM) tool is an application that collects and analyzes log data to monitor critical activities in an organization.
    • employee
    • efficiency
    • emergency
    • event
    1. A security professional evaluates a software application by reviewing key technical attributes including response time, availability, and failure rate. What are they using to assess performance?
    • Index standards
    • Metrics
    • Cloud tools
    • Models
    1. Fill in the blank: SIEM tools must be configured and _____ to meet each organization’s unique security needs.
    • customized
    • centralized
    • reviewed
    • indexed

     

    Test your knowledge: Identify threats and vulnerabilities with SIEM tools

     

    1. A security team wants some of its services to be hosted on the internet instead of local devices. However, they also need to maintain physical control over certain confidential data. What type of SIEM solution should they select?
    • Self-hosted
    • Remote
    • Cloud-hosted
    • Hybrid
    1. Splunk Cloud is a self-hosted tool that retains, analyzes, and searches log data in order to provide security information and alerts.
    • True
    • False
    1. Fill in the blank: Chronicle is _____, which means it is specifically designed to take advantage of cloud computing capabilities including availability, flexibility, and scalability.
    • cloud-infrastructure
    • cloud-native
    • cloud-local
    • cloud-hardware
    1. What are the different types of SIEM tools? Select three answers.
    • Self-hosted
    • Cloud-hosted
    • Hybrid
    • Physical

     

    Weekly challenge 3

     

    1. Which of the following statements correctly describe logs? Select three answers.
    • SIEM tools rely on logs to monitor systems and detect security threats.
    • A record of connections between devices and services on a network is part of a network log.
    • A record of events related to employee logins and username requests is part of a server log.
    • Actions such as username requests are recorded in a network log.

     

    Which of the following statements correctly describe logs? Select three answers.

    • SIEM tools rely on logs to monitor systems and detect security threats.
      • Actions such as username requests are recorded in a network log.
    • A record of events related to employee logins and username requests is part of a server log.
    • A record of connections between devices and services on a network is part of a network log.

     

    1. What are some of the key benefits of SIEM tools? Select three answers.
    • Monitor critical activities in an organization
    • Automatic updates customized to new threats and vulnerabilities
    • Provide visibility
    • Store all log data in a centralized location
    1. Fill in the blank: To assess the performance of a software application, security professionals use _____, including response time, availability, and failure rate.
    • dashboards
    • SIEM tools
    • logs
    • metrics
    1. A security team installs a SIEM tool within their company’s own infrastructure to keep private data on internal servers. What type of tool are they using?
    • Hybrid
    • Infrastructure-hosted
    • Self-hosted
    • Cloud-hosted

    A security team chooses to implement a SIEM tool that they will install, operate, and maintain using their own physical infrastructure. What type of tool are they using?

    • Hybrid
    • Infrastructure-hosted
    • Self-hosted
    • Cloud-hosted

     

    Fill in the blank: SIEM tools are used to search, analyze, and _____ an organization’s log data to provide security information and alerts in real-time.

    • retain
    • separate
    • modify
    • release

     

    A security analyst receives an alert about hundreds of login attempts from unusual geographic locations within the last few minutes. What can the analyst use to review a timeline of the login attempts, locations, and time of activity?

      • A network protocol analyzer (packet sniffer)
      • An operating system
    • A SIEM tool dashboard
    • A playbook

     

    1. You are a security analyst, and you want a security solution that will be fully maintained and managed by your SIEM tool provider. What type of tool do you choose?
    • Self-hosted
    • Solution-hosted
    • Cloud-hosted
    • Hybrid
    1. Fill in the blank: Splunk Enterprise is a self-hosted tool used to retain, analyze, and search an organization’s _____ to provide security information and alerts.
    • database
    • hardware
    • cloud applications
    • log data
    1. Which of the following statements accurately describe Chronicle? Select three answers.
    • Cloud-native tools such as Chronicle are designed to take advantage of cloud computing availability.
    • Chronicle is designed to retain, analyze, and search data.
    • Self-hosted tools such as Chronicle are designed to give organizations more control over their data.
    • Chronicle performs data analysis.
    1. Which type of tool typically requires users to pay for usage?
    • Open-source
    • Self-hosted
    • Proprietary
    • Cloud native

     

    Shuffle Q/A

     

    1. Which of the following statements correctly describe logs? Select three answers.
    • Actions such as using a username or password are recorded in a firewall log.
    • Events related to websites, emails, or file shares are recorded in a server log.
    • A network log is a record of all computers and devices that enter and leave a network.
    • A log is a record of events that occur within an organization’s systems and networks.
    1. What are some of the key benefits of SIEM tools? Select three answers.
    • Save time
    • Provide event monitoring and analysis
    • Eliminate the need for manual review of logs
    • Collect log data from different sources
    1. Fill in the blank: Software application _____ are technical attributes, such as response time, availability, and failure rate.
    • metrics
    • dashboards
    • SIEM tools
    • logs
    1. You are a security professional, and you want a SIEM tool that will require both on-site infrastructure and internet-based solutions. What type of tool do you choose?
    • Hybrid
    • Self-hosted
    • Cloud-hosted
    • Component-hosted
    1. Which of the following statements accurately describe Chronicle? Select three answers.
    • Chronicle saves businesses time by eliminating the need for security teams to monitor threats and vulnerabilities.
    • Cloud-native tools such as Chronicle are designed to take advantage of cloud computing scalability.
    • Cloud-native tools such as Chronicle are maintained and managed by the vendor.
    • Chronicle performs data collection.
    1. What are some of the key benefits of SIEM tools? Select three answers.
    • Minimize the number of logs to be manually reviewed
    • Automatic customization to changing security needs
    • Increase efficiency
    • Deliver automated alerts
    1. Fill in the blank: A security professional creates a dashboard that displays technical attributes about business operations called ______, such as incoming and outgoing network traffic.
    • metrics
    • averages
    • logs
    • SIEM tools
    1. Fill in the blank: Splunk Enterprise is a self-hosted tool used to search, analyze, and _____ an organization’s log data to provide security information and alerts in real-time.
    • retain
    • modify
    • release
    • separate
    1. What are examples of open-source tools? Select two answers.
    • Suricata
    • Splunk Enterprise
    • Linux
    • Chronicle
    1. Fill in the blank: Splunk Enterprise is a _____ tool used to retain, analyze, and search an organization’s log data to provide security information and alerts in real-time.
    • cloud-native
    • self-hosted
    • open-source
    • cloud-based

     

    Week 4

     

    1. In the event of a security incident, when would it be appropriate to refer to an incident response playbook?
    • Only when the incident first occurs
    • Only prior to the incident occurring
    • Throughout the entire incident
    • At least one month after the incident is over
    1. Fill in the blank: During the _____ phase, security professionals use tools and strategies to determine whether a breach has occurred and to evaluate its potential magnitude.
    • preparation
    • detection and analysis
    • containment
    • coordination
    1. In which incident response playbook phase would a security team document an incident to ensure that their organization is better prepared to handle future security events?
    • Eradication and recovery
    • Containment
    • Post-incident activity
    • Coordination
    1. What is the relationship between SIEM tools and playbooks?
    • They work together to provide a structured and efficient way of responding to security incidents.
    • Playbooks collect and analyze data, then SIEM tools guide the response process.
    • They work together to predict future threats and eliminate the need for human intervention.
    • Playbooks detect threats and generate alerts, then SIEM tools provide the security team with a proven strategy.

     

    Test your knowledge: Use a playbook to respond to an incident

     

    1. Playbooks are permanent, best-practice documents, so a security team should not make changes to them.
    • True
    • False
    1. A business recently experienced a security breach. Security professionals are currently restoring the affected data using a clean backup that was created before the incident. What playbook phase does this scenario describe?
    • Post-incident activity
    • Detection and analysis
    • Eradication and recovery
    • Containment
    1. Fill in the blank: Once a security incident is resolved, security analysts perform various post-incident activities and _____ efforts with the security team.
    • eradication
    • coordination
    • preparation
    • detection
    1. Which action can a security analyst take when they are assessing a SIEM alert?
    • Analyze log data and related metrics
    • Isolate an infected network system
    • Restore the affected data with a clean backup
    • Create a final report

     

    Weekly challenge 4

     

    1. Which of the following statements accurately describe playbooks? Select three answers.
    • A playbook helps security teams respond to urgent situations quickly.
    • A playbook improves accuracy when identifying and mitigating an incident.
    • Organizations use different types of playbooks for different situations.
    • Organizations keep playbooks consistent by applying the same procedures to different business events.

    Which of the following statements accurately describe playbooks? Select three answers.

      • Organizations use the same playbook for incident response, security alerts, and product-specific purposes.
    • Organizations use playbooks to ensure employees follow a consistent list of actions.
    • A playbook clarifies what tools to use in response to a security incident.
    • A playbook is a manual that provides details about any operational action.

     

    1. A security team is considering what they learned during past security incidents. They also discuss ways to improve their security posture and refine response strategies for future incidents. What is the security team’s goal in this scenario?
    • Assess employee performance
    • Educate clients
    • Update a playbook
    • Delete biometric data
    1. Fill in the blank: Incident response playbooks are _____ used to help mitigate and manage security incidents from beginning to end.
    • guides
    • exercises
    • examinations
    • inquiries
    1. An organization has successfully responded to a security incident. According to their established standards, the organization must share information about the incident to a specific government agency. What phase of an incident response playbook does this scenario describe?
    • Coordination
    • Containment
    • Detection and analysis
    • Preparation
    1. Why is the containment phase of an incident response playbook a high priority for organizations?
    • It demonstrates how to communicate about the breach to leadership.
    • It enables a business to determine whether a breach has occurred.
    • It helps prevent ongoing risks to critical assets and data.
    • It outlines roles and responsibilities of all stakeholders.
    1. Fill in the blank: During the _____ phase, security teams may conduct a full-scale analysis to determine the root cause of an incident and use what they learn to improve the company’s overall security posture.
    • post-incident activity
    • detection and analysis
    • containment
    • eradication and recovery
    1. A security analyst establishes incident response procedures. They also educate users on what to do in the event of a security incident. What phase of an incident response playbook does this scenario describe?
    • Containment
    • Preparation
    • Eradication and recovery
    • Detection and analysis
    1. In what ways do SIEM tools and playbooks help security teams respond to an incident? Select all that apply.
    • SIEM tools and playbooks work together to provide a structured way of responding to incidents.
    • Playbooks collect and analyze data.
    • SIEM tools detect threats.
    • SIEM tools alert the security team to potential problems.

     

    Shuffle Q/A

     

    1. Which of the following statements accurately describe playbooks? Select three answers.
    • A playbook is used to develop compliance regulations.
    • A playbook can be used to respond to an incident
    • A playbook is an essential tool used in cybersecurity
    • A playbook improves efficiency when identifying and mitigating an incident.
    1. Fill in the blank: A security team _____ their playbook frequently by learning from past security incidents, then refining policies and procedures.
    • summarizes
    • outlines
    • shortens
    • updates
    1. Fill in the blank: Incident response is an organization’s quick attempt to _____ an attack, contain the damage, and correct its effects.
    • identify
    • expand
    • disclose
    • ignore

    A security analyst reports to stakeholders about a security breach. They provide details based on the organization’s established standards. What phase of an incident response playbook does this scenario describe?

      • Preparation
    • Coordination
    • Detection and analysis
    • Eradication and recovery

     

    1. What are the primary goals of the containment phase of an incident response playbook? Select two answers.
    • Reduce the immediate impact
    • Assess the damage
    • Analyze the magnitude of the breach
    • Prevent further damage
    1. Fill in the blank: During the post-incident activity phase, security teams may conduct a full-scale analysis to determine the _____ of an incident and use what they learn to improve the company’s overall security posture.
    • structure
    • target
    • root cause
    • end point
    1. Which phase of an incident response playbook is primarily concerned with preventing further damage and reducing the immediate impact of a security incident?
    • Post-incident activity
    • Preparation
    • Containment
    • Detection and analysis
    1. In what ways do SIEM tools and playbooks help security teams respond to an incident? Select all that apply.
    • SIEM tools analyze data.
    • SIEM alerts inform security teams of potential threats.
    • SIEM alerts provide security teams with specific steps to identify and respond to security incidents.
    • SIEM tools and playbooks work together to provide an efficient way of handling security incidents.
    1. What does a security team do when updating and improving a playbook? Select all that apply.
    • Discuss ways to improve security posture
    • Consider learnings from past security incidents
    • Refine response strategies for future incidents
    • Improve antivirus software performance
    1. Fill in the blank: Incident response playbooks outline processes for communication and ______ of a security breach.
    • implementation
    • documentation
    • concealment
    • iteration
    1. A security analyst wants to ensure an organized response and resolution to a security breach. They share information with key stakeholders based on the organization’s established standards. What phase of an incident response playbook does this scenario describe?
    • Coordination
    • Containment
    • Eradication and recovery
    • Detection and analysis
    1. Fill in the blank: During the post-incident activity phase, organizations aim to enhance their overall _____ by determining the incident’s root cause and implementing security improvements.
    • user experience
    • employee engagement
    • security audit
    • security posture
    1. A security analyst documents procedures to be followed in the event of a security breach. They also establish staffing plans and educate employees. What phase of an incident response playbook does this scenario describe?
    • Coordination
    • Eradication and recovery
    • Detection and analysis
    • Preparation

     

    Course 3 – Connect and Protect: Networks and Network Security

     

    Week 1

     

    1. To connect an entire city, the most effective network type would be a local area network (LAN).
    • True
    • False
    1. A security professional wants to ensure information is being broadcast properly to every computer on their organization’s network. What device should they investigate?
    • Hub
    • Modem
    • Internet
    • Router
    1. What are some benefits of switches? Select all that apply.
    • They automatically install device-protection software.
    • They can improve network performance.
    • They control the flow of traffic.
    • They only pass data to the intended destination.
    1. Fill in the blank: The practice of using servers, applications, and network services that are hosted on the internet is called _____ computing.
    • website
    • connected
    • cloud
    • uploadable

     

    Test your knowledge: Network communication

     

    1. What type of information is contained within the header of an IP packet?
    • The message that needs to be transmitted to the receiving device
    • An explanation of how the port number will be processed by the receiving device
    • The sender’s IP address, the size of the packet, and the protocol to use
    • A string of data indicating that the data transmission is complete
    1. What characteristics do the TCP/IP and OSI models share? Select all that apply.
    • Both models define standards for networking and divide the network communication process into different layers.
    • Both models include an application and a transport layer.
    • Both models illustrate network processes and protocols for data transmission between two or more systems.
    • Both models have 7 layers.
    1. What is the Transmission Control Protocol (TCP)?
    • A software application that organizes data
    • An internet communication convention
    • Guidelines for proper network operations
    • A unique address that every device on a network is assigned
    1. Fill in the blank: A _____ is a software-based location that organizes the sending and receiving of data between devices on a network.
    • channel
    • segment
    • port
    • packet
    1. Which layer of the TCP/IP model has protocols that organize file transfers and email services?
    • Internet layer
    • Transport layer
    • Network access layer
    • Application layer

     

    Test your knowledge: Local and wide network communication

    1. Fill in the blank: An Internet Protocol (IP) address is a unique string of characters that identifies the _____ of a device on the internet.
    • speed
    • location
    • operating system
    • size
    1. Which of the following is an example of an IPv4 address?
    • 25, 443, 20
    • 172.16.254.1
    • 2001:0db8:85a3:0000:0000:8a2e:0370:7336
    • 00-B1-D0-63-C2-26
    1. What is the term for an address assigned by an internet service provider that is shared by all devices on a local area network?
    • Private IP address
    • MAC address
    • WAN address
    • Public IP address
    1. Fill in the blank: A switch uses a MAC _____ to direct data packets to the correct device.
    • address table
    • geographic location
    • home network
    • public address

     

    Weekly challenge 1

     

    1. What is the term for a group of connected devices?
    • Cloud
    • Hub
    • Protocol
    • Network
    1. A _____ broadcasts information to every device on the network.
    • hub
    • modem
    • router
    • switch
    1. Which of the following statements accurately describe switches? Select all that apply.
    • When a switch receives a data packet, it reads the MAC address of the destination device and maps it to a port.
    • Some benefits to switches are effective control of traffic flow and improved network performance.
    • Switches are less secure than hubs.
    • A switch is a device that makes connections between specific devices on a network by sending and receiving data between them.
    1. A security professional is investigating the benefits and drawbacks of using a cloud service provider (CSP). What are some reasons why the security professional might choose to use a CSP in their work? Select all that apply.
    • A CSP provides business analytics to monitor web traffic and sales.
    • CSP services may be accessed even when a business is not connected to the internet.
    • CSP remote servers allow web applications to be accessed from any location.
    • A CSP offers processing power that is only paid for as needed.
    1. What is the purpose of the protocol number of a data packet?
    • To identify the message to be transmitted to the receiving device
    • To signal to the receiving device that the packet is finished
    • To contain the IP and MAC addresses
    • To tell the receiving device what to do with the information in the packet
    1. What are the three main categories of services that CSPs provide? Select all that apply.
    • Software as a service (SaaS)
    • Platform as a service (PaaS)
    • Desktop as a service (DaaS)
    • Infrastructure as a service (IaaS)
    1. A security analyst is accessing a webpage that uses HTTPS. The analyst scans the network to see what ports are active. Which port number is used for HTTPS webpages?
    • 443
    • 40
    • 20
    • 25
    1. Which layer in the TCP/IP model is used to inspect the flow of traffic across a network?
    • Layer 1, network access
    • Layer 2, internet
    • Layer 3, transport
    • Layer 4, application
    1. A security analyst runs a command to discover a local IP address. The analyst receives the following result: 169.254.255.249. What type of address is this?
    • MAC
    • IPv4
    • IPv6
    • Ethernet
    1. A security analyst runs a command to discover a local IP address. The analyst receives the following result: fd45:3efd:3201:ff22:0000:0000:12ff:0000. What type of address is this?
    • MAC
    • Ethernet
    • IPv4
    • IPv6

     

    Shuffle Q/A

     

    1. What type of network spans an office building, a school, or a home?
    • Modem
    • Cloud
    • WAN
    • LAN
    1. Which network device makes connections between specific devices on a network by sending and receiving data between them?
    • A switch
    • A router
    • A hub
    • A modem
    1. Which of the following are benefits for businesses that are considering using a cloud service provider (CSP)? Select all that apply.
    • CSP data and devices are more secure because they are stored locally.
    • CSP remote servers allow online services to be accessed from any location.
    • CSPs provide business analytics to monitor web traffic and sales.
    • CSPs offer on-demand storage.
    1. Fill in the blank: _____ refers to the practice of using remote servers, applications, and network services that are hosted on the internet, instead of in a physical location owned by a company.
    • Cloud computing
    • Software defined networks (SDNs)
    • Hybrid cloud environment
    • Local area network (LAN)
    1. Which one of the following port numbers is used for large file transfers?
    • 25
    • 37
    • 20
    • 443
    1. Fill in the blank: The ___ layer is used to determine how data packets will interact with receiving devices, including file transfers and email services.
    • Layer 1, network access
    • Layer 2, internet
    • Layer 3, transport
    • Layer 4, application
    1. Which of the following addresses is an accurate IPv4 address?
    • 129.168.10.256
    • 1001.2345.3234.5678
    • 192.168.0.2
    • 100.234.56.1.3
    1. Which of the following addresses is an accurate IPv6 address?
    • fda2:7360:1e5b:e8f5:a69f:c8bd:1b3e:2578
    • fda2::7361:135b::38f5:c8bd:1b3e:2578
    • a360::abf7:h234:0011:g126:1130::ffj2
    • a634:b123:cd34:3f56:0023:2345:7890:0000:ffff
    1. Fill in the blank: A ___ is a network that spans a large geographic area, like a city, state, or country.
    • Modem
    • LAN
    • WAN
    • Cloud
    1. Which network device connects multiple networks together?
    • A hub
    • A router
    • A switch
    • A modem
    1. Fill in the blank: A ___ is a device that makes connections between specific devices on a network by sending and receiving data between them.
    • switch
    • hub
    • modem
    • router
    1. What information is included in the body of a data packet?
    • The protocol number
    • The MAC address
    • The message to be transmitted to the receiving device
    • The signal that tells the receiving device that the packet is finished transferring
    1. What are two benefits of cloud computing and software defined networks (SDNs)? Select two answers.
    • Decreased cost
    • Increased scalability
    • Decreased use of physical network devices
    • Increased attack surface
    1. What is the purpose of the footer of a data packet?
    • To identify the message to be transmitted to the receiving device
    • To show the MAC address of the destination device
    • To signal to the receiving device that the packet is finished
    • To contain the source IP address
    1. Fill in the blank: 127.0.0.1 is an example of an accurate ___ address.
    • Ethernet
    • IPv6
    • MAC
    • IPv4

     

    Week 2

     

    1. Fill in the blank: Network protocols are rules used by two or more devices on a network to describe the _____ and structure of data.
    • access level
    • optimum speed
    • order of delivery
    • maximum size
    1. Which network protocol provides a secure method of communication between clients and web servers?
    • TCP
    • ARP
    • HTTPS
    • DNS
    1. To keep information safe from malicious actors, what security protocol can be used?
    • Secure sockets layer and transport layer security (SSL/TLS)
    • Address resolution protocol (ARP)
    • Domain name system (DNS)
    • Transmission control protocol (TCP)
    1. IEEE 802.11, also known as Wi-Fi, is a set of standards that define communication for wireless LANs.
    • True
    • False

     

    Test your knowledge: System identification

     

    1. What monitors and filters traffic coming in and out of a network?
    • Domain name system (DNS)
    • Firewall
    • Forward proxy server
    • Uncontrolled zone
    1. Stateless is a class of firewall that keeps track of information passing through it and proactively filters out threats.
    • True
    • False
    1. Fill in the blank: Encapsulation is a process performed by a _____ that protects information by wrapping sensitive data in other data packets.
    • firewall
    • VPN service
    • proxy server
    • security zone
    1. Which security zone is used to ensure highly confidential information and is only accessible to employees with certain privileges?
    • Management zone
    • Uncontrolled zone
    • Restricted zone
    • Demilitarized zone (DMZ)
    1. Fill in the blank: A security analyst uses a _____ to regulate and restrict access to an internal server from the internet. This tool works by accepting traffic from external parties, approving it, and forwarding it to internal servers.
    • reverse proxy server
    • port filter
    • controlled zone
    • forward proxy server

     

    Weekly challenge 2

     

    1. What network protocol translates the domain name of a website’s server into an IP address?
    • File transfer protocol (FTP)
    • Domain name system (DNS)
    • Transmission control protocol (TCP)
    • Hypertext transfer protocol secure (HTTPS)
    1. Which of the following statements accurately describe wireless protocols? Select three answers.
    • Wi-Fi protocols provide security levels about equal to that of wired connections.
    • IEEE is the Institute of Electrical and Electronics Engineers, which maintains WiFi standards.
    • WPA is a wired security protocol pertaining to local devices on the same network.
    • 802.11 is a suite of protocols used in wireless communication.

     

    A firewall administrator installs a firewall function to either block or allow certain port numbers to limit unwanted communication. What function does this scenario describe?

    • Port filtering
    • Using cloud-based firewalls
    • Masking a location
    • Organizing data packets

     

    1. Which type of firewall analyzes network traffic for characteristics and behaviors that appear suspicious and stops them from entering the network?
    • Next-generation firewall (NGFW)
    • Stateful
    • Stateless
    • Cloud-based

    Which of the following types of firewalls can perform deep packet inspection and intrusion detection?

    • Next generation firewall (NGFW)
    • Documented
    • Stateless
    • Stateful

     

    How do VPNs preserve confidentiality?

      • Use temporary memory to store data requested by external servers
      • Monitor traffic to and from a network
      • Translate internet domain names to IP addresses
    • Encrypt data in transit

     

    Fill in the blank: A VPN uses _____ to transfer encrypted data between a device and the VPN server.

      • network segmentation
      • transmission control
      • packet sniffing
    • encapsulation

    Fill in the blank. A controlled zone protects a company’s internal network from a(n)___ security zone.

      • Restricted
      • Demilitarized
      • Internal network
    • Uncontrolled

     

    1. What network security service masks a device’s virtual location to keep data private while using a public network?
    • Network segmenter
    • Cloud service provider (CSP)
    • Virtual private network (VPN)
    • Domain name system (DNS)
    1. Fill in the blank: VPN services perform encapsulation to protect sensitive data by _____ it in other data packets.
    • wrapping
    • archiving
    • classifying
    • displaying
    1. What network zone contains the internet and other services that are outside of an organization’s control?
    • Restricted
    • Uncontrolled
    • Controlled
    • Demilitarized
    1. What is the function of the demilitarized zone (DMZ)?
    • Isolate servers exposed to the internet from the rest of a network
    • Organize data by forwarding it to other servers
    • Protect highly confidential information accessible only to employees with certain privileges
    • Encrypt data as it travels across the internet
    1. Fill in the blank: A _____ fulfills the requests of its clients by forwarding them to other servers
    • Virtual private network (VPN)
    • Firewall
    • Proxy server
    • Router

    What is one way forward proxies secure internal networks?

      • Both forward and reverse proxy servers add a layer of protection from the internet.
    • Forward proxy servers hide a user’s IP address and approve all outgoing requests.
    • They are useful for protecting internal web servers that contain confidential data.
    • They receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.

     

    Shuffle Q/A

     

    1. Which of the following statements accurately describe wireless protocols? Select three answers.
    • WPA is a wireless security protocol pertaining to connecting to the internet.
    • The set of standards IEEE 802.11 is also referred to as Wi-Fi.
    • Wi-Fi protocols provide significantly lower security levels than wired connections.
    • The Institute of Electrical and Electronics Engineers maintains Wi-Fi standards.
    1. A firewall administrator sets up a firewall that operates based on predefined rules. It is not used to keep track of information from data packets. What class of firewall does this scenario describe?

    Answers

    • Cloud-based
    • Next-generation firewall (NGFW)
    • Stateful
    • Stateless
    1. A security professional sets up a security measure to allow employees to work from home securely while having access to internal network resources. What does this scenario describe?
    • Firewall
    • Address resolution protocol (ARP)
    • Virtual private network (VPN)
    • Cloud service provider (CSP)
    1. Fill in the blank: VPN services perform _____ to protect sensitive data by wrapping it in other data packets.
    • network segmentation
    • transmission control
    • encapsulation
    • packet sniffing
    1. What network is part of the uncontrolled zone?
    • Internet
    • Subnets
    • Web servers
    • Internal networks
    1. Which of the following statements accurately describe forward and reverse proxy servers? Select three answers.
    • Forward proxy servers receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.
    • Reverse proxy servers accept traffic from external parties, approve it, then forward it to internal servers.
    • Reverse proxy servers work by hiding a user’s IP address and approving all outgoing requests.
    • Forward proxy servers regulate and restrict a person’s access to the internet.
    1. What network protocol helps data get to the right place by determining the MAC address of the next router or device on its path?
    • Hypertext Transfer Protocol Secure (HTTPS)
    • Address Resolution Protocol (ARP)
    • Secure Sockets Layer/Transport Layer Security (SSL/TLS)
    • Transmission Control Protocol (TCP)
    1. What network zone includes web and proxy servers that host websites for the public, as well as email and file servers to handle external communications?
    • Uncontrolled zone
    • Demilitarized zone
    • Restricted zone
    • Virtual private network

     

    A security analyst implements a system to service client requests by forwarding them to other servers. What do they use?

    • Proxy server
    • Virtual private network (VPN)
    • Firewall
    • Router

     

    1. A security analyst implements a proxy server to secure internal networks. What are some of the proxy server’s primary functions? Select all that apply.
    • Determine whether requests to connect to a website are allowed
    • Use public IP addresses that are different from the rest on the private network
    • Temporarily stores data that is frequently requested by external servers
    • Divide the network into segments to maintain privacy within corporate groups
    1. Fill in the blank: A ____ accepts traffic from external parties, approves it, then forwards it to internal servers.
    • Reverse proxy
    • Forward proxy
    • Virtual private network (VPN)
    • Next generation firewall (NGFW)

     

    Week 3

     

    1. What type of attack uses multiple devices or servers in different locations to flood the target network with unwanted traffic?
    • Phishing attack
    • Tailgating attack
    • Denial of Service (DoS) attack
    • Distributed Denial of Service (DDoS) attack
    1. What type of attack poses as a TCP connection and floods a server with packets simulating the first step of the TCP handshake?
    • SYN flood attack
    • ICMP flood
    • On-path attack
    • SYN-ACK flood attack
    1. Fill in the blank: The Denial of Service (DoS) attack _____ is caused when a hacker sends a system an ICMP packet that is bigger than 64KB.
    • On-path
    • SYN flood
    • Ping of Death
    • ICMP flood
    1. Which types of attacks take advantage of communication protocols by sending an overwhelming number of requests to a server? Select all that apply.
    • DDoS attack
    • ICMP flood attack
    • SYN flood attack
    • TCP connection attack

     

    Test your knowledge: Network interception attack tactics

    1. Passive packet sniffing involves data packets being manipulated while in transit, which may include injecting internet protocols to redirect the packets to unintended ports or changing the information the packet contains.
    • True
    • False
    1. Fill in the blank: A security analyst can protect against malicious packet sniffing by _____ to encrypt data as it travels across a network.
    • using only websites with HTTP at the beginning of their domain addresses
    • using a VPN
    • using a network hub
    • using free public Wi-Fi
    1. Which type of attack involves an attacker changing the source IP of a data packet to impersonate an authorized system and gain access to the network?
    • Replay attack
    • IP spoofing
    • On-path attack
    • Ping of death
    1. Which of the following statements accurately describes a smurf attack?
    • A DoS attack that is caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than the maximum size
    • A network attack performed when an attacker sniffs an authorized user’s IP address and floods it with packets
    • A network attack performed when an attacker intercepts a data packet in transit and delays it or repeats it at another time
    • A DoS attack performed by an attacker repeatedly sending ICMP packets to a network server

     

    Weekly challenge 3

     

    1. What happens during a Denial of Service (DoS) attack?
    • The target crashes and normal business operations cannot continue.
    • The data packets containing valuable information are stolen as they travel across the network.
    • The attacker successfully impersonates an authorized user and gains access to the network.
    • The network is infected with malware.
    1. Which of the following statements accurately describe Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks? Select three answers.
    • In both DoS and DDoS attacks, every part of the network must be overloaded for the attacks to be successful.
    • A DDoS attack involves multiple hosts carrying out the attack.
    • A DoS attack involves one host conducting the attack.
    • A network device experiencing a DoS attack is unable to respond to legitimate users.

     

    Which of the following statements accurately describe Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks? Select three answers.

    • A DDoS attack may use multiple devices in different locations to flood the target network with unwanted traffic.
    • In both DoS and DDoS attacks, if any part of the network is overloaded, the attacks are successful.
    • A DoS attack involves multiple hosts carrying out the attack.
    • A DoS attack targets a network or server.

     

    1. A security manager is training their team to identify when a server has experienced a SYN-flood attack. What might indicate to the team members that their organization is at risk?
    • The port numbers in the data packets are incorrect.
    • A large number of ICMP packets are delivered to the organization’s servers.
    • An oversized ICMP packet is sent to the network server.
    • The server has stopped responding after receiving an unusually high number of incoming SYN packets.
    1. Fill in the blank: The DoS attack _____ occurs when a malicious actor sends an oversized ICMP packet to a server.
    • smurf
    • SYN flood
    • Ping of Death
    • on-path
    1. Which of the following statements correctly describe passive and active packet sniffing? Select three answers.
      • Using only websites with HTTPS at the beginning of their domain names provides protection from packet sniffing.
    • Passive packet sniffing may enable attackers to change the information a packet contains.
    • Active packet sniffing may enable attackers to redirect the packets to unintended ports.
    • The purpose of passive packet sniffing is to read data packets while in transit.
    1. As a security professional, you research on-path, replay, and smurf attacks in order to implement procedures that will protect your company from these incidents. What type of attack are you learning about?
      • Ping of death
      • SYN flooding
      • Packet sniffing
    • IP spoofing
    1. Fill in the blank: _____ is a network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network.
    • A KRACK attack
    • A DoS attack
    • IP spoofing
    • SYN flooding
    1. In which attack do malicious actors impersonate a web browser or web server by placing themselves between the two devices, then sniffing the packet information to discover their IP and MAC addresses?
    • Packet flooding attack
    • On-path attack
    • Malware attack
    • Smurf attack

    Fill in the blank: The _____ network attack occurs when an attacker delays a data packet after intercepting it in transit.

      • on-path
      • SYN flood
      • smurf
    • replay

     

    Which attack is a combination of a DDoS and an IP spoofing attack, during which the malicious actor overwhelms a target computer?

    • Smurf attack
    • Ping of Death
    • On-path attack
    • Replay attack

     

    1. Fill in the blank: The _____ network attack occurs when a malicious actor takes a network transmission that was sent by an authorized user and repeats it at a later time to impersonate that user.
    • SYN flood
    • smurf
    • on-path
    • replay
    1. Which combination DoS and IP spoofing attack can bring down an entire network by flooding an authorized user’s IP address with packets?
    • On-path attack
    • Replay attack
    • Ping of Death
    • Smurf attack

     

    Shuffle Q/A

     

    1. What is the main objective of a Denial of Service (DoS) attack?
    • Simulate a TCP connection and flood a server with SYN packets
    • Send oversized ICMP packets
    • Disrupt normal business operations
    • Repeatedly send ICMP packets to a network server
    1. A security team discovers that an attacker has taken advantage of the handshake process that is used to establish a TCP connection between a device and their server. Which DoS attack does this scenario describe?
    • ICMP flood
    • On-path attack
    • SYN flood attack
    • Ping of Death
    1. Fill in the blank: The maximum size of a correctly formatted IPv4 ICMP packet is _____, as opposed to the oversized packet that is sent during a Ping of Death attack.
    • 32KB
    • 64TB
    • 15Gb
    • 64KB
    1. Fill in the blank: To reduce the chances of an IP spoofing attack, a security analyst can configure a _____ to reject all incoming traffic with the same source IP addresses as those owned by the organization.
    • VPN
    • HTTPS domain address
    • firewall
    • demilitarized zone
    1. Which of the following statements accurately describe Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks? Select three answers.
    • A DoS attack may use multiple servers in different locations to flood the target network with unwanted traffic.
    • A DDoS attack is intended to overwhelm the target server.
    • A DoS attack may involve flooding a network with traffic.
    • In both DoS and DDoS attacks, if any part of the network is overloaded, the attacks are successful.
    1. Which of the following statements correctly describe passive and active packet sniffing? Select three answers.
    • A company can avoid using unprotected Wi-Fi to help protect itself from packet sniffing.
    • Passive packet sniffing allows malicious actors to view the information going in and out of the targeted device.
    • Passive packet sniffing enables attackers to change the information a packet contains.
    • Active packet sniffing may enable attackers to redirect the packets to unintended ports.
    1. As a security professional, you implement safeguards against attackers changing the source IP of a data packet in order to communicate over your company’s network. What type of network attack are you trying to avoid?
    • Passive packet sniffing
    • Ping of Death
    • Active packet sniffing
    • IP spoofing
    1. What do network-level Denial of Service (DoS) attacks target?
    • Commonly used software applications
    • All hardware within an organization
    • Network bandwidth
    • The personal information of employees
    1. Fill in the blank: The DoS attack _____ occurs when an attacker repeatedly sends ICMP packets to a network server.
    • on-path
    • smurf
    • SYN flood
    • ICMP flood
    1. As a security professional, you take steps to stop an attacker from changing the source IP of a data packet in order to impersonate your authorized system. What type of network attack are you working to prevent?
    • Ping of Death
    • IP spoofing
    • Passive packet sniffing
    • Active packet sniffing
    1. What are some common IP spoofing attacks? Select all that apply.
    • on-path attacks
    • replay attacks
    • smurf attacks
    • KRACK attacks
    1. In which attack would malicious actors gain access to a network, put themselves between a web browser and a web server, then sniff the packet to learn the devices’ IP and MAC addresses?
    • Smurf attack
    • On-path attack
    • Packet flooding attack
    • Malware attack

     

    Week 4

     

    1. Fill in the blank: The _____ acts as an intermediary between software applications and computer hardware.
    • authorized user
    • operating system
    • access system
    • baseline
    1. Which of the following activities are security hardening tasks? Select all that apply.
    • Making patch updates
    • Disposing of hardware and software properly
    • Enforcing password policies
    • Exploiting an attack surface
    1. Multifactor authentication (MFA) is a security measure that requires a user to verify their identity in at least two ways before they can access a system or network.
    • True
    • False
    1. What are examples of physical security hardening? Select all that apply.
    • Installing security cameras
    • Hiring security guards
    • Removing or disabling unused applications
    • Reducing access permissions across devices

     

    Test your knowledge: Network hardening

     

    1. Fill in the blank: Security teams can use _____ to examine network logs and identify events of interest.
    • network segmentation
    • port filtering
    • security information and event management (SIEM) tools
    • baseline configuration
    1. What is a basic principle of port filtering?
    • Block all ports in a network.
    • Allow users access to only areas of the network that are required for their role.
    • Disallow ports that are used by normal network operations.
    • Allow ports that are used by normal network operations.
    1. A security professional creates different subnets for the various departments in their business, ensuring users have access that is appropriate for their particular roles. What does this scenario describe?
    • Network log analysis
    • Network segmentation
    • Patch updates
    • Firewall maintenance
    1. Data in restricted zones should have the same encryption standards as data in other zones.
    • True
    • False

    Test your knowledge: Cloud hardening

     

    1. Fill in the blank: A key distinction between cloud and traditional network hardening is the use of a server baseline image, which enables security analysts to prevent _____ by comparing data in cloud servers to the baseline image.
    • slow speeds
    • damaged data
    • improper resource storage
    • unverified changes
    1. Data and applications on cloud networks do not need to be separated based on their service category, such as their age or internal functionality.
    • True
    • False
    1. Who is responsible for ensuring the safety of cloud networks? Select all that apply.
    • Individual users
    • Research department
    • Cloud service provider
    • Security team
    1. Fill in the blank: _____ cloud services are a common source of cloud security issues.
    • Misconfigured
    • Unauthorized
    • Shared
    • Managed

     

    Weekly challenge 4

     

    1. Which of the following tasks are security hardening practices? Select all that apply.
    • Keeping network devices functioning properly
    • Updating software
    • Loosening access permissions
    • Performing port filtering
    1. What is the relationship between security hardening and an attack surface?
    • Security hardening permanently eliminates the attack surface.
    • Security hardening diminishes the attack surface.
    • Security hardening expands the attack surface.
    • Security hardening increases the attack surface.
    1. Fill in the blank: Hiring a security guard is an example of a _____ security hardening practice.
    • physical
    • virtual
    • software-based
    • network-focused
    1. An organization’s in-house security team has been authorized to simulate an attack on the organization’s website. The objective is to identify any vulnerabilities that are present. What does this scenario describe?
    • Penetration testing
    • The Ping of Death
    • Packet sniffing
    • A Distributed Denial of Service (DDoS) attack
    1. What are some methods for hardening operating systems? Select three answers.
    • Removing unused software to limit unnecessary vulnerabilities
    • Implementing an intrusion detection system (IDS)
    • Configuring a device setting to fit a secure encryption standard
    • Keeping an up-to-date list of authorized users.
    1. A security analyst notices something unusual affecting their company’s OS. To confirm that no changes have been made to the system, the analyst compares the current configuration to existing documentation about the OS. What does this scenario describe?
    • Checking baseline configuration
    • Upgrading the interface between computer hardware and the user
    • Responsibly managing applications
    • Verifying user identity when accessing an OS
    1. Fill in the blank: The security measure multifactor authentication (MFA) requires a user to verify their _____ in two or more ways to access a system or network.
    • password
    • user permissions
    • job title
    • identity
    1. In what way might port filtering be used to protect a network from an attack?
    • By increasing the attack surface within a business network
    • By creating isolated subnets for each of the various departments within an organization
    • By helping analysts inspect, analyze, and react to security events based on their priority
    • By blocking or allowing certain port numbers in order to limit unwanted communication

     

    In what way might port filtering be used to protect a network from an attack?

    • To increase the attack surface in a network
    • To inspect, analyze, and react to security events based on their priority
    • To disable unused ports in order to reduce the attack surface
    • To create isolated subnets for different departments in an organization

     

    1. A security team considers the best way to handle the different security zones within their network. They prioritize protecting the restricted zone by separating from the rest of the network and ensuring it has much higher encryption standards. What does this scenario describe?
    • Cloud hardening
    • Patch updating
    • Penetration testing
    • Network segmentation
    1. What is one key similarity between regular web servers and cloud servers?
    • In both, all data and application are stored together, regardless of their service category
    • They both use baseline images stored in the cloud to compare data.
    • They both require proper maintenance and security hardening.
    • In both, all applications are stored together, regardless of their age.

     

    Shuffle Q/A

     

    1. To help improve the security of a business, its in-house security team is approved to simulate an attack that will identify vulnerabilities in business processes. What does this scenario describe?
    • A Distributed Denial of Service (DDoS) attack
    • Packet sniffing
    • Penetration testing
    • The Ping of Death

     

    Which of the following are OS hardening tasks? Select three answers.

    • Regularly installing updates
    • Implementing multifactor authentication
    • Using secure encryption standards
    • Conducting a penetration test

     

    1. What is one key similarity between regular web servers and cloud servers?
    • In both, all data and application are stored together, regardless of their service category.
    • They both require security measures taken by the organization to stay safe.
    • In both, all applications are stored together, regardless of their age.
    • They both use baseline images stored in the cloud to compare data.
    1. Which of the following tasks are security hardening practices? Select all that apply.
    • Reducing access permissions across devices and networks
    • Installing patch updates
    • Disabling unused ports
    • Replacing the RAM on the computers
    1. What is the term for all the potential system vulnerabilities that a threat actor could exploit?
    • Security architecture
    • Risk
    • Security challenge
    • Attack surface
    1. Fill in the blank: Installing security cameras is an example of a _____ security hardening practice.
    • physical
    • software-based
    • network-focused
    • virtual
    1. A company’s executive team approves a proposal by the security director. The proposal involves security professionals simulating an attack on the company’s systems in order to identify vulnerabilities. What does this scenario describe?
    • Penetration testing
    • The Ping of Death
    • Packet sniffing
    • A Distributed Denial of Service (DDoS) attack
    1. Which of the following are OS hardening tasks? Select three answers.
    • Using secure encryption standards
    • Implementing multifactor authentication
    • Configuring a firewall
    • Running regularly scheduled backups
    1. A security analyst reviews documentation about a firewall rule that includes a list of allowed and disallowed network ports. They compare it to the current firewall to ensure no changes have been made. What does this scenario describe?
    • Verifying user identity when accessing an OS
    • Upgrading the interface between computer hardware and the user
    • Checking baseline configuration
    • Responsibly managing applications
    1. Fill in the blank: The security measure _____ requires a user to verify their identity in two or more ways to access a system or network.
    • baseline configuration
    • network log analysis
    • multifactor authentication (MFA)
    • password policy
    1. Which of the following statements accurately describes port filtering?
    • A process performed by a VPN service that protects data by wrapping it in other data packets
    • A security technique that divides a network into segments
    • A security protocol that provides an encrypted tunnel for issuing commands from a remote server
    • A firewall function that blocks or allows certain port numbers in order to limit unwanted network traffic
    1. A security team works to ensure that an issue in one area of the business does not spread to others and create more problems. They design subnets for each department, such as one for research and another for finance. What does this scenario describe?
    • Patch updating
    • Cloud hardening
    • Penetration testing
    • Network segmentation
    1. How can a security professional confirm that no unverified changes have occurred within a cloud server?
    • Use port filtering to block or allow certain updates
    • Compare the server baseline image to the data in cloud servers
    • Establish multifactor authentication (MFA)
    • Perform a penetration test
    1. What are the purposes of performing a patch update for security hardening? Select all that apply.
    • Requiring a user to verify their identity to access a system or network.
    • Fixing known security vulnerabilities in a network or services.
    • Upgrading an operating system to the latest software version.
    • Preventing malicious actors from flooding a network.
    1. Fill in the blank: Requiring employees to turn off their personal devices while in secure areas is an example of a _____ security hardening practice.
    • network-focused
    • virtual
    • cloud-based
    • physical
    1. Fill in the blank: The security measure multi-factor authentication (MFA) requires a user to verify their identity _____ before accessing a system or network.
    • in two or more ways
    • within 60 seconds
    • at least once
    • every day

     

    Course 4 – Tools of the Trade: Linux and SQL

     

    Week 1

     

    1. What is an operating system?
    • The physical components of a computer
    • The interface between computer hardware and the user
    • A program for sending email
    • A computer, smartphone, or tablet
    1. Which of the following are operating systems? Select all that apply.
    • Linux
    • Android
    • Windows
    • Smartphones
    1. Which of the following statements correctly describe operating systems? Select all that apply.
    • Computers run efficiently because of operating systems.
    • Operating systems are the physical components of a computer.
    • Operating systems are able to run many applications at once.
    • Operating systems help people interact with computers in complex ways.
    1. Computers communicate in a language called binary, which consists of 0s and 1s.
    • True
    • False

     

    Test your knowledge: The operating system at work

     

    1. What is the job of a computer’s operating system?
    • Allow users to specify tasks
    • Help other computer programs run efficiently
    • Load the bootloader
    • Turn on the computer
    1. Fill in the blank: In order to carry out tasks on a computer, users directly interact with _____.
    • the BIOS
    • task managers
    • the CPU
    • applications
    1. The management of a computer’s resources and memory is handled by an application.
    • True
    • False
    1. Which of the following processes are part of starting an operating system? Select all that apply.
    • The BIOS or UEFI microchip loads the bootloader.
    • The bootloader starts the operating system.
    • Either the BIOS or UEFI microchip is activated when a user turns on a computer.
    • The bootloader immediately launches when a user turns on a computer.

     

    Test your knowledge: The user interface

     

    1. What is a GUI?
    • A user interface that enables people to manage tasks on a computer using icons
    • A user interface that allows people to interact with a computer through commands
    • A user interface that runs only on Linux operating systems
    • A user interface that only runs on mobile devices
    1. Which of the following can be components of a GUI? Select all that apply.
    • Desktop icons and shortcuts
    • Hardware
    • Task bar
    • Start menu
    1. Fill in the blank: A security professional uses a(n) _____ to interact with a computer using text-based instructions.
    • operating system
    • GUI
    • text system
    • CLI
    1. A useful feature of a CLI is that it records a history file of commands and actions.
    • True
    • False

     

    Weekly challenge 1

     

    1. Which of the following statements accurately describe operating systems? Select all that apply.
    • Operating systems are responsible for making computers run efficiently.
    • Operating systems are a type of computer hardware.
    • Computers have operating systems, but smartphones and tablets do not have them.
    • Operating systems help people and computers communicate.
    1. Which of the following are common operating systems? Select three answers.
    • macOS®
    • Linux
    • PC
    • Windows
    1. What is a bootloader?
    • A program that checks for malware infections on a computer
    • A program that starts an operating system
    • A program that communicates instructions to the user
    • A program that loads the BIOS or UEFI chip
    1. Fill in the blank: When someone uses a computer application, the operating system interprets the user’s requests and directs them to the appropriate _____.
    • user on the system
    • applications
    • user interface
    • components of the computers hardware
    1. What happens when you use applications on your computer? Select three answers.
    • The application receives information from the operating system and sends a confirmation message directly to the hardware.
    • The operating system interprets a request from the application and directs it to the appropriate components of the computer’s hardware.
    • The application sends your request to the operating system.
    • The hardware sends information back to the operating system, which is sent back to the application.
    1. Fill in the blank: The user communicates with the operating system via a(n) _____.
    • user application
    • specialized type of hardware
    • another operating system
    • user interface
    1. Which of the following statements correctly describe GUIs and CLIs? Select three answers.
    • A CLI performs multiple tasks less efficiently than a GUI.
    • CLI commands execute tasks, such as moving a file to a new folder.
    • GUI icons help users manage different tasks on a computer.
    • A CLI is a text-based user interface.
    1. A security team suspects that an attacker has compromised their system. They examine the commands entered by the attacker to determine whether they can trace the attacker’s actions to help them resolve the incident. What does this scenario describe?
    • Reviewing a history file in a GUI
    • Repeating a process using icons
    • Reviewing a history file in a CLI
    • Examining the usage of files and applications from a start menu
    1. To ensure a computer’s capacity is used where it is needed most, what does an operating system manage?
    • BIOS and UEFI
    • Viruses and malware
    • Icons and graphics
    • Resources and memory

     

    Shuffle Q/A

     

    1. Which of the following statements accurately describe operating systems? Select all that apply.
    • Operating systems are the interfaces between computer hardware and user.
    • Computers, smartphones, and tablets all have operating systems.
    • Operating systems only permit one application to run at a time.
    • Operating systems are responsible for making computers run efficiently.
    1. Which of the following operating systems run on desktop and laptop computers? Select two answers.
    • Android
    • iOS
    • macOS®
    • Windows
    1. Fill in the blank: When someone uses a computer application, the _____ interprets the user’s requests and directs them to the appropriate components of the computer’s hardware.
    • CPU
    • bootloader
    • operating system
    • BIOS
    1. If you wanted to perform a calculation on your computer, which of these things would happen? Select three answers.
    • The application would send this request to the operating system.
    • The hardware would send the answer directly back to the application.
    • You would type in the number you wanted to calculate into the application.
    • The hardware would determine the answer and send it back to the operating system.
    1. Fill in the blank: The _____ ensures the limited capacity of a computer system is used where it’s needed most.
    • bootloader
    • task manager
    • hardware
    • operating system
    1. Which of the following statements accurately describe operating systems? Select all that apply.
    • Smartphones do not have operating systems.
    • Operating systems help people and computers communicate.
    • Operating systems are part of the physical components of a computer.
    • Operating systems enable computers to run multiple applications at once.
    1. Which of the following operating systems were designed to run on mobile devices? Select two answers.
    • Android
    • macOS®
    • Linux
    • iOS
    1. What components are involved in the booting process? Select two answers.
    • The bootloader
    • BIOS or UEFI
    • A CLI
    • A GUI
    1. Fill in the blank: A _____ is a program that allows users to control functions of the operating system.
    • UEFI chip
    • user interface
    • bootloader
    • CPU
    1. Which of the following statements correctly describe GUIs and CLIs? Select three answers.
    • A CLI uses commands to communicate with an operating system.
    • A CLI can complete multiple tasks efficiently.
    • A GUI is a text-based user interface.
    • GUI icons help users manage different tasks on a computer.

     

    Which of the following statements correctly describe GUIs and CLIs? Select three answers.

    • A GUI is a user interface that uses icons.
    • CLI commands execute tasks, such as opening a program.
    • A CLI can complete multiple tasks efficiently.
    • A CLI includes a start menu and taskbar.

     

    1. What does BIOS load in order to start an operating system?
    • The bootloader
    • The user interface
    • UEFI
    • An anti-virus application
    1. A security team responds to a breach by following the instructions from their playbook. They later want to ensure all of the commands they entered were correct. So, they review the saved steps they performed in the command line. What does this scenario describe?
    • Repeating a process using icons
    • Saving files and applications from a start menu
    • Reviewing a history file in a GUI
    • Reviewing a history file in a CLI
    1. Fill in the blank: On a computer, the _____ handles resource and memory management.
    • task manager
    • hardware
    • browser
    • operating system

     

    Which layer is responsible for establishing a connection between a source and a destination device?

      • Layer 1, network access
      • Layer 2, internet
    • Layer 3, transport
    • Layer 4, application

     

    Week 2

     

    1. As a security analyst, you might use Linux to review logs when investigating an issue.
    • True
    • False
    1. Which of the following are components of the Linux architecture? Select all that apply.
    • The shell
    • Applications
    • The kernel
    • The operating system
    1. Fill in the blank: The Filesystem Hierarchy Standard (FHS) is the component of Linux architecture that _____.
    • organizes data
    • consists of the physical components of a computer
    • enables people to communicate with the system
    • manages processes and memory
    1. Which of the following hardware components are peripheral devices? Select all that apply.
    • a printer
    • a CPU
    • RAM
    • a monitor

     

    Test your knowledge: Linux distributions

     

    1. Fill in the blank: Because the _____ is open source, anyone can modify it to build new Linux distributions.
    • hardware
    • kernel
    • application
    • shell
    1. What is KALI LINUX ™?

    (KALI LINUX ™ is a trademark of OffSec.)

    • A Debian-derived, open-source distribution of Linux designed for security tasks
    • A tool with a graphical user interface that can be used to analyze live and captured network traffic
    • A subscription-based Linux distribution built for enterprise use
    • A tool used to guess passwords
    1. What is an open-source, user-friendly distribution derived from Debian that is widely used in security and other industries?
    • Ubuntu
    • Autopsy
    • Red Hat
    • tcpdump
    1. Which of the following are distributions of Linux? Select all that apply.
    • Parrot
    • CentOS
    • Red Hat
    • Pen Test

     

    Test your knowledge: The shell

     

    1. What is the shell?
    • An instruction telling the computer to do something
    • The command-line interpreter
    • Data consisting of an ordered sequence of characters
    • Information received by the operating system (OS) via the command line
    1. After a user inputs a command into the shell, what can the shell return to the user? Select two answers.
    • A request for more input from the user
    • Output
    • A request for user approval
    • An error message
    1. What is standard error in Linux?
    • A Linux command that outputs a specified string of text
    • Error messages returned by the operating system through the shell
    • Information received by the operating system via the command line
    • Information returned by the operating system through the shell
    1. What is the difference between standard input and standard output?
    • Standard input is sent from the Filesystem Hierarchy Standard (FHS). Standard output is sent to the FHS.
    • Standard input is sent to the operating system. Standard output is sent from the operating system.
    • Standard input is sent to the Filesystem Hierarchy Standard (FHS). Standard output is sent from the FHS.
    • Standard input is sent from the operating system. Standard output is sent to the operation system.

     

    Weekly challenge 2

     

    1. Fill in the blank: Linux is a(n) _____ operating system.
    • closed-source
    • single-user
    • open-source
    • command line
    1. Which of the following components are part of the Linux architecture? Select all that apply.
    • Applications
    • The kernel
    • Standard input
    • The shell
    1. What is one reason why there are multiple distributions of Linux?
    • Linux distributions are closed source, which means users must create a new distribution if they want to use Linux.
    • Linux distributions expire after a period of time, which means new distributions must be created.
    • The Linux kernel is updated yearly, which means community developers create new distributions to stay updated.
    • The Linux kernel is open source, which means anyone can use the kernel and modify it.
    1. Which of the following statements correctly describe KALI LINUX ™? Select three answers.

     

    (KALI LINUX ™ is a trademark of OffSec.)

    • KALI LINUX ™ was created specifically to be used with penetration testing and digital forensics.
    • KALI LINUX ™ was created as an enterprise distribution of Linux.
    • KALI LINUX ™ is an open-source Linux distribution that is widely used in security.
    • KALI LINUX ™ should be used on a virtual machine.
    1. Which of these are common Linux distributions? Select all that apply.
    • Parrot
    • Red Hat
    • Bash
    • CentOS
    1. Fill in the blank: The _____ communicates with the kernel to execute commands.
    • shell
    • Filesystem Hierarchy Standard (FHS)
    • interface
    • hardware
    1. Which of the following are communication methods with the shell? Select all that apply.
    • Standard command
    • Standard error
    • Standard input
    • Standard output
    1. Which of the following is an example of hardware?
    • Shell
    • Kernel
    • CPU
    • Applications
    1. When the system doesn’t know how to respond to a command, what is the result?
    • A request for additional resources
    • Standard input
    • Standard output
    • An error message

     

    Shuffle Q/A

     

    1. What is an effect of Linux being open source?
    • It allows for collaboration among a community of developers.
    • It is the most simple OS in terms of architecture.
    • It requires a yearly subscription.
    • It is the easiest OS for beginners to use.
    1. Which of the following components are part of the Linux architecture? Select all that apply.
    • The kernel
    • The Filesystem Hierarchy Standard (FHS)
    • Standard output
    • Hardware
    1. What are distributions?
    • Simulated attacks that help identify vulnerabilities
    • The different versions of Linux
    • Programs that perform specific tasks
    • Data consisting of an ordered sequence of characters
    1. What is an example of a Linux distribution that comes pre-installed with many security-related tools?
    • Wireshark
    • KALI LINUX ™ (KALI LINUX ™ is a trademark of OffSec.)
    • Kernel
    • SUSE
    1. What is the Linux shell used for?
    • It organizes the data stored in the computer so it can be found easily.
    • It manages processes and memory.
    • It ensures the system allocates resources efficiently.
    • It allows you to communicate with the operating system.

     

    Fill in the blank: When you communicate with the shell, the commands in the shell can ___. Select all that apply.

    • give error messages
    • give output
    • take output
    • take input

    Which of the following is a Linux distribution that is built for enterprise use and offers a dedicated support team for customers?

      • nano
      • KALI LINUX ™ (KALI LINUX ™ is a trademark of OffSec.)
    • Red Hat
    • Parrot

    Fill in the blank: Package managers are used to distribute Linux _____.

      • kernels
      • shells
      • commands
    • applications

     

    1. Which of the following is an example of an application?
    • Parrot
    • CentOS
    • nano
    • The kernel
    1. What does standard error contain?
    • Error messages sent as standard input to an application.
    • Error messages sent to the OS from the shell.
    • Error messages returned by the OS through the shell.
    • Error messages sent to an application as string data.
    1. Which aspect of Linux makes it available to everyone?
    • Its kernel
    • Its open-source design
    • Its multiple distributions
    • Its use in cybersecurity
    1. Which of the following components are part of the Linux architecture? Select all that apply.
    • The distribution
    • The Filesystem Hierarchy Standard (FHS)
    • Applications
    • The shell

     

    Which of the following components are part of the Linux architecture? Select all that apply.

    • The kernel
    • Standard output
    • Hardware
    • The Filesystem Hierarchy Standard (FHS)

     

    1. Which of the following are examples of Linux distributions? Select all that apply.
    • Debian
    • Wireshark
    • Ubuntu
    • tcpdump
    1. What is the shell in Linux?
    • An instruction telling the computer to do something
    • The command-line interpreter
    • A Linux command that outputs a specified string of text
    • The information received by the OS via the command line

     

    Week 3

     

    1. What is a command?
    • A common shell in many Linux distributions
    • An instruction that tells a computer to do something
    • The highest-level directory in Linux
    • A component of the Linux architecture
    1. Which of the following commands prints the working directory to the screen?
    • cat
    • ls
    • pwd
    • head
    1. What does the cd command do?
    • Navigates between directories
    • Outputs a specified string of text
    • Displays the names of files in the current directory
    • Prints the working directory to the screen
    1. A security professional enters head access.txt into a shell. What are they telling the operating system to do?
    • Remove the first 5 lines of access.txt
    • Return the content of access.txt one page a time
    • Display the first 10 lines of access.txt
    • Add a header to the file named access.txt
    1. What is the difference between an absolute file path and a relative file path?
    • An absolute file path starts from the current directory, and a relative file path starts from the root.
    • An absolute file path ends with a forward slash (/), and a relative file path ends with a backslash (\).
    • An absolute file path starts from the root, and a relative file path starts from the current directory.
    • An absolute file path ends with a backslash (\), and a relative file path ends with a forward slash (/).

     

    Test your knowledge: Manage file content in Bash

     

    1. What two arguments commonly follow the grep command?
    • The file to move and the new file location
    • The string to search for and the file to search through
    • The file to write to and the string to add to it
    • The file name to search for and the directory to search through
    1. In Linux, what does the piping command (|) do?
    • It searches a specified file and returns all lines in the file containing a specified string.
    • It moves a file or directory to a new location.
    • It sends the standard input of one command as standard output to another command for further processing.
    • It sends the standard output of one command as standard input to another command for further processing.
    1. A security professional enters cp vulnerabilities.txt /home/analyst/projects into the command line. What do they want the operating system to do?
    • Create a new file named vulnerabilities.txt in the projects directory
    • Remove the vulnerabilities.txt file from the projects directory
    • Search for the string vulnerabilities.txt in the projects directory
    • Copy the vulnerabilities.txt file into the projects directory
    1. What command creates a new file called failed_logins.txt?
    • find failed_logins.txt
    • mkdir failed_logins.txt
    • touch failed_logins.txt
    • rm failed_logins.txt

     

    Test your knowledge: Authenticate and authorize users

     

    1. What is authorization?
    • The concept of granting only the minimal access and authorization required to complete a task or function
    • The concept of granting access to specific resources in a system
    • The process of a user proving that they are who they say they are in the system
    • The process of temporarily granting elevated permissions to specific users
    1. Which of the following statements correctly describe the file permissions string -rw-rw-rw-? Select two answers.
    • The user and group have execute permissions.
    • The user has write permissions.
    • The file type is a directory.
    • The group has read permissions.
    1. A security professional enters chmod g+w access.txt into the command line. What does this command tell the operating system to do?
    • Add write permissions to the user for the access.txt file
    • Remove write permissions from the group for the access.txt file
    • Add write permissions to the group for the access.txt file
    • Remove write permissions from the user for the access.txt file
    1. Which of the following commands typically must be used with sudo? Select three answers.
    • useradd
    • chmod
    • userdel
    • chown
    1. A security analyst is updating permissions on a directory named projects. The current permissions are drwxrw-r–. They want to add execute permissions for the group. What do they enter on the command line?
    • chmod g+x projects
    • chmod u-x projects
    • chmod x+x projects
    • chmod g-x projects

     

    Test your knowledge: Get help in Linux

     

    1. Which of the following statements accurately describe Linux’s online global community? Select three answers.
    • Because Linux is open-source, the community can easily contribute.
    • The community is focused on collecting feedback from advanced users of Linux.
    • Linux users can find support from the community for everyday tasks.
    • The community publishes online information to help users learn how to operate Linux.
    1. What does the man command do?
    • Display a description of a command on a single line
    • Display information on other commands and how they work
    • Search the manual page descriptions for a specified string
    • Delete a user from the system
    1. What does the whatis command do?
    • Return the username of the current user
    • Display information on other commands and how they work
    • Search the manual page descriptions for a specified string
    • Display a description of a command on a single line
    1. What is an advantage of the apropos command?
    • It incorporates mandatory options for customized searching
    • It condenses the description of a specific command to one line.
    • Users can search for a command even if they do not know the specific command name.
    • It can be used to search for descriptions of commands when you know the specific command name.

     

    Weekly challenge 3

     

    1. What are the arguments in mv Q1users.txt /home/analyst/reports? Select two answers.
    • Q1users.txt
    • .txt
    • mv
    • /home/analyst/reports
    1. Fill in the blank: The highest-level directory in Linux is called the _____.
    • permissions
    • root directory
    • home directory
    • sudo

     

    Which command searches a specified file and returns all lines in the file containing a specified string?

      • mkdir
      • sudo
    • grep
    • pwd

     

    Which of these commands creates a new file?

      • cd
      • chmod
    • touch
    • mkdir

     

    1. What does the grep command do?
    • Searches a specified file and returns all lines in the file containing a specified string
    • Temporarily grants elevated permissions to specific users
    • Prints the working directory to the screen
    • Creates a new directory
    1. What does the touch command do?
    • Creates a new file
    • Opens a file editor
    • Moves a file or directory to a new location
    • Changes permissions on files and directories
    1. What are read, write, and execute?
    • The three types of permissions for authorized users
    • The three types of owners for files and directories
    • Different methods for editing files
    • Specific Linux commands used to change file permissions

     

    A security analyst is updating permissions on the file access.txt. They want to add write permissions for the user and remove read permissions for the group.  What do they enter on the command line?

    • chmod u+w,g-r access.txt
    • chmod access.txt u+w,g-r
    • chmod u-w,g+r access.txt
    • chmod u+rw,g-rw access.txt

     

    1. A security analyst is updating permissions on the file access.txt. They want to add write permissions for the user and remove read permissions for the group. What do they enter on the command line?
    • chmod u-w,g+r access.txt
    • chmod u+rw,g-rw access.txt
    • chmod access.txt u+w,g-r
    • chmod u+w,g-r access.txt
    1. A user is not a root user, but needs elevated privileges to use certain commands. What should they do?
    • Use the sudo command
    • Assign themselves write permissions
    • Assign themselves execute permissions
    • Use the chmod command
    1. Which command can you use to change your current directory?
    • pwd
    • cat
    • ls
    • cd
    1. What does the apropos command do?
    • Searches the manual page descriptions for a specified string
    • Displays detailed information on commands and their options
    • Prints the working directory to the screen
    • Displays a description of a command on a single line
    1. Given the following permissions drw-rw-r–, what permissions does the group have? Select all that apply.
    • Read
    • Use
    • Write
    • Execute

     

    Given the following permissions drw-rw-r–, which character indicates if this is a file or directory?

      • Fifth
      • Tenth
    • First
    • Second

     

    Shuffle Q/A

     

    1. A security analyst enters grep OS updates.txt into the command line. What does this tell the operating system to do?
    • Create a new directory named OS and a new file named updates.txt
    • Create a new file named updates.txt in the OS directory
    • Search through the updates.txt file and return all lines containing the string OS
    • Move the updates.txt file to the OS directory
    1. What does sudo do?
    • Temporarily grants elevated permissions to specific users
    • Deletes users from the system
    • Changes the owner associated with a particular file
    • Adds users to the system
    1. In which of these situations would you enter cd logs?
    • You want to search for the string logs in the files of your current directory.
    • You want to list all the files and directories in the logs directory.
    • You want to change to a subdirectory of your current directory named logs.
    • You want to print the first 10 lines of the logs file.
    1. Given the following permissions drw-rw-r–, what does the fourth character represent?
      • The group does not have execute permissions for this directory
    • The user does not have execute permissions for this directory
    • The user has execute permissions for this directory
    • The group has execute permissions for this directory
    1. What are the arguments in cp vulnerabilities.txt /home/analyst/projects? Select two answers.
    • /home/analyst/projects
    • vulnerabilities.txt
    • cp
    • /home
    1. Which of the following items represents the root directory?
    • /
    • *home
    • /home
    • *
    1. A security analyst enters touch updates.txt into the command line. What does this tell the operating system to do?
    • Move the updates.txt file out of their current directory
    • Create a new file named updates.txt in their current directory
    • Open the updates.txt file
    • Create a new file named updates.txt and move it to the root directory
    1. Which of the following are types of permissions? Select all that apply.
    • Read
    • Write
    • Authorize
    • Execute
    1. A security analyst enters chmod u+w,g-r access.txt into the command line. What does this command tell the operating system to do? Select all that apply.
    • Remove read permissions from the user for the access.txt file
    • Add write permissions to the user for the access.txt file
    • Add write permissions to the group for the access.txt file
    • Remove read permissions from the group for the access.txt file
    1. Which of the following commands require the user to be a root user or have sudo privileges? Select two answers.
    • cd
    • useradd
    • userdel
    • grep
    1. What should you specify in the argument following the cd command?
    • Your current directory
    • The string you want to search for
    • The directory you want to navigate to
    • The file you want to create
    1. Which of the following commands searches the manual page descriptions for a specified string?
    • cp
    • pwd
    • man
    • apropos

     

    Week 4

     

    1. Which statement accurately describes the organization of a relational database?
    • Relational databases consist of a single table with one primary key and one foreign key.
    • Relational databases contain tables that are related to each other through primary and foreign keys.
    • Relational databases consist of a single table containing related information.
    • Relational databases contain primary keys with at least two duplicate values.
    1. What is SQL used for? Select two answers.
    • Finding data to support security-related decisions and analysis
    • Allowing users to access a specific machine
    • Securing an organization’s systems and networks
    • Creating, interacting with, and requesting information from a database
    1. A record of attempts to connect to an organization’s network is one example of a log.
    • True
    • False
    1. Fill in the blank: A request for data from a database table or a combination of tables is called a _____.
    • query
    • log
    • key
    • row

     

    Test your knowledge: SQL queries

     

    1. What is filtering in SQL?
    • Removing invalid records
    • Removing unnecessary data from the database
    • Selecting data that match a certain condition
    • Changing a table to match a condition
    1. You are working with the Chinook database and want to return the firstname, lastname, and phone of all employees. Replace –??? with the missing information to complete the query. (If you want to undo your changes to the query, you can click the Reset button.)

    What is Andrew Adams’ phone number?

    Answers

    • +1 (403) 262-3443
    • +1 (780) 428-9482
    • +1 (780) 836-9987
    • +1 (403) 467-3351
    1. A security analyst wants to filter the log_in_attempts table for records where the value in the country column is ‘Canada’. What is a valid query for this?
    • WHERE country = ‘Canada’

      SELECT *

      FROM log_in_attempts;
    • SELECT *

      FROM log_in_attempts

      WHERE country = ‘Canada’;
    • SELECT WHERE country = ‘Canada’

      FROM log_in_attempts;
    • SELECT *

      FROM log_in_attempts

      WHERE country = Canada;
    1. Which pattern matches with any string that starts with the character ‘A’?
    • ‘%A%’
    • ‘%A’
    • ‘A%’
    • ‘A’

     

    Test your knowledge: More SQL filters

    1. Which filter outputs all records with values in the date column between ’01-01-2015′ (January 1, 2015) and ’01-04-2015′ (April 1, 2015)?
    • WHERE date BETWEEN ’01-01-2015′ AND ’01-04-2015′;
    • WHERE date BETWEEN ’01-01-2015′, ’01-04-2015′;
    • WHERE date < ’01-04-2015′;
    • WHERE date > ’01-01-2015′;
    1. Which operator is most efficient at returning all records with a status other than ‘successful’?
    • OR
    • NOT
    • BETWEEN
    • AND
    1. You are working with the Chinook database. You want to find the first and last names of customers who have a value in the country column of either ‘Brazil’ or ‘Argentina’. Replace –??? with the missing information to complete the query. (If you want to undo your changes to the query, you can click the Reset button.)

    How many customers are from Brazil or Argentina?

    • 5
    • 6
    • 1
    • 4
    1. While working as an analyst, you encounter a query that includes the following filter:

     

    SELECT *

     

    FROM customers

     

    WHERE country = ‘USA’ AND state = ‘NV’

     

    What will this query return?

    • Information about customers who have a value of ‘USA’ in the country column and a value of ‘NV’ in the state column.
    • Information about customers who do not have a value of ‘USA’ in the country column but do have a value of ‘NV’ in the state column.
    • Information about customers who have a value of ‘USA’ in the country column or a value of ‘NV’ in the state column.
    • Information about customers who do not have a value of ‘USA’ in the country column or do not have a value of ‘NV’ in the state column.

     

    Test your knowledge: SQL joins

     

    1. Which join types return all rows from only one of the tables being joined? Select all that apply.
    • RIGHT JOIN
    • INNER JOIN
    • FULL OUTER JOIN
    • LEFT JOIN
    1. You are performing an INNER JOIN on two tables on the employee_id column. The left table is employees, and the right table is machines. Which of the following queries has the correct INNER JOIN syntax?
    • SELECT *

      FROM employees

      INNER JOIN machines WHERE employees.employee_id = machines.employee_id;
    • SELECT *

      FROM employees

      INNER JOIN ON employees.employee_id = machines.employee_id;
    • INNER JOIN machines ON employees.employee_id = machines.employee_id

      SELECT *

      FROM employees;
    • SELECT *

      FROM employees

      INNER JOIN machines ON employees.employee_id = machines.employee_id;
    1. In the following query, which join returns all records from the employees table, but only records that match on employee_id from the machines table?

     

    SELECT *

     

    FROM employees

     

    _____ machines ON employees.employee_id = machines.employee_id;

    • FULL OUTER JOIN
    • RIGHT JOIN
    • INNER JOIN
    • LEFT JOIN
    1. As a security analyst, you are responsible for performing an INNER JOIN on the invoices and invoice_items tables of the Chinook database. These tables can be connected through the invoiceid column. Replace –??? with the missing information to complete the query. (If you want to undo your changes to the query, you can click the Reset button.)

    What is the value in the trackid column of the first row that is returned from this query?

    • 1
    • 3
    • 2
    • 449

     

    Weekly challenge 4

     

    1. Why might a security analyst use SQL?
    • To store data in a spreadsheet
    • To create new files on their computer
    • To efficiently find needed data in security logs
    • To assign new passwords to users
    1. Fill in the blank: A column in which every row has a unique entry and which is used to identify a table is called a _____.
    • primary key
    • database key
    • foreign key
    • relational key
    1. Which of these SQL statements queries the log_in_attempts table? Select all that apply.
    • SELECT *

      FROM log_in_attempts;
    • SELECT event_id, username

      FROM log_in_attempts

      WHERE event_id < 150;
    • SELECT log_in_attempts

      FROM *;
    • SELECT log_in_attempts

      FROM event_id;
    1. What does INNER JOIN do?
    • Combine tables and save them as a new table
    • Compare tables and return only the rows that have a matching value in a specified column
    • Filter databases to return only columns that exist in every table
    • Return every row in joined tables
    1. Which SQL keyword indicates the condition for a filter?
    • FROM
    • SELECT
    • INNER JOIN
    • WHERE
    1. You work with a table that has one column for name. Some of these names have prefixes. You want to identify all of the doctors. Which query will return every name that starts with the prefix ‘Dr.’?
    • WHERE name LIKE ‘Dr.%’;
    • WHERE name = ‘Dr.%’;
    • WHERE name = ‘Dr._’;
    • WHERE name LIKE ‘Dr._’;
    1. What does the following query return?

     

    SELECT *

     

    FROM employees

     

    RIGHT JOIN machines ON employees.device_id = machines.device_id;

    • All columns of the employees and machines table and the records from employees and machines that match on device_id
    • All columns and records from the employees and machines tables
    • All columns of the employees and machines table, all records from the employees table, and the records from machines that match on device_id
    • All columns of the employees and machines table, all records from the machines table, and the records from employees that match on device_id
    1. You are working with the Chinook database. You want to return the company and country columns from the customers table. Replace –??? with the missing information to complete the query. (If you want to undo your changes to the query, you can click the Reset button.)

    In what country is JetBrains s.r.o. located?

    • Germany
    • Czech Republic
    • Brazil
    • United States
    1. You are working with the Chinook database and are responsible for filtering for invoices with a total that is more than 20. Replace –??? with the missing information to complete the query. (If you want to undo your changes to the query, you can click the Reset button.)

    How many invoices have a total that is more than 20?

    • 2
    • 4
    • 1
    • 3

     

    You are working with the Chinook database and are responsible for filtering for customers that live in the country of ‘USA’ and the state with an abbreviation of ‘CA’. Replace –??? with the missing information to complete the query. (If you want to undo your changes to the query, you can click the Reset button.)

    SELECT firstname,lastname, address, country

    FROM customers

    –???

    What are the first names of the customers that live in the USA and the state with an abbreviation of CA?

    • Frank, Tim, Dan
    • Frank, Tim, Dan, Heather, Kathy
    • Kathy, Michelle, Frank
    • John, Michelle, Julia, Patrick

     

    1. You are working with the Chinook database and are responsible for filtering for the customers that live in the city of ‘Mountain View’ and work for the company of ‘Google Inc.’ Replace –??? with the missing information to complete the query. (If you want to undo your changes to the query, you can click the Reset button.)

    How many customers live in Mountain View and work for Google Inc.?

    • 3
    • 2
    • 4
    • 1

     

    Shuffle Q/A

     

    1. A security analyst queries a table related to login attempts. How can SQL help this analyst with their work?
    • The analyst will get a live update on new login attempts.
    • The analyst can efficiently find the login data they need.
    • SQL will change authentication permissions to prevent unauthorized logins.
    • SQL will automatically distribute a report on suspicious login attempts.
    1. Which of these SQL statements queries the machines table? Select all that apply.
    • SELECT *

      FROM machines;
    • SELECT device_id, operating_system

      FROM machines

      WHERE operating_system = ‘OS 2’;
    • SELECT machines

      FROM *;
    • SELECT machines

      FROM operating_system;
    1. What does WHERE department = ‘Sales’ indicate in the following SQL query?

    SELECT *

    FROM employees

    WHERE department = ‘Sales’;

    • To highlight the department column in the results
    • To only return rows that match the filter
    • To only return the department column
    • To change all the values in the department column to ‘Sales’
    1. You need to perform a SQL join. You want to return all the columns with records matching on the employee_id column between the employees and machines tables. You also want to return all records from the machines table. Which of the following queries would you use?
    • SELECT *

      FROM employees

      INNER JOIN machines ON employees.employee_id = machines.employee_id;
    • SELECT *

      FROM employees

      LEFT JOIN machines ON employees.employee_id = machines.employee_id;
    • SELECT *

      FROM employees

      FULL OUTER JOIN machines ON employees.employee_id = machines.employee_id;
    • SELECT *

      FROM employees

      RIGHT JOIN machines ON employees.employee_id = machines.employee_id;
    1. You are working with the Chinook database. You want to return the employeeid and email columns from the employees table. Replace –??? with the missing information to complete the query. (If you want to undo your changes to the query, you can click the Reset button.)

    What is the employee ID number of the employee with an email of laura@chinookcorp.com?

    • 8
    • 2
    • 6
    • 4
    1. You are working with the Chinook database and are responsible for filtering for the customers that have a value of ‘USA’ in the country column and have a value of ‘Frank’ in the firstname column. Replace –??? with the missing information to complete the query. (If you want to undo your changes to the query, you can click the Reset button.)

    How many customers live in the USA and have the name Frank?

    • 4
    • 1
    • 3
    • 2
    1. You need to perform a SQL join. You want to return all the columns with records matching on the device_id column between the employees and machines tables. You also want to return all records from the employees table. Which of the following queries would you use?
    • SELECT *

      FROM employees

      RIGHT JOIN machines ON employees.device_id = machines.device_id;
    • SELECT *

      FROM employees

      INNER JOIN machines ON employees.device_id = machines.device_id;
    • SELECT *

      FROM employees

      FULL OUTER JOIN machines ON employees.device_id = machines.device_id
    • SELECT *

      FROM employees

      LEFT JOIN machines ON employees.device_id = machines.device_id;
    1. You are working with the Chinook database. You want to return the lastname and title columns from the employees table. Replace –??? with the missing information to complete the query. (If you want to undo your changes to the query, you can click the Reset button.)

    What is the title of the employee with the last name of Callahan?

    • IT Manager
    • IT Staff
    • Sales Manager
    • General Manager
    1. You are working with the Chinook database and want to filter on the hiredate column to find all employees hired on or after ‘2003-10-17’ (October 17, 2003). Replace –??? with the missing information to complete the query. (If you want to undo your changes to the query, you can click the Reset button.)

    How many employees were hired on or after October 17, 2003?

    • 4
    • 2
    • 3
    • 1
    1. What is true about the values in the primary key column? Select all that apply.
    • They cannot be null (or empty).
    • They should never contain numeric data.
    • They do not need to be unique.
    • Each row must have a unique value.

     

    Which of these SQL statements queries the employees table? Select all that apply.

    • SELECT employees

    FROM employee_id;

    • SELECT employees

    FROM *;

    • SELECT *

    FROM employees;

    • SELECT employee_id, device_id

    FROM employees

    WHERE employee_id > 1100;

     

    What type of join compares tables and returns only the rows that have a matching value in a specified column?

      • FULL OUTER JOIN
      • LEFT JOIN
    • INNER JOIN
    • RIGHT JOIN

     

    1. Both an employees table and a machines table contain an employee_id column, and you want to return only the records that share a value in this column. Which keyword should be part of your query?
    • FULL OUTER JOIN
    • INNER JOIN
    • BETWEEN
    • WHERE
    1. Which query returns all records that start with the character ‘a’ from the name column in the employees table?
    • SELECT name

      FROM employees

      WHERE name = ‘a%’;
    • SELECT name

      FROM employees

      WHERE name LIKE ‘%a’;
    • SELECT name

      FROM employees

      WHERE name LIKE ‘a%’;
    • SELECT name

      FROM employees

      WHERE name LIKE ‘a’;

     

    Course 5 – Assets, Threats, and Vulnerabilities

     

    Week 1

     

    1. What is a risk?
    • Any circumstance or event that can negatively impact assets
    • Anything that can impact the confidentiality, integrity, or availability of an asset
    • The practice of labeling assets based on sensitivity and importance to an organization
    • A weakness that can be exploited by a threat
    1. A security professional discovers a rogue access point on their company WiFi that is not managed by the networking team. The rogue device is altering and deleting sensitive records without authorization. What does this scenario describe?
    • Threat
    • Vulnerability
    • Risk
    • Asset
    1. A product team is storing customer survey data for a new project in a cloud drive. The data is only accessible to product team members while the project is in development. What is this data’s asset type?
    • Public
    • Customer data
    • Internal demo
    • Confidential
    1. What is the practice of labeling assets based on sensitivity and importance to an organization?
    • Asset inventory
    • Asset classification
    • Asset management
    • Asset restriction

     

    Test your knowledge: Digital and physical assets

     

    1. What is the practice of keeping data in all states away from unauthorized users?
    • Network
    • Cybersecurity
    • Information security
    • Asset
    1. An employee is promoted to a new role, so their workstation is transferred to a different office. As the employee’s workstation is being relocated, what data state are its files in?
    • At rest
    • In transit
    • In use
    • In storage
    1. What is an example of data in transit?
    • A sent email is traveling over the network to reach its destination.
    • A spreadsheet file is saved on an employee’s hard drive.
    • A manager is editing a report on their computer.
    • A user logs in to their online account to review their messages.
    1. Fill in the blank: Data is in use when it is being _____ by one or more users.
    • accessed
    • ignored
    • transported
    • classified

     

    Test your knowledge: Risk and asset security

     

    1. What types of risks do security plans address? Select three answers.
    • Disclosure of data
    • Shift of market conditions
    • Loss of information
    • Damage to assets
    1. What are the basic elements of a security plan? Select three answers.
    • Standards
    • Policies
    • Procedures
    • Regulations
    1. Fill in the blank: The NIST CSF is a _____ framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.
    • voluntary
    • mandatory
    • limited
    • rigid
    1. What are some benefits of the NIST Cybersecurity Framework (CSF)? Select three answers.
    • It helps organizations achieve regulatory standards.
    • It can be used to identify and assess risk.
    • It is required to do business online.
    • It’s adaptable to fit the needs of any business.

     

    Weekly challenge 1

     

    1. A malicious hacker gains access to a company system in order to access sensitive information. What does this scenario describe?
    • Vulnerability
    • Regulation
    • Procedure
    • Threat

     

    Which of the following are examples of a vulnerability? Select two answers.

    • Malicious hackers stealing access credentials
    • An employee misconfiguring a firewall
    • Attackers causing a power outage
    • A malfunctioning door lock

     

    1. Fill in the blank: A misconfigured firewall is an example of a security _____.
    • exploit
    • vulnerability
    • threat
    • asset
    1. What is the first step of asset management?
    • To assign a risk score to assets
    • To address an asset’s vulnerabilities
    • To make an asset inventory
    • To classify assets based on value
    1. A small group of software developers is working internally on a confidential project. They are developing a new web application for the employees at their organization. Who can the developers discuss this confidential project with? Select two answers.
    • External business partners
    • Close friends
    • Teammates
    • Project managers
    1. A local chef owns a successful small business that sells cooking sauces and seasoning. Their best-selling product is a sauce that’s made with a top secret family recipe. To continue growing the company, the chef is about to start a partnership with a large retailer. In this scenario, what classification level should be assigned to the chef’s proprietary recipe in this scenario?
      • Public
      • Internal
      • Confidential
    • Restricted

     

    Which of the following can be prevented with effective information security? Select all that apply.

      • Compliance with regulations
    • Identity theft
    • Financial loss
    • Reputational damage

     

    What is an example of digital data at rest? Select two answers.

    • Files on a hard drive
      • Email messages in an inbox
    • Letters on a table
    • Contracts in a file cabinet

     

    1. Fill in the blank: Information security (InfoSec) is the practice of keeping ____ in all states away from unauthorized users.
    • processes
    • documents
    • files
    • data
    1. What is an example of data in transit? Select two answers.
    • A slideshow presentation on a thumb drive
    • A file being downloaded from a website
    • A website with multiple files available for download
    • An email being sent to a colleague
    1. Who should an effective security plan focus on protecting? Select all that apply.
    • Customers
    • Competitors
    • Employees
    • Business partners

     

    What NIST Cybersecurity Framework (CSF) tier is an indication that compliance is being performed at an exemplary standard?

    • Level-2
    • Level-4
    • Level-3
    • Level-1

     

    What are some benefits of the NIST Cybersecurity Framework? Select three answers.

    • The CSF fosters trust between businesses.
    • The CSF will protect an organization from cyber threats.
    • The CSF is adaptable to meet a company’s needs.
    • The CSF assists with regulatory compliance efforts.

     

    1. Which of the following are components of the NIST Cybersecurity Framework? Select three answers.
    • Profiles
    • Core
    • Controls
    • Tiers
    1. Fill in the blank: To measure performance across the functions of the _____, security teams use NIST tiers.
      • profiles
      • core
    • framework
    • business

     

    Shuffle Q/A

     

    1. An employee who has access to company assets abuses their privileges by stealing information and selling it for personal gain. What does this scenario describe?
    • Vulnerability
    • Procedure
    • Threat
    • Regulation

     

    Which of the following refers to the process of tracking assets and the risks that affect them?

    • Asset management
    • Asset administration
    • Asset classification
    • Asset inventory

     

    1. Which of the following are examples of security vulnerabilities? Select three answers.
    • Unattended laptop
    • Suspended access card
    • Weak password
    • Unlocked doors at a business
    1. Which of the following statements correctly describe security asset management? Select two answers.
    • It helps identify risks.
    • It decreases vulnerabilities.
    • It is a one-time process.
    • It uncovers gaps in security.
    1. What is an example of restricted information? Select all that apply.
    • Cardholder data
    • Intellectual property
    • Employee email addresses
    • Health information
    1. What are some key benefits of a security plan? Select three answers.
    • Define consistent policies that address what’s being protected and why.
    • Establish a shared set of standards for protecting assets.
    • Outline clear procedures that describe how to protect assets and react to threats.
    • Enhance business advantage by collaborating with key partners.
    1. Fill in the blank: CSF profiles provide insights into the _____ state of a security plan.
    • historical
    • current
    • future
    • recent
    1. An employee is asked to email customers and request that they complete a satisfaction survey. The employee must be given access to confidential information in the company database to conduct the survey. What types of confidential customer information should the employee be able to access from the company’s database to do their job? Select two answers.
    • E-mail addresses
    • Credit card data
    • Customer names
    • Home addresses
    1. A mobile game displays ads to users. The game is free to users so long as they occasionally view ads from other companies. Should these other companies be able contact the users of the gaming app?
    • Maybe, because users have control over sharing their information.
    • No, because this user information is restricted.
    • Yes, because user information is public.
    1. Why is it so challenging to secure digital information? Select two answers.
    • Most information is in the form of data.
    • There are no regulations that protect information.
    • There are so many resources to dedicate to security.
    • Technologies are interconnected.
    1. What is an example of confidential information? Select two answers.
    • Press release
    • Employee contacts
    • Project documents
    • Marketing strategy
    1. What is an example of data in use? Select three answers.
      • Reading emails in your inbox.
    • Watching a movie on a laptop.
    • Playing music on your phone.
    • Downloading a file attachment.
    1. Which of the following are functions of the NIST Cybersecurity Framework core? Select three answers.
    • Implement
    • Protect
    • Detect
    • Respond

     

    Week 2

     

    1. What are categories of security controls? Select all that apply.
    • Operational
    • Privacy
    • Technical
    • Managerial
    1. Fill in the blank: A data _____ decides who can access, edit, use, or destroy their information.
    • handler
    • custodian
    • protector
    • owner
    1. A writer for a technology company is drafting an article about new software features that are being released. According to the principle of least privilege, what should the writer have access to while drafting the article? Select all that apply.
    • Login credentials of the software users
    • Software developers who are knowledgeable about the product
    • Other new software that is in development
    • The software they are reviewing
    1. Which privacy regulations influence how organizations approach data security? Select three answers.
    • Infrastructure as a Service (IaaS)
    • General Data Protection Regulation (GDPR)
    • Payment Card Industry Data Security Standard (PCI DSS)
    • Health Insurance Portability and Accountability Act (HIPAA)

     

    Test your knowledge: Encryption methods

    1. Which of the following elements are required when using encryption? Select all that apply.
    • Key
    • Certificate
    • Cipher
    • Token
    1. Which technologies are used in public key infrastructure (PKI)? Select three answers.
    • Asymmetric encryption
    • Symmetric encryption
    • Digital certificates
    • Ciphertext
    1. Fill in the blank: _____ encryption produces a public and private key pair.
    • Hashing
    • Symmetric
    • Salting
    • Asymmetric
    1. An attacker gains access to a database where user passwords are secured with the SHA-256 hashing algorithm. Can the attacker decrypt the user passwords?
    • Yes. Hash algorithms produce a decryption key.
    • No. Hash algorithms do not produce decryption keys.
    1. What term describes being unable to deny that information is authentic?
    • Confidentiality
    • Non-repudiation
    • Integrity
    • Availability

     

    Test your knowledge: Authentication, authorization, and accounting

     

    1. What factors do authentication systems use to verify a user’s identity? Select three answers.
    • Ownership
    • Characteristic
    • Authorization
    • Knowledge
    1. How do businesses benefit from implementing single sign-on (SSO) technology? Select two answers.
    • By simplifying their user management
    • By providing a better user experience
    • By requiring multiple forms of identification
    • By streamlining HTTP traffic between servers
    1. A retail company has one employee that’s in charge of purchasing goods, another employee that’s in charge of approving new purchases, and a third employee that’s in charge of paying invoices. What security principle is the retail company implementing?
    • Separation of duties
    • Least privilege
    • Authentication, authorization, and accounting (AAA)
    • Non-repudiation
    1. What are the categories of access controls? Select three answers.
    • Authorization
    • Administration
    • Authentication
    • Accounting
    1. What credential does OAuth use to authenticate users?
    • A one-time passcode (OTP)
    • A session cookie
    • An application programming interface (API) token
    • A digital certificate

     

    Weekly challenge 2

     

    1. Which of the following examples are categories of security controls? Select three answers.
    • Operational
    • Managerial
    • Technical
    • Compliance
    1. A large hotel chain is conducting a national sweepstakes. To enter the sweepstakes, customers must consent to sharing their email address with the chain’s business partners for marketing purposes. What are the hotel chain’s responsibilities as data custodians? Select three answers.
    • Back up customer information
    • Send information to business partners
    • Grant business partners consent to use customer data
    • Collect customer consent and emails
    1. You send an email to a friend. The service provider of your inbox encrypts all messages that you send. What happens to the information in your email when it’s encrypted?
    • It’s converted from a hash value to ciphertext.
    • It’s converted from Caesar’s cipher to plaintext.
    • It’s converted from plaintext to ciphertext.
    • It’s converted from ciphertext to plaintext.
    1. Why are hash algorithms that generate long hash values more secure than those that produce short hash values?
    • They are easier to decrypt
    • They are easier to exchange over a network
    • They are more difficult to remember
    • They are more difficult to brute force
    1. Fill in the blank: A _____ is used to prove the identity of users, companies, and networks in public key infrastructure.
    • digital certificate
    • access token
    • access key
    • digital signature
    1. Fill in the blank: Knowledge, ownership, and characteristic are three factors of _____ systems.
    • authorization
    • administrative
    • accounting
    • authentication

     

    What are two advantages of using single sign-on (SSO) systems to authenticate users? Select two answers.

    • It makes authentication safe.
    • It makes the login process faster.
    • Users can reuse the same password.
    • Users can gain access to multiple platforms.

     

    1. What is a key advantage of multi-factor authentication compared to single sign-on?
    • It can grant access to multiple company resources at once.
    • It streamlines the authentication process.
    • It requires more than one form of identification before granting access to a system.
    • It is faster when authenticating users.
    1. A shipping company imports and exports materials around the world. Their business operations include purchasing goods from suppliers, receiving shipments, and distributing goods to retailers. How should the shipping company protect their assets under the principle of separation of duties? Select two answers.
    • Have one employee file purchase orders
    • Have one employee select goods and submit payments
    • Have one employee receive shipments and distribute goods
    • Have one employee approve purchase orders
    1. Fill in the blank: ____ is the technology used to establish a user’s request to access a server.
    • Basic auth
    • API tokens
    • OAuth
    • Digital certificates
    1. Which of the following are reasons why accounting in security is such an important function of effective access controls? Select two answers.
    • Identify ways to improve business operations.
    • Detect session hijacking incidents.
    • Uncover threat actors who have accessed a system.
    • Record user activity for marketing purposes.

     

    Which security controls are used in public key infrastructure? Select three answers.

      • Multi-factor authentication
    • Digital certificates
    • Symmetric encryption
    • Asymmetric encryption

    Shuffle Q/A

     

    1. What is the primary purpose of hash functions?
    • To store data in the cloud
    • To determine data integrity
    • To decrypt sensitive data
    • To make data quickly available
    1. Which of the following steps are part of the public key infrastructure process? Select two answers.
    • Exchange of public and private keys
    • Transfer hash digests
    • Establish trust using digital certificates
    • Exchange of encrypted information
    1. What factors do authentication systems use to verify a user’s identity? Select three answers.
    • Accounting
    • Knowledge
    • Ownership
    • Characteristic
    1. What are some disadvantages of using single sign-on (SSO) technology for user authentication? Select two.
    • Username and password management is more complicated for the end users.
    • Customers, vendors, and business partners are less vulnerable to attack.
    • Stolen credentials can give attackers access to multiple resources.
    • Access to all connected resources stops when SSO is down.
    1. A business has one person who receives money from customers at the register. At the end of the day, another person counts that money that was received against the items sold and deposits it. Which security principles are being implemented into business operations? Select two answers.
    • Multi-factor authentication
    • Separation of duties
    • Single sign-on
    • Least privilege
    1. What types of user information does an API token contain? Select two answers.
    • A user’s secret key
    • A user’s site permissions
    • A user’s password
    • A user’s identity
    1. Which type of encryption is generally slower because the algorithms generate a pair of encryption keys?
    • Asymmetric
    • Rivest–Shamir–Adleman (RSA)
    • Data encryption standard (DES)
    • Symmetric
    1. The main responsibility of a receptionist at a healthcare company is to check-in visitors upon arrival. When visitors check-in, which kinds of information should the receptionist be able to access to complete their task? Select two answers.
    • The patient being visited
    • Their billing information
    • Their medical history
    • A photo ID
    1. A customer of an online retailer has complained that their account contains an unauthorized purchase. You investigate the incident by reviewing the retailer’s access logs. What are some components of the user’s session that you might review? Select two answers.
    • Session certificate
    • Session algorithm
    • Session cookie
    • Session ID
    1. What is the purpose of security controls?
    • Create policies and procedures
    • Encrypt information for privacy
    • Establish incident response systems
    • Reduce specific security risks

     

    What do symmetric encryption algorithms use to encrypt and decrypt information?

    • A digital certificate
    • A public and private key pair
    • A hash value
    • A single secret key

     

    1. A paid subscriber of a news website has access to exclusive content. As a data owner, what should the subscriber be authorized to do with their account? Select three answers.
    • Stop their subscription
    • Review their username and password
    • Edit articles on the website
    • Update their payment details
    1. What are common authorization tools that are designed with the principle of least privilege and separation of duties in mind? Select three answers.
    • API Tokens
    • SHA256
    • Basic auth
    • OAuth
    1. What is the practice of monitoring the access logs of a system?
    • Auditing
    • Authentication
    • Accounting
    • Authorization

     

    Week 3

     

    1. Which of the following are steps in the vulnerability management process. Select two answers.
    • Identify vulnerabilities
    • Catalog organizational assets
    • Assign a CVE® ID
    • Prepare defenses against threats
    1. An organization is attacked by a vulnerability that was previously unknown. What is this exploit an example of?
    • A cipher
    • An asset
    • A zero-day
    • A perimeter layer
    1. Which layer of the defense in depth strategy is a user authentication layer that mainly filters external access?
    • Endpoint
    • Data
    • Network
    • Perimeter
    1. A security researcher reports a new vulnerability to the CVE® list. Which of the following criteria must the vulnerability meet before it receives a CVE® ID? Select two answers.
    • It must affect multiple applications.
    • The submission must have supporting evidence.
    • The vulnerability must be unknown to the developer.
    • It must be independently fixable.

     

    Test your knowledge: Identify system vulnerabilities

     

    1. Fill in the blank: A vulnerability ____ refers to the internal review process of an organization’s security systems.
    • assessment
    • scoring
    • patch
    • scanner
    1. What are the goals of a vulnerability assessment? Select two answers.
    • To reduce overall threat exposure
    • To detect network traffic
    • To audit regulatory compliance
    • To identify existing weaknesses
    1. Which of the following remediation examples might be implemented after a vulnerability scan? Select two answers.
    • Training employees to follow new security procedures
    • Identifying misconfigurations in an application
    • Locating vulnerabilities in workstations
    • Installing software updates and patches
    1. What are two types of vulnerability scans? Select two answers.
    • Patch or upgrade
    • Authenticated or unauthenticated
    • Limited or comprehensive
    • Risk or threat

     

    Test your knowledge: Cyber attacker mindset

     

    1. What is the difference between an attack vector and an attack surface?
    • An attack surface refers to all the weaknesses of an asset that can be attacked; an attack vector refers to an outdated and vulnerable network.
    • An attack vector refers to the pathways attackers use to penetrate security defenses; an attack surface refers to all the vulnerabilities of an asset that can be exploited.
    • An attack surface refers to the specific pathway of exploiting a weakness; an attack vector refers to all the weaknesses of an asset that can be exploited.
    • An attack surface refers to the specific method of attack; an attack vector refers to an outdated and vulnerable network.
    1. What are examples of security hardening? Select three answers.
    • Restarting a crashed application
    • Hashing all user passwords
    • Keeping systems patched and updated
    • Disabling inactive network ports
    1. Which steps are applied when using an attacker mindset? Select three answers.
    • Evaluate a target’s attack vectors
    • Identify a target
    • Stay in communication with a target
    • Determine how a target can be accessed
    1. How can businesses reduce the number of attack vectors they must defend? Select three answers.
    • By educating users so they can participate in preventing attacks
    • By totally restricting information from being shared
    • By controlling access and authorization to assets
    • By implementing security controls that protect information

     

    Weekly challenge 3

     

    1. Consider the following scenario:

    A cloud service provider has misconfigured a cloud drive. They’ve forgotten to change the default sharing permissions. This allows all of their customers to access any data that is stored on the drive.

    This misconfigured cloud drive is an example of what?

    • A threat
    • An exploit
    • A security control
    • A vulnerability
    1. Fill in the blank: The five layers of the defense in depth model are: perimeter, network, endpoint, application, and _____.
    • session
    • transport
    • physical
    • data
    1. What is the difference between the application and data layers of the defense in depth model?
    • The application layer authorizes users who have access to perform a duty. The data layer maintains the integrity of information with controls like encryption and hashing.
    • The data layer includes controls like encryption and hashing to secure data at rest. The application layer authorizes users who have access to perform a duty.
    • The application layer secures information with controls that are programmed into the application itself. The data layer maintains the integrity of information with controls like encryption and hashing.
    • The data layer authenticates users to only allow access to trusted parties. The application layer secures information with controls that are programmed into the application itself.
    1. What is the main purpose of the CVE® list?
    • To create a dictionary of threats to organizational assets that must be addressed
    • To share a standard way of identifying and categorizing known vulnerabilities and exposures
    • To keep a record of the coding mistakes of major software developers
    • To collect information on vulnerabilities and exposures performed by independent researchers
    1. A security team is preparing new workstations that will be installed in an office.

    Which vulnerability management steps should they take to prepare these workstations? Select three answers.

    • Download the latest patches and updates for each system.
    • Install a suite of collaboration tools on each workstation.
    • Consider who will be using each computer.
    • Configure the company firewall to allow network access.
    1. A security team is conducting a periodic vulnerability assessment on their security procedures. Their objective is to review gaps in their current procedures that could lead to a data breach. After identifying and analyzing current procedures, the team conducts a risk assessment.

    What is the purpose of performing a risk assessment?

    • To adjust current security procedures
    • To score vulnerabilities based on their severity and impact
    • To simulate attacks that could be performed against each vulnerability
    • To fix vulnerabilities that have been identified
    1. Fill in the blank: All the potential vulnerabilities that a threat actor could exploit is called an attack _____.
    • database
    • vector
    • surface
    • network
    1. An online newspaper suffered a data breach. The attackers exploited a vulnerability in the login form of their website. The attackers were able to access the newspaper’s user database, which did not encrypt personally identifiable information (PII).

    What attack vectors did the malicious hackers use to steal user information? Select two answers.

    • The online login form
    • The unencrypted PII
    • The newspaper’s website
    • The user database
    1. A security team is performing a vulnerability assessment on a banking app that is about to be released. Their objective is to identify the tools and methods that an attacker might use.

    Which steps of an attacker mindset should the team perform to figure this out? Select three answers.

    • Consider potential threat actors.
    • Identify a target.
    • Evaluate attack vectors that can be exploited.
    • Determine how the target can be accessed.
    1. Consider the following scenario:

    You are working as a security professional for a school district. An application developer with the school district created an app that connects students to educational resources. You’ve been assigned to evaluate the security of the app.

    Using an attacker mindset, which of the following steps would you take to evaluate the application? Select two answers.

    • Integrate the app with existing educational resources.
    • Identify the types of users who will interact with the app.
    • Ensure the app’s login form works.
    • Evaluate how the app handles user data.

     

    Shuffle Q/A

     

    1. An application has broken access controls that fail to restrict any user from creating new accounts. This allows anyone to add new accounts with full admin privileges.

     

    The application’s broken access controls are an example of what?

    • A vulnerability
    • An exploit
    • A threat
    • A security control
    1. Which of the following layers do not provide protection for information that users provide? Select two answers.
    • The perimeter layer
    • The network layer
    • The data layer
    • The application layer
    1. Which layer of the defense in depth model is a user authentication layer that can include usernames and passwords?
    • Perimeter
    • Network
    • Endpoint
    • Application
    1. Which of the following are characteristics of the vulnerability management process? Select two answers.
    • Vulnerability management is a way to discover new assets.
    • Vulnerability management is a way to limit security risks.
    • Vulnerability management should consider various perspectives.
    • Vulnerability management should be a one-time process.
    1. What are the two types of attack surfaces that security professionals defend? Select two answers.
    • Digital
    • Physical
    • Intellectual property
    • Brand reputation
    1. A project manager at a utility company receives a suspicious email that contains a file attachment. They open the attachment and it installs malicious software on their laptop.

    What are the attack vectors used in this situation? Select two answers.

    • The suspicious email
    • The infected workstation
    • The malicious software
    • The file attachment
    1. What is not a step of practicing an attacker mindset?
    • Evaluate attack vectors that can be exploited.
    • Determine how a target can be accessed.
    • Identify ways to fix existing vulnerabilities.
    • Find the tools and methods of attack.
    1. A hotel chain has outdated WiFi routers in their guest rooms. An attacker hacked into the devices and stole sensitive information from several guests.

    The outdated WiFi router is an example of what?

    • An exploit
    • A vulnerability
    • A threat
    • An access control
    1. Which layer of the defense in depth model relates to user devices that have accessed a network?
    • Endpoint
    • Application
    • Perimeter
    • Data
    1. Which of the following are criteria that a vulnerability must meet to qualify for a CVE® ID? Select all that apply.
    • It can only affect one codebase.
    • It must be submitted with supporting evidence.
    • It must be independent of other issues.
    • It must be recognized as a potential security risk.
    • It must pose a financial risk.
    1. Which of the following are reasons that security teams practice an attacker mindset? Select three answers.
    • To identify attack vectors
    • To exploit flaws in an application’s codebase
    • To uncover vulnerabilities that should be monitored
    • To find insights into the best security controls to use
    1. Fill in the blank: According to the CVE® list, a vulnerability with a score of _____ or above is considered to be a critical risk to company assets that should be addressed right away.
    • 11
    • 1
    • 9
    • 4
    1. You are tasked with performing a vulnerability assessment of an onsite server. After scanning the server, you discover that its operating system is missing several new updates.

    What are two steps that you might take next to complete the vulnerability assessment? Select two answers.

    • Investigate critical system updates that are available.
    • Scan the millions of devices that connect to the server
    • Perform a risk assessment of the old operating system.
    • Deactivate the server because its operating system is outdated

     

    Which of the following are types of attack surfaces? Select three answers.

    • Cloud servers
    • Network routers
    • Computer workstations
    • Malicious software

     

    Fill in the blank: An attack _____ refers to the pathways attackers use to penetrate security defenses.

      • surface
    • vector
    • landscape
    • vulnerability

     

    What are ways to protect an organization from common attack vectors? Select three answers.

      • By not practicing an attacker mindset
    • By keeping software and systems updated
    • By implementing effective password policies
    • By educating employees about security vulnerabilities

     

    Week 4

     

    1. Fill in the blank: _____ is the use of digital communications to trick people into revealing sensitive data or deploying malicious software.
    • Whaling
    • Baiting
    • Phishing
    • Quid pro quo
    1. What type of phishing uses electronic voice communications to obtain sensitive information or to impersonate a known source?
    • Tailgating
    • Angler phishing
    • Smishing
    • Vishing
    1. Fill in the blank: The stages of a social engineering attack include to prepare, establish trust, use persuasion tactics, and ____.
    • disconnect from the target
    • evaluate defenses
    • spread awareness with others
    • stay informed of security trends
    1. Phishing kits typically contain which of the following tools to help attackers avoid detection? Select three answers.
    • Fraudulent web links
    • Malicious attachments
    • Email filters
    • Fake data-collection forms

     

    Test your knowledge: Malware

     

    1. Which of the following are types of malware? Select two answers.
    • Spyware
    • Dictionary attacks
    • Viruses
    • Credential stuffing
    1. Fill in the blank: ____ are malware that automatically duplicate and spread themselves across systems.
    • Botnets
    • Trojans
    • Rootkits
    • Worms
    1. What is it called when someone’s computing resources are illegally hijacked to mine cryptocurrencies?
    • Cryptojacking
    • Rootkit
    • Trojan horse
    • Spyware
    1. Which of the following are common signs of a malware infection? Select three answers.
    • Files are suddenly encrypted
    • Increased CPU usage
    • Unusual system crashes
    • Slowdowns in performance

     

    Test your knowledge: Web-based exploits

     

    1. Fill in the blank: _____ are malicious code or behaviors that are used to take advantage of coding flaws in a web application.
    • Spear phishing
    • Web-based exploits
    • Command-line interface
    • Social engineering
    1. Cross-site scripting (XSS) attacks are often delivered by exploiting which of the following languages? Select two answers.
    • SQL
    • JavaScript
    • Python
    • HTML
    1. What server-side code can be used to defend against SQL injection attacks?
    • Prepared statement
    • Injection attack
    • Input validation
    • Phishing kit
    1. What are two examples of when SQL injections can take place?
    • When using the login form to access a site
    • When a malicious script exists in the webpage a browser loads
    • When a malicious script is injected directly on the server
    • When a user enters their credentials
    1. In a SQL injection attack, malicious hackers attempt to obtain which of the following? Select two answers.
    • Exploiting languages
    • Gain administrative rights
    • Sensitive information
    • Categorize the environment

     

    Weekly challenge 4

     

    1. Which of the following could be examples of social engineering attacks? Select three answers.
    • An unfamiliar employee asking you to hold the door open to a restricted area
    • An email urgently asking you to send money to help a friend who is stuck in a foreign country
    • A lost record of important customer information
    • A pop-up advertisement promising a large cash reward in return for sensitive information
    1. What is the main difference between a vishing attack and a smishing attack?
    • Vishing makes use of voice calls to trick targets.
    • Vishing involves a widespread email campaign to steal information.
    • Vishing is used to target executives at an organization.
    • Vishing exploits social media posts to identify targets.
    1. A digital artist receives a free version of professional editing software online that has been infected with malware. After installing the program, their computer begins to freeze and crash repeatedly.

    The malware hidden in this editing software is an example of which type of malware?

    • scareware
    • spyware
    • trojan
    • adware
    1. What are the characteristics of a ransomware attack? Select three answers.
    • Attackers demand payment to restore access to a device.
    • Attackers make themselves known to their targets.
    • Attackers encrypt data on the device without the user’s permission.
    • Attackers display unwanted advertisements on the device.
    1. Fill in the blank: Cryptojacking is a type of malware that uses someone’s device to _____ cryptocurrencies.
    • mine
    • collect
    • invest
    • earn
    1. Security researchers inserted malicious code into the web-applications of various organizations. This allowed them to obtain the personally identifiable information (PII) of various users across multiple databases.

    What type of attack did the researchers perform?

    • Malware
    • Social engineering
    • Ransomware
    • Injection
    1. An attacker sends a malicious link to subscribers of a sports news site. If someone clicks the link, a malicious script is sent to the site’s server and activated during the server’s response.

    This is an example of what type of injection attack?

    • DOM-based
    • SQL injection
    • Reflected
    • Stored
    1. What is one way to prevent SQL injection?
    • Having well-written code
    • Excluding prepared statements
    • Including application design flaws
    • Downloading malicious apps
    1. What should security teams do after identifying threats, according to the threat modeling process? Select two answers.
    • Identify who might perform an attack and how
    • Examine existing protections and identify gaps
    • Consider how users interact with an environment
    • Determine mitigation strategies
    1. During which stage of the PASTA framework is an attack tree created?
    • Decomposing an application
    • Vulnerability analysis
    • Threat analysis
    • Attack modeling

     

    Shuffle Q/A

     

    1. Fill in the blank: The four stages of a social engineering attack are to prepare, _____, use persuasion tactics, and disconnect from the target.
    • impersonate a relative
    • distribute malicious email
    • establish trust
    • obtain access credentials
    1. Fill in the blank: _____ uses text messages to manipulate targets into sharing sensitive information.
    • Smishing
    • Whaling
    • Vishing
    • Pretexting
    1. Which of the following are not types of malware? Select two answers.
    • Worm
    • SQL injection
    • Cross-site scripting
    • Virus
    1. A member of a government agency is tricked into installing a virus on their workstation. The virus gave a criminal group access to confidential information. The attackers threaten to leak the agency’s data to the public unless they pay $31,337.

    What type of attack is this an example of?

    • Ransomware
    • Cross-site scripting
    • Cryptojacking
    • Scareware
    1. What is malicious code that is inserted into a vulnerable application called?
    • Input validation
    • Cryptojacking
    • Social engineering
    • Injection attack
    1. An attacker injected malware on a server. When a user visits a website hosted by the server, their device gets infected with the malware.

    This is an example of what type of injection attack?

    • Brute force
    • DOM-based
    • Stored
    • Reflected
    1. Which of the following are areas of a website that are vulnerable to SQL injection? Select two answers.
    • Social media feeds
    • Pop-up advertisements
    • Credit card payment forms
    • User login pages
    1. A security team is conducting a threat model on a new software system. They are determining whether risks can be transferred, reduced, or accepted.

    Which key step of a threat model does this scenario represent?

    • Evaluate findings
    • Analyze threats
    • Define the scope
    • Mitigate risks
    1. What discoveries are made while decomposing an application during a PASTA threat model? Select two answers.
    • The types of threats that can be used to compromise data
    • Which vulnerabilities can put data at risk
    • How data travels from users to an organization’s database
    • Which controls are in place to protect data along the way
    1. What is the most common form of social engineering used by attackers?
    • Ransomware
    • Malware
    • Phishing
    • Adware
    1. Which of the following are common signs that a computer is infected with cryptojacking software? Select three answers.
    • Increased CPU usage
    • Sudden system crashes
    • Unusually high electricity costs
    • Modified or deleted files
    1. A hacktivist group gained access to the website of a utility company. The group bypassed the site’s login page by inserting malicious code that granted them access to customer accounts to clear their debts.

    What type of attack did the hacktivist group perform?

    • Spyware
    • Watering hole
    • Quid pro quo
    • Injection
    1. Which stage of the PASTA framework is related to identifying the application components that must be evaluated?
    • Perform a vulnerability analysis
    • Decompose the application
    • Define the technical scope
    • Conduct attack modeling
    1. A threat actor tricked a new employee into sharing information about a senior executive over the phone.

    This is an example of what kind of attack?

    • Malware
    • Social engineering
    • Pretexting
    • Phishing

     

    Course 6 – Sound the Alarm: Detection and Response

     

    Week 1

     

    1. The first phase of the NIST Incident Response Lifecycle is Preparation. What are the other phases? Select three answers.
    • Identify
    • Post-Incident Activity
    • Detection and Analysis
    • Containment, Eradication, and Recovery
    1. What type of process is the NIST Incident Response Lifecycle?
    • Linear
    • Phased
    • Observable
    • Cyclical
    1. Fill in the blank: An _____ is an observable occurrence on a network, system, or device.
    • analysis
    • incident
    • event
    • investigation
    1. A security professional investigates an incident. Their goal is to gain information about the 5 W’s, which include what happened and why. What are the other W’s? Select three answers.
    • Which type of incident it was
    • Who triggered the incident
    • Where the incident took place
    • When the incident took place

     

    Test your knowledge: Incident response operations

     

    1. What are the goals of a computer security incident response team (CSIRT)? Select three answers.
    • To provide services and resources for response and recovery
    • To manage incidents
    • To handle the public disclosure of an incident
    • To prevent future incidents from occurring
    1. Which document outlines the procedures to follow after an organization experiences a ransomware attack?
    • A network diagram
    • A contact list
    • A security policy
    • An incident response plan
    1. Fill in the blank: The job of _____ is to investigate alerts and determine whether an incident has occurred.
    • technical leads
    • security analysts
    • incident coordinators
    • public relations representative
    1. Which member of a CSIRT is responsible for tracking and managing the activities of all teams involved in the response process?
    • Technical lead
    • Incident coordinator
    • Public relations representative
    • Security analyst

     

    Test your knowledge: Detection and documentation tools

     

    1. What are some examples of types of documentation? Select three answers.
    • Final reports
    • Word processors
    • Policies
    • Playbooks
    1. Fill in the blank: Ticketing systems such as _____ can be used to document and track incidents.
    • Cameras
    • Evernote
    • Jira
    • Excel
    1. What application monitors system activity, then produces alerts about possible intrusions?
    • Intrusion detection system
    • Playbook
    • Product manual
    • Word processor
    1. What actions does an intrusion prevention system (IPS) perform? Select three answers.
    • Detect abnormal activity
    • Stop intrusive activity
    • Monitor activity
    • Manage security incidents

     

    Weekly challenge 1

     

    1. Which of the following is an example of a security incident?
    • Multiple unauthorized transfers of sensitive documents to an external system.
    • A company’s experiences increased traffic volumes on their website because of a new product release.
    • An extreme weather event causes a network outage.
    • An authorized user emails a file to a customer.
    1. What is the NIST Incident Response Lifecycle?
    • The method of closing an investigation
    • A framework that provides a blueprint for effective incident response
    • A system that only includes regulatory standards and guidelines
    • The process used to document events
    1. Which of the following are phases of the NIST Incident Response Lifecycle? Select three answers.
    • Containment, Eradication, and Recovery
    • Preparation
    • Detection and Analysis
    • Protection
    1. What are some roles included in a computer security incident response team (CSIRT)? Select three answers.
    • Security analyst
    • Incident coordinator
    • Technical lead
    • Incident manager
    1. What is an incident response plan?
    • A document that outlines the procedures to take in each step of incident response
    • A document that outlines a security team’s contact information
    • A document that details system information
    • A document that contains policies, standards, and procedures
    1. A cybersecurity analyst receives an alert about a potential security incident. Which type of tool should they use to examine the alert’s evidence in greater detail?
    • A recovery tool
    • A documentation tool
    • An investigative tool
    • A detection tool
    1. Which of the following methods can a security analyst use to create effective documentation? Select two answers.
    • Provide clear and concise explanations of concepts and processes.
    • Write documentation in a way that reduces confusion.
    • Provide documentation in a paper-based format.
    • Write documentation using technical language.
    1. What is the difference between an intrusion detection system (IDS) and an intrusion prevention system (IPS)?
    • An IDS stops intrusive activity whereas an IPS monitors system activity and alerts on intrusive activity.
    • An IDS monitors system activity and alerts on intrusive activity whereas an IPS stops intrusive activity.
    • An IDS automates response and an IPS generates alerts.
    • An IDS and an IPS both have the same capabilities.
    1. What is an example of a workflow that can be automated through security orchestration, automation, and response (SOAR)?
    • The creation of raw log data
    • The analysis and response to a security incident
    • The creation of potential threats
    • The analysis of a centralized platform
    1. Fill in the blank: During the _____ step of the SIEM process, the collected raw data is transformed to create log record consistency.
    • data analysis
    • data collection
    • data aggregation
    • data normalization

     

    Shuffle Q/A

     

    1. Which step does the NIST Incident Response Lifecycle begin with?
    • Post-Incident Activity
    • Preparation
    • Detection and Analysis
    • Containment, Eradication and Recovery
    1. What is a computer security incident response team (CSIRT)?
    • A specialized group of security professionals who focus on incident prevention
    • A specialized group of security professionals who are solely dedicated to crisis management
    • A specialized group of security professionals who are trained in incident management and response
    • A specialized group of security professionals who work in isolation from other departments
    1. Fill in the blank: Incident response plans outline the _____ to take in each step of incident response.
    • policies
    • exercises
    • instructions
    • procedures
    1. Which of the following best describes how security analysts use security tools?
    • They only use detection and management tools during incident investigations.
    • They only use documentation tools for incident response tasks.
    • They use a combination of different tools for various tasks.
    • They only use a single tool to monitor, detect, and analyze events.
    1. What are the qualities of effective documentation? Select three answers.
    • Consistent
    • Clear
    • Accurate
    • Brief
    1. Fill in the blank: An intrusion prevention system (IPS) monitors systems and _____ intrusive activity.
    • stops
    • reports
    • pauses
    • detects
    1. What happens during the data collection and aggregation step of the SIEM process? Select two answers.
    • Data is analyzed according to rules.
    • Data is collected from different sources.
    • Data is centralized in one place.
    • Data is cleaned and transformed.
    1. Which of the following statements describe security incidents and events?
    • All security incidents are events, but not all events are security incidents.
    • Security incidents and events are the same.
    • Security incidents and events are unrelated.
    • All events are security incidents, but not all security incidents are events.
    1. A security team uses the NIST Incident Response Lifecycle to support incident response operations. How should they follow the steps to use the approach most effectively?
      • Only use each step once.
      • Complete the steps in any order.
      • Skip irrelevant steps.
    • Overlap the steps as needed.
    1. Fill in the blank: A specialized group of security professionals who are trained in incident management and response is a _____.
    • computer security incident response team
    • forensic investigation team
    • threat hunter group
    • risk assessment group
    1. A cybersecurity professional is setting up a new security information and event management (SIEM) tool for their organization and begins identifying data sources for log ingestion. Which step of the SIEM does this scenario describe?
    • Aggregate data
    • Analyze data
    • Collect data
    • Normalize data
    1. Which of the following is an example of a security incident?
    • An unauthorized user successfully changes the password of an account that does not belong to them.
    • An authorized user successfully logs in to an account using their credentials and multi-factor authentication.
    • A user installs a device on their computer that is allowed by an organization’s policy.
    • A software bug causes an application to crash.
    1. What are investigative tools used for?
    • Managing alerts
    • Documenting incidents
    • Monitoring activity
    • Analyzing events

     

    What are examples of tools used for documentation? Select two answers.

    • Cameras
    • Final reports
    • Playbooks
    • Audio recorders

     

    Fill in the blank: An intrusion detection system (IDS) _____ system activity and alerts on possible intrusions.

    • monitors
    • manages
    • protects
    • analyzes

     

    Week 2

     

    1. How do indicators of compromise (IoCs) help security analysts detect network traffic abnormalities?
    • They define the attacker’s intentions.
    • They provide a way to identify an attack.
    • They capture network activity.
    • They confirm that a security incident happened.
    1. Fill in the blank: Data _____ is the term for unauthorized transmission of data from a system.
    • pivoting
    • exfiltration
    • infiltration
    • network traffic
    1. An attacker has infiltrated a network. Next, they spend time exploring it in order to expand and maintain their access. They look for valuable assets such as proprietary code and financial records. What does this scenario describe?
    • Large internal file transfer
    • Phishing
    • Lateral movement
    • Network data
    1. What can security professionals use network traffic analysis for? Select three answers.
    • To understand network traffic patterns
    • To identify malicious activity
    • To secure critical assets
    • To monitor network activity

     

    Test your knowledge: Capture and view network traffic

     

    1. Which component of a packet contains the actual data that is intended to be sent to its destination?
    • Protocol
    • Header
    • Payload
    • Footer
    1. Fill in the blank: A _____ is a file that contains data packets that have been intercepted from an interface or a network.
    • packet capture
    • network protocol analyzer
    • network statistic
    • protocol
    1. Which field of an IP header is used to identify whether IPv4 or IPv6 is used?
    • Type of Service
    • Options
    • Flags
    • Version
    1. Which network protocol analyzer is accessed through a graphical user interface?
    • TShark
    • Wireshark
    • tcpdump
    • Libpcap

     

    Test your knowledge: Packet inspection

     

    1. Which tcpdump option is used to specify the network interface?
    • -n
    • -i
    • -v
    • -c
    1. What is needed to access the tcpdump network protocol analyzer?
    • Command-line interface
    • Packet capture
    • Output
    • Graphical user interface
    1. What is the first field found in the output of a tcpdump command?
    • Version
    • Timestamp
    • Protocol
    • Source IP
    1. You are using tcpdump to capture network traffic on your local computer. You would like to save the network traffic to a packet capture file for later analysis. Which tcpdump option should you use?
    • -c
    • -r
    • -w
    • -v

     

    Weekly challenge 2

     

    1. Fill in the blank: _____ describes the amount of data that moves across a network.
    • Traffic flow
    • Data exfiltration
    • Network traffic
    • Network data
    1. What tactic do malicious actors use to maintain and expand unauthorized access into a network?
    • Exfiltration
    • Phishing
    • Data size reduction
    • Lateral movement
    1. Which packet component contains protocol information?
    • Payload
    • Footer
    • Route
    • Header
    1. Do packet capture files provide detailed snapshots of network communications?
    • Yes. Packet capture files provide information about network data packets that were intercepted from a network interface.
    • No. Packet capture files do not contain detailed information about network data packets.
    • Maybe. The amount of detailed information packet captures contain depends on the type of network interface that is used.
    1. How do network protocol analyzers help security analysts analyze network communications? Select two answers.
    • They take action to improve network performance.
    • They provide the ability to filter and sort packet capture information to find relevant information.
    • They take action to block network intrusions.
    • They provide the ability to collect network communications.
    1. Which protocol is considered the foundation for all internet communications?
    • UDP
    • IPv4
    • TCP
    • HTTP
    1. What is used to determine whether errors have occurred in the IPv4 header?
    • Flags
    • Protocol
    • Checksum
    • Header
    1. What is the process of breaking down packets known as?
    • Fragment Offset
    • Fragmentation
    • Flags
    • Checksum
    1. Which tcpdump command outputs detailed packet information?
    • sudo tcpdump -v any -i
    • sudo tcpdump -i any -v
    • sudo tcpdump -i any -c 100
    • sudo tcpdump -i any -n
    1. Examine the following tcpdump output:

    22:00:19.538395 IP (tos 0x10, ttl 64, id 33842, offset 0, flags [P], proto TCP (6), length 196) 198.168.105.1.41012 > 198.111.123.1.61012: Flags [P.], cksum 0x50af (correct), seq 169, ack 187, win 501, length 42

    What is the source IP address?

    • 22:00:19.538395
    • 198.111.123.1
    • 198.168.105.1
    • 41012

     

    Shuffle Q/A

     

    1. Why is network traffic monitoring important in cybersecurity? Select two answers.
    • It provides a method of classifying critical assets.
    • It helps detect network intrusions and attacks
    • It helps identify deviations from expected traffic flows.
    • It provides a method to encrypt communications.
    1. What information do packet headers contain? Select three answers.
    • Protocols
    • Payload data
    • IP addresses
    • Ports
    1. Fill in the blank: Network protocol analyzers can save network communications into files known as a _____.
    • protocol
    • packet capture
    • payload
    • network packet
    1. Which layer of the TCP/IP model does the Internet Protocol (IP) operate on?
    • Internet
    • Application
    • Transport
    • Network Access
    1. Examine the following tcpdump output:

    22:00:19.538395 IP (tos 0x10, ttl 64, id 33842, offset 0, flags [P], proto TCP (6), length 196) 198.168.105.1.41012 > 198.111.123.1.61012: Flags [P.], cksum 0x50af (correct), seq 169, ack 187, win 501, length 42

    Which protocols are being used? Select two answers.

    • TOS
    • UDP
    • IP
    • TCP
    1. What are some defensive measures that can be used to protect against data exfiltration? Select two answers.
    • Utilize lateral movement
    • Monitor network activity
    • Deploy multi-factor authentication
    • Reduce file sizes

     

    Fill in the blank: The transmission of data between devices on a network is governed by a set of standards known as _____.

      • headers
      • ports
      • payloads
    • protocols

     

    1. Network protocol analyzer tools are available to be used with which of the following? Select two answers.
    • Network interface card
    • Internet protocol
    • Graphical user interface
    • Command-line interface
    1. Which IPv4 header fields involve fragmentation? Select three answers.
    • Flags
    • Identification
    • Type of Service
    • Fragment Offset
    1. Which tcpdump option is used to specify the capture of 5 packets?
    • -v 5
    • -i 5
    • -c 5
    • -n 5
    1. Examine the following tcpdump output:

    22:00:19.538395 IP (tos 0x10, ttl 64, id 33842, offset 0, flags [P], proto TCP (6), length 196) 198.168.105.1.41012 > 198.111.123.1.61012: Flags [P.], cksum 0x50af (correct), seq 169, ack 187, win 501, length 42

    What is the value of the Type of Service field?

    • 0x10
    • 6
    • 501
    • 0x50af
    1. What type of attack involves the unauthorized transmission of data from a system?
    • Data leak
    • Data exfiltration
    • Packet classification
    • Packet crafting
    1. Which of the following behaviors may suggest an ongoing data exfiltration attack? Select two answers.
    • Outbound network traffic to an unauthorized file hosting service
    • Unexpected modifications to files containing sensitive data
    • Multiple successful multi-factor authentication logins
    • Network performance issues
    1. Fill in the blank: tcpdump is a network protocol analyzer that uses a(n) _____ interface.
    • Linux
    • command-line
    • internet
    • graphical user
    1. Which layer of the TCP/IP model is responsible for accepting and delivering packets in a network?
    • Transport
    • Internet
    • Network Access
    • Application
    1. Which IPv4 field determines how long a packet can travel before it gets dropped?
    • Options
    • Header Checksum
    • Time to Live
    • Type of Service
    1. How are IP headers valuable for security analysts during investigations?
    • They provide the foundation for communications over the internet.
    • They provide the ability to modify network communications.
    • They provide insight into the details of network communications.
    • They provide the ability to visualize network communications.

     

    Week 3

     

    1. Do detection tools have limitations in their detection capabilities?
    • Yes
    • No
    1. Why do security analysts refine alert rules? Select two answers.
    • To increase alert volumes
    • To reduce false positive alerts
    • To create threat intelligence
    • To improve the accuracy of detection technologies
    1. Fill in the blank: _____ involves the investigation and validation of alerts.
    • Honeypot
    • Detection
    • Analysis
    • Threat hunting
    1. What are some causes of high alert volumes? Select two answers.
    • Refined detection rules
    • Broad detection rules
    • Misconfigured alert settings
    • Sophisticated evasion techniques

     

    Test your knowledge: Response and recovery

     

    1. A security analyst in a security operations center (SOC) receives an alert. The alert ticket describes the detection of the download of a possible malware file on an employee’s computer. Which step of the triage process does this scenario describe?
    • Receive and assess
    • Add context
    • Collect and analyze
    • Assign priority
    1. What is triage?
    • The prioritizing of incidents according to their level of importance or urgency
    • A document that outlines the procedures to sustain business operations during and after a significant disruption
    • The ability to prepare for, respond to, and recover from disruptions
    • The process of returning affected systems back to normal operations
    1. Fill in the blank: _____ is the act of limiting and preventing additional damage caused by an incident.
    • Eradication
    • Resilience
    • Containment
    • Recovery
    1. Which examples describe actions related to the eradication of an incident? Select two answers.
    • Apply a patch
    • Complete a vulnerability scan
    • Investigate logs to verify the incident
    • Develop a business continuity plan

    Activity: Review a final report

     

    1. What type of security incident was the organization affected by?
    • Ransomware
    • Data theft
    • Phishing
    • Malware
    1. Which section of the report includes an explanation of the root cause of the incident?
    • Investigation
    • Recommendations
    • Timeline
    • Executive summary
    1. What did the attacker use to exploit the e-commerce web application vulnerability?
    • Data breach
    • Web server logs
    • Forced browsing
    • User error
    1. What recommendations did the organization implement to prevent future recurrences? Select two answers.
    • Implemented access control mechanisms
    • Paid the $50,000 payment request
    • Provided identity protection services to the affected customers
    • Implemented routine vulnerability scans

     

    Weekly challenge 3

     

    1. A security analyst is investigating an alert involving a possible network intrusion. Which of the following tasks is the security analyst likely to perform as part of the Detection and Analysis phase of the incident response lifecycle? Select two answers.
    • Identify the affected devices or systems.
    • Implement a patch to fix the vulnerability.
    • Collect and analyze the network logs to verify the alert.
    • Isolate the affected machine from the network.
    1. What are the benefits of documentation during incident response? Select three answers.
    • Quality
    • Clarity
    • Standardization
    • Transparency
    1. An organization is working on implementing a new security tool, and a security analyst has been tasked with developing workflow documentation that outlines the process for using the tool. Which documentation benefit does this scenario outline?
      • Transparency
    • Clarity
    • Quality
    • Standardization
    1. Chain of custody documents establish proof of which of the following? Select two answers.
    • Integrity
    • Validation
    • Quality
    • Reliability
    1. Which of the following does a semi-automated playbook use? Select two.
    • Threat intelligence
    • Crowdsourcing
    • Human intervention
    • Automation

     

    Which statement best describes the functionality of automated playbooks?

    • They use a combination of flowcharts and manual input to execute tasks and response actions.
    • They use automation to execute tasks and response actions.
    • They require the use of human intervention to execute tasks.
    • They require the combination of human intervention and automation to execute tasks.

     

    1. What are the steps of the triage process in the correct order?
    • Receive and assess, assign priority, collect and analyze
    • Assign priority, receive and assess, collect and analyze
    • Collect and analyze, assign priority, receive and assess
    • Receive and assess, collect and analyze, assign priority
    1. Fill in the blank: Containment is the act of limiting and _____ additional damage caused by an incident.
    • eradicating
    • removing
    • preventing
    • detecting
    1. Fill in the blank: Eradication is the complete _____ of all the incident elements from affected systems.
    • removal
    • prevention
    • isolation
    • disconnection
    1. Two weeks after an incident involving ransomware, the members of an organization want to review the incident in detail. Which of the following actions should be done during this review? Select all that apply.
    • Determine how to improve future response processes and procedures.
    • Determine the person to blame for the incident.
    • Create a final report.
    • Schedule a lessons learned meeting that includes all parties involved with the security incident.
    1. During a lessons learned meeting following an incident, a meeting participant wants to identify actions that the organization can take to prevent similar incidents from occurring in the future. Which section of the final report should they refer to for this information?
    • Timeline
    • Executive summary
    • Detection
    • Recommendations

     

    Shuffle Q/A

     

    1. After a ransomware incident, an organization discovers their ransomware playbook needs improvements. A security analyst is tasked with changing the playbook documentation. Which documentation best practice does this scenario highlight?
    • Be accurate
    • Be concise
    • Know your audience
    • Update regularly
    1. A member of the forensics department of an organization receives a computer that requires examination. On which part of the chain of custody form should they sign their name and write the date?
    • Description of the evidence
    • Custody log
    • Purpose of transfer
    • Evidence movement
    1. A security analyst gets an alert involving a phishing attempt. Which step of the triage process does this scenario outline?
    • Add context
    • Receive and assess
    • Assign priority
    • Collect and analyze
    1. After a security incident involving an exploited vulnerability due to outdated software, a security analyst applies patch updates. Which of the following steps does this task relate to?
    • Response
    • Reimaging
    • Prevention
    • Eradication
    1. Which step of the NIST Incident Response Lifecycle involves returning affected systems back to normal operations?
    • Recovery
    • Containment
    • Response
    • Eradication
    1. What questions can be asked during a lessons learned meeting? Select three answers.
    • What time did the incident happen?
    • Which employee is to blame?
    • What could have been done differently?
    • What were the actions taken for recovery?
    1. In the NIST Incident Response Lifecycle, what is the term used to describe the prompt discovery of security events?
    • Preparation
    • Detection
    • Validation
    • Investigation
    1. In incident response, documentation provides an established set of guidelines that members of an organization can follow to complete a task. What documentation benefit does this provide?
    • Reliability
    • Integrity
    • Standardization
    • Transparency
    1. What are the steps of the third phase of the NIST Incident Response Lifecycle? Select three answers.
    • Eradication
    • Recovery
    • Containment
    • Response

     

    Which of the following is an example of a recovery task?

      • Applying a patch to address a server vulnerability
      • Monitoring a network for intrusions
      • Disconnecting an infected system from the network
    • Reinstalling the operating system of a computer infected by malware

     

    Fill in the blank: A lessons learned meeting should be held within ____ weeks of an incident.

    • two
    • three
    • four
    • five

     

    Which documentation provides a comprehensive review of an incident?

      • Timeline
    • Final report
    • Lessons learned meeting
    • New technology

     

    1. An organization is completing its annual compliance audit. The people performing the audit have access to any relevant information, including records and documents. Which documentation benefit does this scenario outline?
    • Consistency
    • Organization
    • Transparency
    • Accuracy

     

    What are examples of how transparent documentation can be useful? Select all that apply.

    • Meeting cybersecurity insurance requirements
    • Providing evidence for legal proceedings
      • Defining an organization’s security posture
    • Demonstrating compliance with regulatory requirements

     

    1. An analyst is responding to a distributed denial of service attack (DDoS). They take several manual steps outlined in the organization’s DDoS playbook. Which type of playbook did they use to respond to the incident?
    • SOAR
    • Semi-automated
    • Non-automated
    • Automated

     

    Week 4

     

    1. What is the primary purpose of logs during incident investigation?
    • To manage alert volumes
    • To identify and diagnose system issues
    • To improve user experience
    • To provide a record of event details
    1. A security analyst wants to determine whether a suspicious login was successful. Which log type would be most useful for this purpose?
    • Network
    • Authentication
    • System
    • Firewall
    1. In the following log, what action does the log entry record?

    [ALLOW: wikipedia.org] Source: 192.167.1.1 Friday, 10 June 2022 11:36:12

      • 192.167.1.1
      • Source
      • Friday, 10 June 2022 11:36:12
    • ALLOW
    1. Fill in the blank: _____ is the process of examining logs to identify events of interest.
    • Log forwarder
    • Log file
    • Log analysis
    • Logging

     

    Test your knowledge: Log components and formats

     

    1. Examine the following authentication log:

    [2022/12/20 08:20:38.921286] User nuhara logged in successfully

    What type of information does this log contain? Select two answers.

    • Event description
    • Syslog
    • Message ID
    • Timestamp
    1. Which of the following capabilities can syslog be used for? Select three answers.
    • Extension
    • Log format
    • Protocol
    • Service
    1. What are examples of log formats? Select three answers.
    • JavaScript Object Notation (JSON)
    • Gramm-Leach-Bliley Act (GLBA)
    • Common Event Format (CEF)
    • eXtensible Markup Language (XML)
    1. Which log format uses tags to structure data?
    • eXtensible Markup Language (XML)
    • Verbose
    • Comma Separated Values (CSV)
    • Syslog

     

    Test your knowledge: Overview of intrusion detection systems (IDS)

     

    1. A security analyst uses a network protocol analyzer to capture HTTP traffic to analyze patterns. What type of data are they using?
    • Network telemetry
    • Host-based
    • False positive
    • Signature-based
    1. Which statement accurately describes the difference between a network-based intrusion detection system (NIDS) and a host-based intrusion detection system (HIDS)?
    • A NIDS is installed on a network; a HIDS is installed on individual devices.
    • A NIDS uses signature analysis to detect threats; a HIDS uses agents.
    • A NIDS is installed on individual devices; a HIDS is installed on a network.
    • A NIDS only detects known threats; a HIDS detects unknown threats.
    1. Fill in the blank: The _____ component of an IDS signature includes network traffic information.
    • action
    • rule options
    • header
    • signature ID
    1. A security analyst creates a Suricata signature to identify and detect security threats based on the direction of network traffic. Which of the following rule options should they use?
    • Content
    • Message
    • Flow
    • Rev

     

    Activity: Perform a query with Splunk

     

    1. How many events are contained in the main index across all time?
    • Over 100,000
    • 100-1,000
    • 10,000
    • 10-99
    1. Which field identifies the name of a network device or system from which an event originates?
    • host
    • sourcetype
    • index
    • source
    1. Which of the following hosts used by Buttercup Games contains log information relevant to financial transactions?
    • www1
    • vendor_sales
    • www2
    • www3
    1. How many failed SSH logins are there for the root account on the mail server?
    • One
    • None
    • 100
    • More than 100

     

    Test your knowledge: Overview of SIEM tools

     

    1. Which special character can be used to substitute with any other character in Search Processing Language (SPL)?
    • =
    • !=
    • |
    • *
    1. Which of the following steps is part of the SIEM process for data collection? Select three answers.
    • Collect and process data.
    • SIEM tools index data to be made searchable.
    • Normalize data so it is ready to read and analyze.
    • Monitor activity and alerts related to intrusions.
    1. Fill in the blank: ____ is a computer language used to create rules for searching through ingested log data.
    • EVE JSON
    • YARA-L
    • NIDS
    • SIEM
    1. Which of the following is Splunk’s query language?
    • UDM
    • SPL
    • SQL
    • IDS

     

    Weekly challenge 4

     

    1. What details do logs contain? Select all that apply.
    • Location
    • Date
    • Forwarder
    • Time
    1. What is the difference between a log and log analysis?
    • A log records details in log files. Log analysis involves a high-level overview of all events that happen on the network.
    • A log and log analysis both contain details of events, but they record details from different sources.
    • A log contains log file details. Log analysis involves the collection and storage of logs.
    • A log is a record of events that occur within an organization’s systems. Log analysis is the process of examining logs to identify events of interest.
    1. Examine the following log:

    {

    “name”: “System test”,

    “host”: “167.155.183.139”,

    “id”: 11111,

    “Message”: [error] test,

    }

    Which log format is this log entry in?

    • Syslog
    • CSV
    • XML
    • JSON
    1. Consider the following scenario:

    A security analyst at a midsized company is tasked with installing and configuring a host-based intrusion detection system (HIDS) on a laptop. The security analyst installs the HIDS and wants to test whether it is working properly by simulating malicious activity. The security analyst runs unauthorized programs on the laptop, which the HIDS successfully detects and alerts on.

    What is the laptop an example of?

    • An endpoint
    • An agent
    • A log forwarder
    • A signature
    1. What information is included in a signature’s header? Select all that apply.
    • IP address
    • Port number
    • Protocol
    • Action
    1. Which symbol is used to indicate a comment and is ignored in a Suricata signature file?
    • :
    • >
    • #
    • $
    1. Which type of log data does Suricata generate? Select all that apply.
    • Network telemetry
    • Protocol
    • Alert
    • Signature
    1. Which type of Splunk query searches through unstructured log records?
    • Reference search
    • Raw log search
    • Index search
    • UDM search
    1. What is the default method of search in Chronicle?
    • YARA-L
    • Raw log
    • Non-normalized
    • UDM
    1. Fill in the blank: SIEM tools _____ raw data so that it is formatted consistently.
    • process
    • ingest
    • normalize
    • collect

     

    Shuffle Q/A

     

    1. Which software is used to collect and send logs?
      • IDS
      • SIEM
      • IPS
    • Forwarder
    1. Examine the following log:

    LoginEvent[2021/10/13 10:32:08.958711] auth_session_authenticator.cc:304 Regular user login 1

    Which type of log is this?

    • Location
    • Application
    • Network
    • Authentication
    1. Fill in the blank: A syslog entry contains a header, _____, and a message.
    • structured-data
    • object
    • tag
    • eXtensible Markup Language
    1. Fill in the blank: _____ analysis is a detection method used to find events of interest using patterns.
    • Endpoint
    • Signature
    • Network
    • Host
    1. Which rule option is used to match based on the direction of network traffic?
    • content
    • sid
    • flow
    • message
    1. Which querying language does Splunk use?
    • Structured Querying Language
    • Search Processing Language
    • Structured Processing Language
    • SIEM Processing Language

     

    Which step in the SIEM process involves the processing of raw data into a standardized and structured format?

    • Normalize
    • Index
    • Process
    • Collect

     

    1. Which Unified Data Model (UDM) field search specifies a security action?
    • security_result.action
    • block
    • metadata.event_type
    • action
    1. What are the steps in the SIEM process for data collection? Select all that apply.
    • Index
    • Normalize
    • Collect
    • Unify
    1. Which of the following refers to a record of events that occur within an organization’s systems?
    • Logs
    • Log sources
    • Occurrences
    • Log forwarder
    1. Examine the following log:

    [2022/12/21 17:46:35.232748] NOTIFY: NetworkPropertiesUpdated: wifi_psk_13

    Which type of log is this?

    • Authentication
    • Location
    • Application
    • Network
    1. Examine the following log:

    <111>1 2020-04-12T23:20:50.52Z my.machine.com evntslog – ID01 [user@98274 iut=”2″ eventSource=”Mobile” eventID=”24″][Priority@98274 class=”low”] Computer A

    What field value indicates the type of device that this event originated from?

    • my.machine.com
    • Computer A
    • Mobile
    • low
    1. What is the difference between a network-based intrusion detection system (NIDS) and a host-based intrusion detection system (HIDS)?
    • A NIDS collects and monitors network traffic and network data. A HIDS monitors the activity of the host on which it is installed.
    • Both NIDS and HIDS monitor systems and generate alerts, but a NIDS use agents.
    • A NIDS monitors the activity of the host on which it is installed. A HIDS uses signature analysis to analyze network activity.
    • A NIDS logs and generates alerts. A HIDS system monitors endpoint activity.
    1. Which rule option is used to indicate the number of times a signature is updated?
    • tcp
    • msg
    • rev
    • sid
    1. Fill in the blank: The asterisk symbol is also known as a(n) _____.
    • label
    • wildcard
    • option
    • Boolean operator
    1. Fill in the blank: Chronicle uses ______ to define detection rules.
    • UDM
    • YARA-L
    • SQL
    • SPL
    1. What is the difference between network telemetry and network alert logs?
      • Network telemetry is output in EVE JSON format; network alert logs are output in HTML.
      • Network telemetry is the output of a signature; network alert logs contain details about malicious activity.
      • Network telemetry contains information about network traffic flows; network alert logs are the output of a signature.
    • Both provide information that is relevant for security analysts, but network alert logs contain network connection details.

     

    Course 7 – Automate Cybersecurity Tasks with Python

     

    Week 1

     

    1. What tasks would a security analyst most likely automate with Python? Select three answers.
    • Sorting through a log file
    • Analyzing network traffic
    • Addressing an unusual cybersecurity concern
    • Managing an access control list
    1. What are some benefits of using Python in security? Select all that apply.
    • Python reduces manual effort.
    • Python helps automate short, simple tasks.
    • Python is the only language that creates a specific set of instructions to execute tasks.
    • Python can combine separate tasks into one workstream.
    1. Which of the following code blocks contains a valid Python comment?
    • : This prints a “Try again” message

      print(“Try again”)
    • # This prints a “Try again” message

      print(“Try again”)
    • This prints a “Try again” message

      print(“Try again”)
    • comment: This prints a “Try again” message

      print(“Try again”)
    1. Which line of code outputs the string “invalid username” to the screen?
    • print(#invalid username#)
    • print(“invalid username”)
    • # print(“invalid username”)
    • print(invalid username)

     

    Test your knowledge: Core Python components

     

    1. Which of the following data items are float data? Select all that apply.
    • -2.11
    • 8
    • 15.0
    • “5.2”
    1. What code displays the data type of the variable username?
    • username = [“elarson”, “bmoreno”, “tshah”]

      data_type = type()

      print(data_type)
    • username = [“elarson”, “bmoreno”, “tshah”]

      data_type = username

      print(data_type)
    • username = [“elarson”, “bmoreno”, “tshah”]

      data_type = type(username)

      print(data_type)
    • username = [“elarson”, “bmoreno”, “tshah”]

      type(username) = data_type

      print(data_type)
    1. In the following code, what is the data type of login_success?

    login_success = [“success”, “success”, “fail”, “success”]

    • Integer
    • String
    • List
    • Boolean

     

    1. What is the output of the following code?

    failed_attempts = 3

    failed_attempts = 4

    print(failed_attempts)

    • 3
    • 7
    • 4
    • 3, 4

     

    Test your knowledge: Conditional and iterative statements

     

    1. What will the following code display?

    ip_address = “192.168.183.51”

    if ip_address == “192.168.183.51”:

    print(“You’re logged in.”)

    else:

    print(“Login failed, try again.”)

    • “Login failed, try again.”
    • “You’re logged in.”
    • Both “You’re logged in.” and “Login failed, try again.”
    • Nothing

     

    1. Which conditional statement prints the message “account locked” when the value of failed_logins is 3 or higher?
    • if failed_login_count > 3:

      print(“account locked”)
    • if failed_login_count != 3:

      print(“account locked”)
    • if failed_logins >= 3:

      print(“account locked”)
    • if failed_login_count == 3:

      print(“account locked”)
    1. Which code prints all numbers from 3 to 7?
    • for i in range(3, 4, 5, 6, 7):

      print(i)
    • for i in range(8):

      print(i)
    • for i in range(3, 7):

      print(i)
    • for i in range(3, 8):

      print(i)
    1. How many times does the following code print the “security alert” message?

    count = 0

    while count < 10:

    print(“security alert”)

    count = count + 1

    • 5
    • 0
    • 9
    • 10

     

    Weekly challenge 1

     

    1. Fill in the blank: Automation is _____.
    • the use of human and manual effort to reduce technological power consumption
    • the use of technology to reduce human and manual effort to perform common and repetitive tasks
    • the combination of technology and manual effort to complete a task
    • the replacement of existing technology

     

    1. What is wrong with the following code?

    for username in failed_login:

    print(username)

    • The line with for username in failed_login: is not indented.
    • The first line should be split in two, and in failed_login: should be indented on the new line.
    • The line with print(username) is not indented.
    • Both lines are not indented.
    1. What data type requires quotation marks (” “)?
    • Boolean
    • String
    • Float
    • Integer
    1. Which line of Python code would create a Boolean value of True?
    • print(“True”)
    • print([“Boolean”])
    • print(25<24)
    • print(10<100)
    1. Which line of code assigns the string “dtanaka” to a variable called username?
    • username = “dtanaka”
    • “dtanaka” = username
    • username(“dtanaka”)
    • username = dtanaka

     

    1. What will this code do when you run it?

    var2 = [“a”,”b”,”c”]

    var2_type = type(var2)

    print(var2_type)

    • Indicate that var2 contains list data
    • Change the data type of var2
    • Output the characters “a”, “b”, and “c” to the screen
    • Print the string “var2_type” to the screen

     

    1. You are checking whether the string stored in a device_id variable matches to the correct device ID, the string “15hgu3769”. When it matches, you want to print, “Login successful!”. Which conditional statement has the correct syntax needed to do this?
    • if device_id == “15hgu3769”:

      print(“Login successful!”)
    • if “device_id” = “15hgu3769”

      print(“Login successful!”)
    • if “device_id == 15hgu3769”

      print(“Login successful!”)
    • if device_id != “15hgu3769”

      print(“Login successful!”)
    1. Fill in the blank: An else statement _____.
    • is required after every if statement
    • executes when the condition in the if statement preceding it evaluates to False
    • executes when the condition in the if statement preceding it evaluates to True
    • contains its own unique condition
    1. What will this iterative statement do?

    for i in [0, 5]:

    print(i)

    • Output the integer 0
    • Output the integers 0, 1, 2, 3, and 4
    • Output the integers 0 and 5
    • Output the integers 0, 1, 2, 3, 4, and 5
    1. If you want to run a loop that repeats if a count variable is less than 50, what code should your loop header contain?
    • while count < 50:
    • while count == 50:
    • print(50)
    • count = count + 50

     

    Shuffle Q/A

     

    1. Fill in the blank: If you use Python code to reduce the manual effort needed to manage an access control list, this is an example of _____.
    • debugging
    • reassignment
    • automation
    • data analysis
    1. The purpose of the following code is to print an “Attempting connection” message while the value of the count variable is less than 10. The value of count should increase by 1 with each iteration of the loop. What is wrong with the code? Select all that apply.

    count = 1

    while count < 10:

    print(“Attempting connection”)

    count = count + 1

    • The line with print(“Attempting connection”) is not indented.
    • The line with while count < 10: is not indented.
    • The line with count = count + 1 is not indented.
    • The line with count = 1 is not indented

     

    1. Fill in the blank: String data _____.
    • must be placed in parentheses
    • must be placed in brackets
    • must be placed in quotation marks
    • must include a decimal point

     

    1. Which data type always has a value of either True or False?
    • Boolean
    • Float
    • List
    • String

     

    1. How do you assign the string value “rtp3426” to a variable called device_id?
    • device_id = “rtp3426”
    • device_id = rtp3426
    • device_id(rtp3426)
    • device_id(“rtp3426”)

     

    1. Fill in the blank: If you ran the following code, the output would _____.

    var1 = 9.5

    var1_type = type(var1)

    print(var1_type)

    • indicate that var1 contains float data
    • output 9.5 to the screen
    • reassign var1 as string data
    • reassign var1 as float data

     

    1. You wrote the following code:

    if attempts >= 5:

    print(“locked”)

    else:

    print(“try again”)

    If the value in the attempts variable is 3, what will Python do?

    • First output the message “try again” and then output the message “locked”
    • Output the message “locked”
    • Output the message “try again”
    • First output the message “locked” and then output the message “try again”

     

    1. What iterative statement should you use if you want to print the numbers 1, 2, and 3?
    • for i in [1,3]:

      print(i)
    • for i in range(1,3):

      print(i)
    • for i in range(0,3):

      print(i)
    • for i in [1, 2, 3]:

      print(i)
    1. How many times will the following code print the “warning” message?

    count = 1

    while count < 5:

    print(“warning”)

    count = count + 1

    • 5
    • 1
    • 4
    • 0

     

    1. You are implementing security measures on a server. If a user has more than 3 failed login attempts, the program should print “locked out”. The number of failed login attempts is stored in a variable called failed_attempts. Which conditional statement has the correct syntax needed to do this?
    • if failed_attempts >= 3

      print(“locked out”)
    • if failed_attempts <= 3:

      print(“locked out”)
    • if failed_attempts > 3:

      print(“locked out”)
    • if failed_attempts < 3

      print(“locked out”)
    1. You have written the following code:

    if operating_system == “OS 3”:

    print(“Updates needed”)

    You want to add to it so that it will print a “No updates needed” message whenever the value of operating_system is not “OS 3”. Which lines of code have the correct syntax to do this?

    • else:
      print(“No updates needed”)
    • else
      print(“No updates needed”)
    • elif operating_system == “OS 3”:
      print(“No updates needed”)
    • else operating_system != “OS 3”:
      print(“No updates needed”)
    1. In a cybersecurity setting, which of these tasks would it be common to apply Python to? Select all that apply.
    • Automating several tasks from a playbook into one workstream
    • Manually checking individual timestamps in a log
    • Automating how a log is read when responding to an incident
    • Reducing the effort needed to manage an access control list

     

    1. What is the syntax problem in the following code?

    if username == “aestrada”:

    print(“username found”)

    • The first line should be indented one space, and the second line should be indented two spaces.
    • The line with print(“username found”) is not indented.
    • The line with if username == “aestrada”: is not indented.
    • Both lines are not indented.

     

    1. What are the variables in the following code? Select all that apply.

    username = “kcarter”

    attempts = 5

    print(username)

    print(attempts)

    print(“locked”)

    • “kcarter”
    • attempts
    • username
    • “locked”

     

    1. You want to check the string stored in an update_status variable. When it contains a value of “incomplete”, you want to print a “schedule update” message. Right now, this conditional statement is not correct. What are the problems with this conditional statement? Select all that apply.

    if update_status != “incomplete”

    print(“schedule update”)

    • A colon (:) is missing at the end of the conditional header.
    • The operator should not be !=. It should be ==.
    • There should be quotation marks around the variable update_status.
    • The line with print(“schedule update”) should not be indented.

     

    1. You want to print all even numbers between 0 and 10 (in other words, 0, 2, 4, 6, 8, and 10). What should your next line of code be?

    count = 0

    while count <= 10:

    print(count)

    • count = count + 1
    • if count < 10:
    • count = 1
    • count = count + 2

     

    Week 2

     

    1. In Python, what is a function?
    • A section of code that contains a conditional
    • A section of code that exists directly in Python
    • A section of code that can be reused in a program
    • A section of code that contains an iterative statement
    1. Which of the following keywords is essential when defining a function?
    • while
    • if
    • def
    • for
    1. You want to define a function that performs a status check. Which of the following is a valid header for the function definition?
    • def status_check()
    • def status_check
    • def status_check:
    • def status_check():
    1. You are responsible for defining a function alert() that prints out the statement “Security issue detected.” Which of the following blocks of code represent the correct indentation for defining and then calling the function?

     

    Test your knowledge: Arguments, parameters, and return statements

     

    Test your knowledge: Arguments, parameters, and return statements

    1. Fill in the blank: In the following code, the integers 5 and 12 are _____:

     

    for i in range(5, 12):

     

    print(i)

    • functions
    • parameters
    • return statements
    • arguments
    1. What is the correct way to define the function addition() if it requires the two parameters num1 and num2?
    • def addition(num1 num2):
    • def addition(num1 and num2):
    • def addition(num1)(num2):
    • def addition(num1, num2):
    1. Which of the following lines of code has correct syntax for printing the data type of the string “elarson”?
    • print(type, “elarson”)
    • print(type(“elarson”))
    • type(print(“elarson”))
    • print(“elarson”, type)
    1. Which function definition includes the correct syntax for returning the value of the result variable from the doubles() function?
    • def doubles(num):

      result = num * 2

      return result
    • def doubles(num):

      result = num * 2

      result return
    • def doubles(num):

      result = num * 2

      return = result
    • def doubles(num):

      result = num * 2

      return “result”

     

    Test your knowledge: Learn from the Python community

     

    1. Which of these is not included in the Python Standard Library?
    • time
    • NumPy
    • re
    • csv
    1. Which of the following resources provides recommendations about including comments in your code?
    • csv
    • re
    • Python Standard Library
    • PEP 8
    1. Which of the following code blocks have correct indentation?
    2. What is a Python module?
    • A Python file that contains additional functions, variables, and any kind of runnable code
    • A resource that provides stylistic guidelines for programmers working in Python
    • A text file that contains cybersecurity-related data
    • A Python function that exists within Python and can be called directly

     

    Weekly challenge 2

     

    1. Which of the following components are part of the header in a function definition? Select all that apply.
    • The keyword return
    • The name of the function
    • The parameters used in a function
    • The keyword def
    1. Which of the following calls to the type() function uses correct syntax?
    • type([55, 81, 17])
    • type([17, 81]):
    • type[(81, 17)]
    • type[81, 55, 17]
    1. Review the following code. Which of these statements accurately describes name?

    def echo(name):

    return name * 3

    • It is a parameter because it is used in a return statement.
    • It is a parameter because it is included in the function definition.
    • It is an argument because it is included in the function call.
    • It is an argument because it is used in a return statement.
    1. Fill in the blank: The re, csv, glob, and time modules are all _____.
    • keywords in a function header
    • built-in functions
    • part of the Python Standard Library
    • part of PEP 8
    1. What does this line of code return? print(max(1,3,7))
    • 1
    • 7
    • 3
    • 11
    1. What is returned from the following user-defined function if you pass it the arguments 2 and 3?

     

    def add(num1, num2):

    result = num1 + num2

    return result

    add(2, 3)

    • 2
    • 5
    • 3
    • 1
    1. Which of the following choices is a resource that provides stylistic guidelines for programmers working in Python?
    • re
    • Python Standard Library
    • PEP 8
    • glob
    1. What should you do when writing comments? Select all that apply.
    • Keep them up-to-date.
    • Make them clear.
    • Only place them at the beginning of a program.
    • Place them before every line of code.
    1. What is a function?
    • A Python file that contains runnable code
    • A reusable section of code
    • A set of stylistic guidelines for working in Python
    • A downloadable resource with code instructions
    1. Fill in the blank: A Python file that contains additional functions, variables, classes, and any kind of runnable code is called a _____.
    • parameter
    • library
    • module
    • built-in function

     

    Shuffle Q/A

     

    1. Which of the following choices is a valid header in a function definition?
    • def remove_user(username):
    • def remove_user(username)
    • remove_user(username):
    • def (remove_user(username))
    1. Fill in the blank: A collection of modules that users can access in their programs is a _____.
    • style guide
    • built-in function
    • library
    • user-defined function
    1. What does this line of code return?

    print(type(“h32rb17”))

    • int
    • “h32rb17”
    • str
    • h32rb17
    1. What is returned from the following user-defined function if you pass it the argument “John”?

    def greet(name):

    greeting = “Hello”

    return name

    greet(“John”)

    • “John”
    • name
    • “Hello, John”
    • “Hello John”
    1. What can a style guide help you with when working with Python? Select two answers.
    • Making it easier for other programmers to understand your code
    • Finding new modules you can incorporate into your code
    • Finding ways to make your code more complex
    • Making your code more consistent
    1. Why are comments useful? Select three answers.
    • They explain the code to other programmers.
    • They make debugging easier later on.
    • They provide insight on what the code does.
    • They make the code run faster.
    1. What are built-in functions?
    • Functions that return information
    • Functions that exist with Python and can be called directly
    • Functions that take parameters
    • Functions that a programmer builds for their specific needs
    1. You imported a Python module, what do you now have access to in Python?
    • A manual that informs the writing, formatting, and design of documents
    • A function that exists within Python and can be called directly
    • A list of comments that you have included in previous code
    • Additional functions, variables, classes, and other kinds of runnable code
    1. Which of the following calls to the sorted() function uses correct syntax?
    • sorted([532, 73, 85])
    • sorted[73, 85, 532]
    • sorted[(85, 523, 73)]
    • sorted():
    1. In the following code, what is the argument?

    def welcome_user(name):

    print(“Welcome,” name)

    username=”elarson”

    welcome_user(username)

    • welcome_user
    • def
    • name
    • username
    1. When working in Python, what is a library?
    • A collection of modules that provide code users can access in their programs
    • A module that allows you to work with a particular type of file
    • A Python file that contains additional functions, variables, classes, and any kind of runnable code
    • A collection of stylistic guidelines for working with Python
    1. What is returned from the following user-defined function if you pass it the argument of 2?

    def multiples(num):

    multiple = num * 3

    return num

    multiples(2)

    • multiples
    • 6
    • num
    • 2
    1. What is an advantage of including this comment in the following code? Select all that apply.

    # For loop iterates to print an alert message 5 times

    for i in range(5):

    print(“alert”)

    • It ensures the loop will function when the code is run in Python.
    • It can help other programmers understand the purpose of this loop.
    • It can help you understand the code if you revisit it in the future.
    • It is displayed in the output when the code is run in Python.
    1. Which of the following statements accurately describe functions? Select all that apply.
    • Functions can be used no more than 10 times from within a single program.
    • When functions are updated, the changes are applied everywhere they are used.
    • Functions are useful for automation.
    • Functions can be reused throughout a program.
    1. What does this line of code return?

    print(sorted([“h32rb17”, “p52jb81”, “k11ry83”]))

    • [“h32rb17”, “k11ry83”, “p52jb81”]
    • [“p52jb81”]
    • [“p52jb81”, “k11ry83”, “h32rb17”]
    • [“h32rb17”]

     

    Week 3

     

    1. Which of the following statements correctly describe strings? Select all that apply.
    • Strings cannot contain numeric characters.
    • Strings must be placed in brackets ([ ]).
    • Strings must be placed in quotation marks (” “).
    • Strings are immutable.
    1. What does the following code return?

    device_id = “uu0ktt0vwugjyf2”

    print(device_id[2:5])

    • “u0kt”
    • “0ktt”
    • “u0k”
    • “0kt”
    1. What does the following code display?

    device_id = “Tj1C58Dakx”

     

    print(device_id.lower())

    • “tj1C58Dakx”
    • “Tj1C58Dakx”
    • “tj1c58dakx”
    • “TJ1C58DAKX”
    1. You want to find the index where the substring “192.168.243.140” starts within the string contained in the variable ip_addresses. Complete the Python code to find and display the starting index. (If you want to undo your changes to the code, you can click the Reset button.)

    What index does the substring “192.168.243.140” start at?

    • 31
    • 33
    • 34
    • 32

     

    Test your knowledge: Work with lists and develop algorithms

     

    1. Review the following code:

    my_list = [“a”, “b”, “c”, “d”]

    my_list[2] = 4

    print(my_list)

    What will it display?

    • [“a”, 4, “c”, “d”]
    • An error message
    • [“a”, “b”, 4, “d”]
    • [“a”, “b”, “4”, “d”]
    1. You are working with the list [“cwvQSQ”,”QvPvX5″,”ISyT3a”,”S7vgN0″]. Its elements represent machine IDs, and the list is stored in a variable named machine_ids. Which line of code will add the ID of “yihhLL” at index 3?
    • machine_ids.append(“yihhLL”,3)
    • machine_ids.insert(“yihhLL”,3)
    • machine_ids.append(“yihhLL”)
    • machine_ids.insert(3,”yihhLL”)
    1. Which line of code will remove the username “tshah” from the following list?

    access_list = [“elarson”, “bmoreno”, “tshah”, “sgilmore”]

    • access_list[“tshah”].remove()
    • access_list.remove(“tshah”)
    • access_list.remove(2)
    • access_list.remove(3)
    1. As a security analyst, you are responsible for developing an algorithm that automates removing usernames that match specific criteria from an access list. What Python components would you help implement this? Select three answers.
    • A for loop that iterates through the usernames in the access list
    • The .remove() method
    • The .append() method
    • An if statement that compares a username to the criteria for removal

     

    Test your knowledge: Regular expressions

     

    1. Which regular expression symbol represents one or more occurrences of a specific character?
    • \d
    • \w
    • *
    • +
    1. As a security analyst, you are responsible for finding employee IDs that end with the character and number sequence “a6v”. Given that employee IDs consist of both numbers and alphabetic characters and are at least four characters long, which regular expression pattern would you use?
    • “\w*a6v”
    • “a6v”
    • “\wa6v”
    • “\w+a6v”
    1. You have imported the re module into Python with the code import re. You want to use the findall() function to search through a string. Which function call enables you to search through the string contained in the variable text in order to return all matches to a regular expression stored in the variable pattern?
    • findall(pattern, text)
    • findall(text, pattern)
    • re.findall(pattern, text)
    • re.findall(text, pattern)
    1. Which strings match the regular expression pattern “\w+”? Select all that apply.
    • “3”
    • “FirstName”
    • “#name”
    • “”

     

    Weekly challenge 3

     

    1. Which line of code converts the integer 7 to a string?
    • str(“7”)
    • str(7)
    • string(7)
    • string(“7”)
    1. Which line of code returns a copy of the string “HG91AB2” as “hg91ab2”?
    • print(“HG91AB2”.lower())
    • print(“HG91AB2″(lower))
    • print(lower.”HG91AB2″())
    • print(lower(“HG91AB2”))

    In the string “network”, which character has an index of 1?

    • “e”
    • “n”
    • “k”
    • “t”

     

    1. What is the index of the character “4” in the string “h204D3921”?
    • 2
    • 5
    • 3
    • 4
    1. You need to take a slice from an employee ID. Specifically, you must extract the characters with indices of 3, 4, 5, and 6. Complete the Python code to take this slice and display it. (If you want to undo your changes to the code, you can click the Reset button.)

    What string does the code output?

    • “x430”
    • “37×4”
    • “7×43”
    • “237x”

     

    You need to take a slice from a network ID. Specifically, you must extract the characters with indices of 6 through 10. Complete the Python code to take this slice and display it. (If you want to undo your changes to the code, you can click the Reset button.)

    network_id = “l693m585n528”

    print(### YOUR CODE HERE ###)

    What string does the code output?

      • “m585n”
      • “5n528”
    • “585n5”
    • “85n52”

     

    1. What is the output of the following code?

    list1 = [1, 2, 3]

    list2 = [“a”, “b”, “c”]

    print(list1 + list2)

    • [1, 2, 3, “a”, “b”, “c”]
    • An error message
    • [1, “a”, 2, “b”, 3, “c”]
    • [6, “abc”]
    1. A variable named my_list contains the list [1,2,3,4]. Which line of code adds the element 5 to the end of the list?
      • my_list.insert(4,5)
    • my_list.insert(5)
    • my_list.insert(5,4)
    • my_list.insert(5,5)
    1. What is an algorithm?
    • A function that finds matches to a pattern
    • A set of guidelines to keep code consistent
    • A function that returns information
    • A set of rules to solve a problem
    1. What does the \w symbol match to in a regular expression?
    • Any letter
    • Any character and symbol
    • Any alphanumeric character
    • Any number
    1. You have imported the re module into Python with the code import re. Which code searches the device_ids string variable for a pattern of “r15\w+”?
    • re.findall(device_ids, “r15\w+”)
    • findall(“r15\w+”, device_ids)
    • re.findall(“r15\w+”, device_ids)
    • findall(device_ids, “r15\w+”)
    1. Which method adds input to the end of a list?
    • .append()
    • .lower()
    • .insert()
    • .index()

     

    Shuffle Q/A

     

    1. What is the output of the following code?

    print(len(“125”))

    • 3
    • 10
    • 8
    • 5
    1. Which line of code returns a copy of the string “bmoreno” as “BMORENO”?
    • print(“bmoreno”.upper())
    • print(upper.”bmoreno”())
    • print(upper(“bmoreno”))
    • print(“bmoreno”(upper))
    1. What is the index of the character “c” in the string “encryption”?
    • 2
    • 3
    • 1
    • 4
    1. What is the output of the following code?

    username_list = [“elarson”, “bmoreno”, “tshah”]

    device_id_list = [“us2c0R5”, “2R78TBR”, “bt3MIEz”]

    print(username_list + device_id_list)

    • [“elarson”, “us2c0R5”, “bmoreno”, “2R78TBR”, “tshah”, “bt3MIEz”]
    • [“us2c0R5”, “2R78TBR”, “bt3MIEz”, “elarson”, “bmoreno”, “tshah”]
    • An error message
    • [“elarson”, “bmoreno”, “tshah”, “us2c0R5”, “2R78TBR”, “bt3MIEz”]
    1. A variable named my_list contains the list [1,2,3,4]. Which line of code removes the last element in the list?
    • remove (my_list, 3)
    • remove(my_list, 4)
    • my_list.remove(3)
    • my_list.remove(4)
    1. What module do you need to import to use regular expressions in Python?
    • os
    • time
    • re
    • csv
    1. What is the result when .upper() is applied to a string?
    • The character that appears most frequently in the string is extracted from it and returned.
    • The value of the string is reassigned to the value of the string in the line preceding it.
    • The value of the string is reassigned to contain all uppercase letters.
    • A copy of the string is returned with all uppercase letters.
    1. What is the output of the following code?

    approved_users = [“bmoreno”, “elarson”, “tshah”, “eraab”]

    print(approved_users[1])

    • “elarson”
    • [“bmoreno”, “elarson”, “tshah”, “eraab”, 1]
    • “bmoreno”
    • [1, “bmoreno”, “elarson”, “tshah”, “eraab”]
    1. Fill in the blank: A(n) _____ is a set of rules to solve a problem.
    • append
    • algorithm
    • regular expression
    • index
    1. Which of the following strings match with the regular expression pattern of “\w”? Select all that apply.
    • “W”
    • “security”
    • “2”
    • “1B”
    1. What does the re.findall() function return?
    • All possible regular expressions that match to a given string
    • A list of all matches to a regular expression in a given string
    • The first match to a regular expression in a given string
    • All occurrences of the pattern “re” in a given string
    1. What does the code username_list.append(“bmoreno”) method do?
    • Returns all matches to the pattern “bmoreno” in the username_list list
    • Inserts “bmoreno” at the beginning of the username_list list
    • Adds “bmoreno” to the end of the username_list list
    • Updates all instances of “bmoreno” in the username_list list to uppercase letters
    1. Which line of code returns the number of characters in the string assigned to the username variable?
    • print(len(username))
    • print(username.len())
    • print(str(username))
    • print(username.str())
    1. Which code joins a list of new_users to a list of approved_users and assigns the value to a third variable named users?
    • users(new_users[1], approved_users[2])
    • users = insert(new_users, approved_users)
    • users = new_users + approved_users
    • users(new_users, approved_users)
    1. Fill in the blank: Determining that you need to use string slicing and a for loop to extract information from items in a list is part of creating a(n) _____.
    • index
    • regular expression
    • append
    • algorithm

     

    What does the code device_ids.append(“h32rb17”) do?

    • Adds “h32rb17” to the end of the device_ids list
    • Returns all matches to the pattern “h32rb17” in the device_ids list
    • Inserts “h32rb17” at the beginning of the device_ids list
    • Updates all instances of “h32rb17” in the device_ids list to uppercase letters

     

    Week 4

     

    1. You want to open the file “logs.txt” and store it in the file variable for the purpose of reading it. You also want to ensure all resources are released and the file is closed after you read it. What is the correct line of code to do this?
    • file = open(“logs.txt”, “r”):
    • with open(“logs.txt”, “r”) as file:
    • with file.open(“logs.txt”, “r”):
    • with open(“r”, “logs.txt”) as file:
    1. After you’ve opened a log file as login_file, which line of code can you use to read the file and store it in a variable called login_attempts?
    • login_attempts = login_file.reader()
    • login_attempts = login_file.read()
    • login_attempts = read(login_file)
    • login_file.read() as login_attempts
    1. You just read a log file into a variable called file. The file variable contains a string of multiple IP addresses that are each separated by a whitespace. Which line of code separates each individual IP address and stores it as a list in a variable called ip_addresses?
    • ip_addresses = split(file)
    • split(file, ip_addresses)
    • ip_addresses = file.split()
    • ip_addresses.split(file)
    1. You need to check for unusual login activity. Specifically, you need to check a list of login timestamps to determine if any of the login times occurred at unusual hours. If you want to automate this through Python, what would be part of your code? Select two answers.
    • A for loop that iterates through the list of timestamps
    • An if statement that checks if a specific user has multiple login timestamps during unusual hours
    • A counter variable that keeps track of the number of failed login attempts
    • An if statement that checks if the login timestamp occurred at unusual hours

     

    Test your knowledge: Debug Python code

     

    1. What types of errors might you encounter while debugging code? Select three answers.
    • Logic errors
    • Exceptions
    • Syntax errors
    • Iteratives
    1. The purpose of this code is to indicate whether a particular operating system needs to be updated. However, it contains a syntax error. Run this code, analyze its output, and then debug it. (If you want to undo your changes to the code, you can click the Reset button.)

    Based on what you discover, how can you fix the error?

    • Remove all colons (:).
    • Change the keyword elsif to elif.
    • Indent the elsif statement.
    • Use single equals signs (=) and not double equals signs (==).
    1. You have written code that assigns security incident tickets to the appropriate cybersecurity team based on its priority level. If the priority level is 1, it should get forwarded to Team A. If the priority level is 2, it should get forwarded to Team B. When testing your code, you notice that an incident with priority level 2 is forwarded to Team A instead of Team B. What type of error is this?
    • Exception
    • Syntax error
    • Logic error
    • Name error
    1. You have written code that uses a search algorithm to find an employee’s IP address. When testing your code, an error message indicates that an unknown index is being accessed. What type of error is this?
    • Exception
    • Logic error
    • Syntax error
    • Iterative

     

    Weekly challenge 4

     

    1. What is debugging?
    • The practice of improving code efficiency.
    • The practice of identifying and fixing errors in code.
    • The practice of improving code readability.
    • The practice of calling a function from multiple places in a larger program
    1. The purpose of the following code is to print the numbers from 0 to 9. Run this code, analyze its output, and then debug it. (If you want to undo your changes to the code, you can click the Reset button.)

    How can you fix the error?

    • Add a missing colon (:)
    • Remove the quotation marks around number
    • Change indentation
    • Spell a variable correctly
    1. The purpose of the following code is to iterate through a list and print a warning message if it finds “user3” in the list. Run this code, analyze its output, and debug it. (If you want to undo your changes to the code, you can click the Reset button.)

    How can you fix the error?

    • Change “user3” to “user2” in the conditional.
    • Change the indentation so that the line that prints the warning is not indented.
    • Change “user3” to “user1” in the conditional.
    • Change the != operator to the == operator in the conditional.

     

    You did not define a function before calling it. What type of error is this?

    • Logic error
    • Index out of bounds
    • Syntax error
    • Exception

     

    1. You did not assign a value to a variable before using it in a conditional. What type of error is this?
    • Index out of bounds
    • Logic error
    • Syntax error
    • Exception
    1. Why might you use print statements when debugging code?
    • To prevent errors from occurring
    • To identify which sections of the code are working properly
    • To create error messages
    • To add missing syntax to the code
    1. Which of these functions or arguments should you include in a with statement if you want Python to open a file called access.txt so that it can be read? Select three answers.
    • “r”
    • read()
    • open()
    • “access.txt”
    1. The logins variable is a string containing 20 device IDs. The device IDs are separated by spaces. In order to pass it into a function that checks the login count of each device, the string should be divided into a list of separate IDs. How do you convert this string into a list and store it in a device_ids variable?
    • device_ids = logins.split()
    • logins.split() as device_ids
    • device_ids = device_ids.split(logins)
    • device_ids = split(device_ids, logins)
    1. Fill in the blank: If you use the .split() method to convert a string into a list so that it can be read more easily, this would be an example of _____.
    • slicing
    • parsing
    • debugging
    • dividing
    1. After you’ve opened a log file as file, which line of code will help you read the file into a variable called text?
    • text.read(file)
    • text = file.read()
    • text = read(file, “r”)
    • text = read(file)
    1. You want to check for unusual login activity. Specifically, you want to read a log file that contains information on each login attempt, including whether it failed or was successful. You should then parse the data into a logins list, and then you should separate all failed log entries into a separate failed_logins list. If you want to automate this through Python, what would be part of your code? Select three answers.
    • An if statement to check if a login attempt failed
    • A for loop to iterate through all items in the logins list
    • A counter variable to keep track of the number of failed logins
    • A split() function to split the login information into a list

     

    Shuffle Q/A

     

    1. You included username_list[10] in your code, but username_list only contains five elements. What type of error is this?
    • Logic error
    • Exception
    • Name error
    • Syntax error
    1. If you know there is a logic error somewhere inside a function, how can you figure out the exact location?
    • Place print statements in and around the function
    • Move the function to another location
    • Delete the function from the program
    • Write comments in and around the function
    1. If you want to read a file called “logs.txt”, which line of code allows you to open this file for purposes of reading it and store it in a variable called file?
    • with open(“logs.txt”, file, “r”):
    • with file.open(“logs.txt”, “r”):
    • with open(“logs.txt”, “r”) as file:
    • with open(“logs.txt”) as file:
    1. You’ve read a log file into the variable file_text. The file_text variable contains a string of 50 usernames of employees at your company. In order to pass it into a function that checks the login count of each user, the string should be divided into a list of separate usernames. How do you convert this string into a list and store it in a variable usernames?
    • file_text.split() as usernames
    • usernames = usernames.split(file_text)
    • usernames = file_text.split()
    • usernames = split(usernames, file_text)
    1. What are the three types of errors you will encounter while debugging?
    • Logic errors, comment errors, and iterative errors
    • Exceptions, logic errors, iterative errors
    • Syntax errors, exceptions, and comment errors
    • Syntax errors, logic errors, and exceptions
    1. The purpose of the following code is to print the characters in a device ID. Run this code, analyze its output, and then debug it. (If you want to undo your changes to the code, you can click the Reset button.)

    What is the error related to?

    • A misspelled variable
    • A missing double equals sign (==)
    • A missing quotation mark (“)
    • A missing colon (:)
    1. When debugging code, what are effective ways to determine which sections of code are working properly? Select all that apply.
    • Add comments in the code
    • Use a debugger
    • Delete blank lines from the code
    • Add print statements
    1. What does the following code do?

    with open(“logs.txt”, “r”) as file:

    • It copies a file called “logs.txt” into a new file “r”.
    • It opens a file called “logs.txt” in write mode and stores it in a variable called file.
    • It copies a file called “r” into a new file “logs.txt”.
    • It opens a file called “logs.txt” in read mode and stores it in a variable called file.

     

    What does the following code do?

    logins = “pwashing jhill tshah”

    usernames = logins.split()

    • Removes the last username in the logins variable and stores the string in the usernames variable
    • Removes the blank spaces that split the usernames in the variable logins and stores the string in the variable usernames
    • Splits a string variable called logins into a list of strings and stores it in the variable usernames
    • Splits a string variable called logins into single characters

     

    1. What is parsing?
    • The process of reading data line by line
    • The process of copying data to other files
    • The process of writing data to a new file
    • The process of converting data into a more readable format
    1. What is the practice of identifying and fixing errors in code?
    • Parsing
    • Slicing
    • Debugging
    • Splitting
    1. The purpose of this code is to print “user flagged” if the username is “jhill”, and otherwise to print “user okay”. Run this code, analyze its output, and debug it. (If you want to undo your changes to the code, you can click the Reset button.)

    How can you fix this error?

    • Call check_user() before the function definition.
    • Remove indentation from the line that prints “user okay” so that it is not part of the conditional.
    • Use the != operator instead of the == operator in the conditional header.
    • Add an else statement before the line that prints “user okay”.
    1. You did not define a function before calling it. What type of error is this?
    • Index out of bounds
    • Syntax error
    • Logic error
    • Exception
    1. What does the following code do?

     

    read_text = text.read()

    • Reads the string text and stores it the file read_text
    • Splits the text variable, which contains a string, and stores it as a list in read_text
    • Reads the text variable, which contains a file, and stores it as a string in read_text
    • Replaces the contents of the file read_text with the contents of the file text
    1. You want to check for unusual login activity. Specifically, you want to check if there were more than three failed login attempts in the last 10 minutes by the last user who logged in. If you want to automate this through Python, what would be part of your code? Select three answers.
    • A for loop that iterates through the list of logins
    • A line of code that reassigns a counter variable to 0 if there is a failed login attempt
    • A counter variable that increments when a failed login is detected
    • An if statement that checks if there were more than three failed login attempts

     

    What does the following code do?

    new_format = old_format.read()

    • Reads the old_format variable, which contains a file, and stores it as a string in new_format
    • Inserts the string stored in the new_format variable into the file stored in the old_format variable
    • Detects certain text patterns in old_format
    • Prints the contents of old_format

     

    Course 8 – Put It to Work: Prepare for Cybersecurity Jobs

     

    Week 1

     

    1. What does a security mindset enable a security analyst to do when protecting their organization? Select two answers.
    • Evaluate risks and identify potential system breaches
    • Approve social media connections from security professionals
    • Recognize what they are defending
    • Evaluate employee retention
    1. Which type of asset would have the least impact on an organization if it were compromised?
    • Trade secrets
    • Intellectual property
    • Financial information
    • Guest Wi-Fi network
    1. How can security analysts cultivate a security mindset?
    • By researching the latest security vulnerabilities
    • By signing non-disclosure agreements (NDAs)
    • By protecting public data from being accessed and shared
    • By sharing sensitive information with those who request it
    1. Which of the following examples describes the use of a security mindset? Select two answers.
    • Exercising suspicion before opening email attachments
    • Reusing passwords for multiple accounts
    • Downloading email attachments from unknown senders
    • Reporting suspicious emails

     

    Test your knowledge: Your impact on data protection

     

    1. A security analyst notices that an employee has installed an app on their work device without getting permission from the help desk. The log indicates that potentially malicious code might have been executed on the host. Which of these security events should the security analyst escalate to a supervisor?
    • The employee installing an app without permission should be escalated.
    • Both events should be escalated.
    • Neither event should be escalated.
    • The log indicating malicious code might have been executed on the host should be escalated.
    1. Which are types of data and assets that stakeholders are most interested in protecting? Select two answers.
    • Company policies
    • Sensitive financial data
    • Social media presence
    • Customers’ usernames and passwords
    1. Fill in the blank: When a security event results in a data breach, it is categorized as a _____.
    • security incident
    • threat
    • vulnerability
    • asset
    1. Which of the following are examples of the potential impact of a security incident involving malicious code?
    • Loss of assets
    • Operational downtime
    • Financial consequences
    • Data protection

     

    Weekly challenge 1

     

    1. Fill in the blank: A security mindset is the _____.
    • ability to help an organization’s human resources (HR) department remain compliant at all times
    • intent to provide quality security services to an organization’s development operations team
    • opportunity to showcase your Linux and other coding related technical skills
    • ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data
    1. As a security analyst, you are responsible for protecting an organization’s low-level assets and high-level assets. Which of the following is considered a high-level asset?
    • Company job descriptions
    • Public press releases
    • Intellectual property
    • Guest Wi-Fi network
    1. Fill in the blank: A security mindset helps a security analyst _____.
    • defend against constant pressure from cyber attackers
    • recognize the difference between physical security and cybersecurity
    • apply for an engineering role
    • reinforce the expectations of security stakeholders
    1. Which of the following are examples of private data? Select two answers.
    • Government trade agreements
    • Customer bank account information
    • Employee identification numbers
    • Employee email addresses
    1. What term is used to describe individuals of an organization who are interested in protecting sensitive financial data, customers’ usernames and passwords, and third-party vendor security?
    • Executive security administrators
    • Data managers
    • Information protection advisors
    • Stakeholders
    1. Fill in the blank: The decisions a security analyst makes can affect the organization that the analyst works for and other team members across the organization. These decisions also affect ______.
    • the analyst’s chance for a promotion
    • the financial markets
    • competitors in the industry
    • the customers of the organization that hired the analyst
    1. What are some ways that security analysts protect data? Select three answers.
    • Understanding the organization’s assets
    • Reporting small events
    • Ignoring small events
    • Paying attention to detail
    1. Fill in the blank: When a security event results in a data breach, it is categorized as a _____.
    • vulnerability
    • security event
    • security incident
    • threat
    1. Fill in the blank: An organization is responsible for protecting its customers’ sensitive data. Examples of the kinds of sensitive data that must be protected include ____ and _____. Select two answers.
    • social security numbers
    • bank statements
    • private social media pages
    • website URLs
    1. Which of the following can cause a company to experience loss of credibility, financial loss, or regulatory fines?
    • A cybersecurity awareness month phishing program
    • The resignation of the company’s social media manager
    • Employee security awareness training
    • A data breach

     

    Shuffle Q/A

     

    1. Which concept focuses on understanding how to evaluate risk and identify the potential for a breach of a system, application, or data?
    • Security analyst evaluation
    • Security recognition
    • Security mindset
    • Python knowledge
    1. As a security analyst, you are responsible for protecting an organization’s low-level assets and high-importance assets. Which of the following is considered a low-level asset?
    • Company trade secrets
    • Guest Wi-Fi network
    • Customer email addresses
    • Intellectual property
    1. Which of the following assets can be protected by adopting a security mindset? Select three answers.
    • Sensitive customer data
    • Financial information
    • Intellectual property
    • Network equipment
    1. An employee at a healthcare company accesses a patient’s medical history and payment information to provide treatment. Which type of data is this classified as?
    • Sensitive data
    • Confidential data
    • Private data
    • Public data
    1. Fill in the blank: _____ are interested in protecting sensitive financial data, customers’ usernames and passwords, and third-party vendor security.
    • Stakeholders
    • Social media influencers
    • Web programmers
    • HIPAA compliance officers
    1. What are some examples of the customer data that security analysts protect? Select two answers.
    • Product announcements
    • Passwords
    • Newsletters
    • Credit card numbers
    1. Fill in the blank: _____ must be protected at all times. An organization can lose its credibility with its customers if it is not properly protected.
    • Employee salaries
    • An organization’s social media page
    • Sensitive customer data
    • An organization’s termination policy
    1. Which of the following are the best examples of possible consequences of a data breach? Select two answers.
    • Improved hardware functionality
    • Significant reduction in employee retention
    • Loss of credibility
    • Regulatory fines
    1. Which of the following examples are considered public data? Select two answers.
    • Health insurance information
    • Product announcements
    • Press releases
    • Passport numbers
    1. Fill in the blank: One of the most important concerns for most organizations is the protection of _____.
    • customer data
    • guest Wi-Fi
    • social media
    • job postings
    1. A security analyst notices that an employee has installed an app on their work computer without getting permission from the IT service desk. The security analyst also notices that antivirus software recorded a potentially malicious execution on the same computer. Which of these security events should the security analyst escalate to their supervisor?
    • Both events should be escalated.
    • Neither event should be escalated.
    • The employee installing an app without permission should be escalated.
    • The potentially malicious code detected by the antivirus software should be escalated.
    1. Which of the following is an essential way to maintain a security mindset?
    • Evaluate risks
    • Seek engineering mentors
    • Escalate major security issues within one week
    • Work various security jobs with different organizations
    1. Fill in the blank: Entry-level analysts can help protect low-level assets, such as an organization’s _____.
    • guest Wi-Fi network
    • financial information
    • trade secrets
    • company job descriptions
    1. Which of the following statements best describes the relationship between a security mindset and asset protection?
    • A security mindset helps analysts protect low-level assets.
    • A security mindset is not important for protecting assets.
    • A security mindset helps analysts protect high-importance assets.
    • A security mindset helps analysts protect all levels of assets.
    1. Who will be affected by the decisions you make as a security analyst? Select two answers.
    • The financial markets
    • The customers of the organization that hired you
    • Competitors in the same industry
    • The organization that hired you

     

    Fill in the blank: A security analyst should _____ escalate potential security events.

      • never
      • rarely
      • sometimes
    • always

    What is the correct term for a security event that results in a data breach?

      • Compromised data
      • Data security event
    • Security incident
    • Phishing incident

     

    Which of the following are examples of sensitive customer data that most organizations prioritize? Select two answers.

      • Social media profiles
    • Credit card numbers
    • Usernames and passwords
    • Job postings

     

    Week 2

     

    1. Fill in the blank: A malware infection is an incident type that occurs when _____.
    • a website experiences high traffic volumes
    • malicious software designed to disrupt a system infiltrates an organization’s computers or network
    • a computer’s speed and performance improves
    • an employee of an organization violates the organization’s acceptable use policies
    1. Fill in the blank: Improper usage is an incident type that occurs when _____.
    • an individual gains digital or physical access to a system or application without permission
    • malicious software designed to disrupt a system infiltrates an organization’s computers or network.
    • an employee of an organization violates the organization’s acceptable use policies
    • an employee that runs an organization’s public relations posts incorrect data on the company’s social media page
    1. When should you escalate improper usage to a supervisor?
    • Improper usage incidents should always be escalated out of caution.
    • Improper usage incidents should be escalated if there is a high level of improper usage.
    • Improper usage attempts that affect high-priority assets should be escalated; other improper usage instances are not as important.
    • Improper usage does not need to be escalated because these are in-house scenarios that can be handled without reporting them to the security team.
    1. Fill in the blank: Unauthorized access is an incident type that occurs when _____.
    • an individual gains digital or physical access to a system, data, or an application without permission
    • an individual gains digital or physical access to a system, data, or an application without permission
    • malicious software designed to disrupt a system infiltrates an organization’s computers or network
    • an employee of an organization violates the organization’s acceptable use policies

     

    Test your knowledge: Timing is everything

     

    1. All security incidents should be escalated.
    • True
    • False
    1. Which incident can have the most impact on an organization?
    • An employee forgets their login credentials
    • A user’s social media password is leaked
    • A manufacturing plant’s network is compromised
    • An organization’s guest Wi-Fi network is down
    1. Fill in the blank: A(n) _____ is a set of actions that outlines who should be notified when an incident alert occurs and how that incident should be handled.
    • playbook
    • event
    • security incident
    • escalation policy
    1. Which incident classification type occurs when an employee violates an organization’s acceptable use policy?
    • Improper usage
    • Malware infection
    • Unauthorized access
    • Containment

     

    Weekly challenge 2

     

    1. What security term describes the identification of a potential security event, triaging it, and handing it off to a more experienced team member?
    • Incident escalation
    • SOC operations
    • Social engineering
    • Data security protection
    1. Which skills will help you identify security incidents that need to be escalated? Select two answers.
    • Excellent communication skills
    • Ability to collaborate well with others
    • Attention to detail
    • Ability to follow an organization’s escalation guidelines or processes
    1. Fill in the blank: Entry-level analysts might need to escalate various incident types, including _____.
    • noncompliance of tax laws
    • mismanagement of funds
    • improper usage
    • missing software
    1. Improper usage can be intentional; other times it can be accidental. How should you decide which acts of improper usage should be escalated to a supervisor?
    • Improper usage incidents should always be escalated as a precaution.
    • Improper usage should never be escalated to a supervisor.
    • Only intentional acts of improper usage should be escalated.
    • Improper usage attempts that affect high-priority assets should be escalated; other improper usage instances are not as important.
    1. You are alerted that a hacker has gained unauthorized access to one of your organization’s manufacturing applications. At the same time, an employee’s account has been flagged for multiple failed login attempts. Which incident should be escalated first?
    • Both security incidents should be escalated at the same time.
    • The incident involving the employee who is unable to log in to their account should be escalated first.
    • The incident involving the malicious actor who has gained unauthorized access to the manufacturing application should be escalated first.
    • The best thing to do is escalate the incident that your supervisor advised you to escalate first.
    1. What is the best way to determine the urgency of a security incident?
    • Contact the risk assessment team to determine urgency.
    • Reach out to the organization’s Red Team supervisor to determine urgency.
    • Identify the importance of the assets affected by the security incident.
    • Email the Chief Information Security Officer (CISO) of the company for clarification.
    1. Fill in the blank: An escalation policy is a set of actions that outlines _____.
    • how to manage the security stakeholders of an organization
    • how to escalate customer service complaints
    • how to defend an organization’s data and assets
    • how to handle a security incident alert
    1. Fill in the blank: _____ is important when following a company’s escalation policy to ensure you follow the policy correctly.
    • Attention to detail
    • Delegating tasks
    • Reading quickly
    • Working remotely
    1. Fill in the blank: An entry-level analyst helps the security team make sure the _____ person on the team is alerted when incidents occur.
    • technical
    • available
    • correct
    • most senior-level
    1. Which of the following security incidents is likely to have the most negative impact on an organization?
    • An employee sends an email to the wrong colleague
    • Unauthorized access to a manufacturing application
    • An employee’s account flagged for multiple login attempts
    • An employee having a phone conversation about a work project in the breakroom

     

    Shuffle Q/A

     

    1. Fill in the blank: _____ is a skill that will help you identify security incidents that need to be escalated.
    • Graphics design
    • Attention to detail
    • Leadership
    • Linux operations
    1. As a security analyst, you might be asked to escalate various incidents. Which of the following are common incident classification types? Select two answers.
    • Malware infection
    • SPAM
    • Gift card scam
    • Unauthorized access
    1. An employee attempting to access software on their work device for personal use can be an example of what security incident type?
    • Unauthorized access
    • Improper usage
    • Malware infection
    • Social engineering
    1. What is a potential negative consequence of not properly escalating a small security incident? Select two answers.
    • The company can suffer a loss in reputation.
    • The company’s antivirus software can be uninstalled.
    • The company’s employee retention percentage can decrease drastically.
    • The company can suffer a financial loss.
    1. You have recently been hired as a security analyst for an organization. You previously worked at another company doing security, and you were very familiar with their escalation policy. Why would it be important for you to learn your new company’s escalation policy?
    • Every company has a different escalation policy, and it is an analyst’s job to ensure incidents are handled correctly.
    • The policy will help you analyze data logs.
    • The policy will advise you on who to report to each day.
    • The escalation policy will help you with vulnerability scanning.
    1. Fill in the blank: An _____ will help an entry-level analyst to know when and how to escalate a security incident.
    • executive security dashboard
    • escalation policy
    • employee security handbook
    • blue team CIRT guideline
    1. Fill in the blank: Incident escalation is the process of _____.
    • reporting a security incident to a human resource department for compliance purposes
    • properly assessing security events
    • creating a visual dashboard that shows security stakeholders the amount of security incidents taking place
    • identifying a potential security incident , triaging it, and handing it off to a more experienced team member
    1. What does attention to detail and following an organization’s security event notification process help you with?
    • Vulnerability scanning
    • Incident escalation
    • Security data forensics
    • Log monitoring
    1. What elements of security do terms like unauthorized access, malware infections, and improper usage describe?
    • Public press releases
    • Phishing attempts
    • Company job descriptions
    • Incident classification types
    1. Which of the following security incidents can have the most damaging impact to an organization?
    • A system containing customer PII is compromised
    • A company’s social media account is compromised
    • The guest Wi-Fi network for a company is hacked
    • An employee forgets their password and logs too many failed login attempts
    1. A security analyst for an organization notices unusual log activity in an app that was recently banned from the organization. However, the analyst forgets to escalate this activity to the proper personnel. What potential impact can this small incident have on the organization?
    • Small incidents rarely have any impact on an organization.
    • The organization might need to delete its social media profile.
    • It can become a bigger threat.
    • The third-party assessment team might be removed by the organization.
    1. What security term is defined as a set of actions that outlines who should be notified when an incident alert occurs?
    • A security risk assessor
    • An escalation policy
    • A network architecture alert
    • A vulnerability scan system
    1. Why is it important for analysts to follow a company’s escalation policy? Select two answers.
    • An escalation policy can help analysts determine the best way to cross-collaborate with other members of their organization.
    • An escalation policy instructs analysts on the right person to contact during an incident.
    • An escalation policy can help analysts determine which tools to use to solve an issue.
    • An escalation policy can help analysts prioritize which security events need to be escalated with more or less urgency.
    1. A new security analyst has just been hired to an organization and is advised to read through the company’s escalation policy. What kind of information will the analyst be educated on when reading through this policy?
    • They will learn when and how to escalate security incidents.
    • They will learn the best way to communicate with stakeholders.
    • They will learn how to use the Linux operating system.
    • They will learn the best way to create visual dashboards to communicate with executives.
    1. Unauthorized access to a system with PII is _____ critical than an employee’s account being flagged for multiple failed login attempts.
    • marginally
    • more
    • equally
    • less
    1. How can an escalation policy help security analysts do their jobs?
    • An escalation policy outlines who should be notified when an incident occurs.
    • An escalation policy outlines when to alert the public of a data breach.
    • An escalation policy educates analysts on how to be aware of phishing attempts.
    • An escalation policy instructs the analysts on how to scan for vulnerabilities.

     

    Which of the following is an essential part of incident escalation?

    • Communicate a potential security incident to a more experienced team member
    • Make reactive decisions
    • Maintain data logs that detail previous security events
    • Create a visual dashboard that details a solution to the security problem

     

    Which incident type involves an employee violating an organization’s acceptable use policy?

      • Malware infection
    • Improper usage
    • Phishing
    • Unauthorized access

     

    Week 3

     

    1. Which of the following should a security analyst do before communicating the results of a vulnerability test to stakeholders? Select three answers.
    • Use visual aids
    • Choose an appropriate communications medium
    • Use highly technical details
    • Consider the nature of the information that is being communicated
    1. If a stakeholder fails to respond to an email in a timely manner, which communication steps are the next best options? Select two answers.
    • Send an instant message
    • Complain to human resources (HR)
    • Make a phone call
    • Report to the organization’s Chief Information Security Officer (CISO)
    1. Fill in the blank: The use of _____ to tell a security story can help security analysts communicate impactful data and metrics.
    • visuals
    • cross-site scripting
    • direct phone calls
    • instant messages
    1. Which software programs can be used as tools for sharing and telling a visual story about data? Select all that apply.
    • Apache OpenOffice
    • Google Docs
    • Google Sheets
    • Linux

     

    Weekly challenge 3

     

    1. What term is used to define an individual or a group that has an interest in the decisions or activities of an organization?
    • Audit specialist
    • Incident response manager
    • Decision-making manager
    • Stakeholder
    1. Fill in the blank: The _____ is an example of a security stakeholder who is most interested in protecting the data and assets of an organization.
    • social media manager
    • accounts receivable specialist
    • in-house graphic designer
    • operations manager
    1. A security operations manager often works directly with a security analyst as the first line of defense to protect an organization from what challenges? Select two answers.
    • A lack of an employee consortium
    • The use of social media on work devices
    • Vulnerabilities
    • Risks
    1. Fill in the blank: Information that is communicated to ____ is considered sensitive.
      • the general public
      • stakeholders
    • an organization’s competitors
    • employees regarding social events
    1. Which of the following guidelines can help security analysts improve stakeholder communications? Select two answers.
    • Use technical security terms as much as possible
    • Include as many topics as possible
    • Be precise
    • Avoid unnecessary technical terms
    1. Which of the following is an example of a security event that should be communicated to a stakeholder?
    • Incorrect office hours posted on social media
    • A tax audit
    • Malicious code detected in logs
    • The resignation of a human resources employee
    1. Fill in the blank: Visual communications to stakeholders can be used to convey key details in the form of ____.
    • text messages and charts
    • text-filled documents and graphs
    • logs and alerts
    • graphs and charts
    1. Why is it important for analysts to use visuals to tell a security story?
    • Visuals can help an analyst communicate impactful metrics and data.
    • Visuals can help an analyst identify which details are most important for different stakeholders.
    • Visuals can help an analyst prioritize which incidents need to be escalated with more or less urgency.
    • Visuals can help an analyst determine which tool to use to solve a security challenge.
    1. Fill in the blank: For security purposes, it is important to communicate sensitive information with _____.
    • supervision
    • care
    • graphs and charts
    • a low level of urgency
    1. Stakeholders have many responsibilities, so they might miss an email or fail to respond promptly. If an analyst needs to reach a stakeholder right away, what might be a better option for stakeholder communication?
    • A follow-up investigation
    • A phone call
    • An email to the CISO
    • A follow-up email to the stakeholder’s supervisor

     

    Shuffle Q/A

    1. Which of the following are stakeholders interested in having knowledge of? Select two answers.
    • The online reviews for their organization
    • Social media reviews for their competitor’s organization
    • The decisions of their organization’s leadership
    • The activities of their organization
    1. Which security stakeholder helps recognize risks and manage the response to security incidents?
    • Risk manager
    • Chief Information Security Officer (CISO)
    • Operations manager
    • Chief Financial Security Officer (CFO)
    1. Handling the daily maintenance of security operations is the general responsibility for which security stakeholder?
    • Operations manager
    • Chief Information Security Officer (CISO)
    • Chief Financial Security Officer (CFO)
    • Entry-level security analyst
    1. An analyst sends an email to stakeholders about a recent security breach. While writing the email, the analyst is mindful about what they say and which stakeholders they communicate the information to. Why does the analyst take this approach?
    • Information that is communicated to stakeholders is sensitive.
    • Information can be sent to stakeholders instead of managers.
    • Information about a security breach might improve the company’s reputation.
    • Information sent via email can be considered public knowledge.
    1. Fill in the blank: Communications with stakeholders should always be precise, avoid unnecessary technical terms, and _____.
    • include numerous security questions
    • tell an elaborate story to ensure your point is made
    • have various purposes to maximize time
    • have a clear purpose
    1. Graphs and charts can be used to create which form of stakeholder report?
    • Text-filled documents
    • Text messages
    • Phone calls
    • Visual communications
    1. Fill in the blank: In the field of security, it is important to communicate _____ with care.
    • sensitive information
    • publicly available information
    • nonsensitive information
    • time off requests
    1. What is the best way to follow-up with a stakeholder who has not immediately responded to your email? Select two answers.
    • File a complaint with human resources
    • Call them on the phone
    • Report the issue to your supervisor
    • Send them an instant message
    1. Which of the following statements best describes the information that is communicated to stakeholders?
    • It is sensitive.
    • It is proprietary.
    • It is shareable to the entire organization.
    • It is publicly available.
    1. Which of the following options is the best way to handle the detection of malicious code in logs?
    • Handle the incident using your Linux knowledge
    • Report the incident directly to the CISO
    • Communicate the incident to a security stakeholder
    • Wait until a more experienced team member notices it
    1. Fill in the blank: Creating ____ communications allows a security stakeholder to view representations of what is being explained using graphs and charts.
    • audio
    • visual
    • complex
    • simple
    1. You have recently been hired as a security analyst for an organization. You’ve been asked by a security stakeholder to provide information on how often the employees from various departments are clicking on simulated phishing emails. What action can you take to best communicate this information?
    • Use visuals, such as charts and graphs, to tell the security story
    • Send an email that explains the necessary information
    • Call the stakeholder and directly update them
    • Ask your supervisor to report your findings because you are new
    1. Fill in the blank: If a stakeholder fails to respond to an important message you sent them right away, the best approach to reach them is to follow-up with _____.
    • an email to the CISO
    • a phone call or an instant message
    • an email to your immediate supervisor
    • a text message to the stakeholder’s manager

     

    What is a stakeholder?

      • The security professionals who manage the SOC operations for an organization
    • An individual or a group that has an interest in any decision or activity of an organization
    • An individual or a group that manages the public relations crisis for an organization
    • A customer who depends on an organization to protect their sensitive financial and medical data

     

    Which individuals are considered security stakeholders? Select three answers.

    • Risk managers
    • Chief Information Security Officers (CISOs)
      • Help desk analysts
    • Operations Managers

    You are alerted that a malicious actor has gained unauthorized access to one of your organization’s manufacturing applications. You need to inform the operations manager as soon as possible. What is the best way to communicate this information?

    • Clearly and concisely
    • With a corporate-wide email
    • With a dashboard visualization
    • With a phone call

    An analyst finishes an incident review. Next, they want to clearly communicate meaningful data from their findings. What action can they take to share this information?

    • Use visuals to tell a security story
    • Collaborate with the publicity team to develop a communication strategy
    • Request that the Chief Technology Officer (CTO) sends a summary email
    • Ask stakeholders to report their findings

     

    Week 4

     

    1. Which of the following methods can be used to build your cybersecurity network? Select three answers.
    • Join cybersecurity associations.
    • Attend cybersecurity conferences.
    • Connect with security professionals using social media.
    • Research the latest threats and vulnerabilities.
    1. Fill in the blank: A security professional can sign up for _____ to keep up with key trends and topics in the industry.
    • Linux training courses
    • healthcare magazines
    • engineering mailing lists
    • security mailing lists
    1. Which of the following strategies can an aspiring security analyst use to connect with security professionals? Select two answers.
    • Subscribe to security mailing lists.
    • Leverage professional social media sites such as LinkedIn®.
    • Create a newsletter.
    • Join security associations.
    1. How can engaging with the security community help newcomers establish a security career? Select two answers.
    • By connecting with other security professionals
    • By focusing on improving technical skills
    • By engaging in unethical security activities
    • By staying informed about the latest security news

     

    Weekly challenge 4

     

    1. You are being interviewed for a cybersecurity analyst role with a mid-level organization. During the interview, the hiring manager asks you what resources you believe are most valuable for staying up-to-date on the most critical security risks to web applications. Which of the following resources would you suggest?
    • Risk Management for Security Geeks
    • CSO Online
    • OWASP
    • Krebs Explains Security
    1. Fill in the blank: ____ is a security website that covers security news and investigations into cyber attacks.
    • Security Investigation by Krebs
    • The Washington Post Security Guide
    • Krebs on Security
    • Security from Kreb’s Point of View
    1. Which site do many CISOs in the security industry review for security tips and ideas?
    • The Security CISO Online
    • The CSO Security Expert Digest
    • CSO Online
    • CSO Tips for Beginners
    1. Which security resource provides information on analytics and application security, mobile and cloud security, and the Internet of Things (IoT)?
    • Krebs Knows Security
    • Krebs on Security
    • CSO Online
    • Dark Reading
    1. Fill in the blank: _____ is a great way to connect to other security professionals in the industry.
    • Knocking door-to-door
    • Asking friends and family members who are not in the security industry for introductions
    • Staying away from social media
    • Networking on social media
    1. Fill in the blank: _____ is a great way to connect with security professionals on social media.
    • Responding to unfamiliar messages
    • Attempting to hack a security team member and resolving that hack in a timely fashion
    • Reading and commenting on the social media posts of leaders in the security industry
    • Reading CISO posts on social media
    1. Fill in the blank: _____ for the name of the CISO of an organization is a good first step to finding a CISO to follow on social media.
    • Asking social media friends
    • Asking friends or family members
    • Checking an organization’s blog
    • Conducting an internet search
    1. What is a good way to find other security analysts in the industry to follow on social media?
    • Search for security engineers on LinkedIn®
    • Cold call various security teams until someone agrees to connect with you on social media
    • Put out a social media post that asks all security analysts to follow you
    • Search for cybersecurity analysts on LinkedIn®
    1. Fill in the blank: For individuals who are not active on social media, _____ is another great way to connect with security professionals.
    • taking a class on how to foster a collaborative team environment
    • joining different security associations
    • joining exclusive CFO seminars
    • taking a social media training course
    1. Fill in the blank: When determining a security association to join, it’s important to _____.
    • select one that is geared towards advanced security professionals
    • select one that aligns with your professional goals
    • ask the CISO of the most recent organization you applied to for suggestions
    • join one that is closest to where you live, so you’re able to attend in person

     

    Shuffle Q/A

     

    1. Which well-known security website was created by former Washington Post reporter, Brian Krebs?
    • Security from Kreb’s Point of View
    • Brian Knows Security
    • The Washington Post Security Guide
    • Krebs on Security
    1. Fill in the blank: _____ provides news, analysis, and research on various security and risk management topics.
    • Risk Management for Security Geeks
    • Krebs Explains Security
    • Who Knows Security?
    • CSO Online
    1. Fill in the blank: Although many security websites and blogs provide different relevant security tips, _____ specifically provides information on analytics and application security, mobile and cloud security, and the Internet of Things (IoT).
    • Dark Reading
    • CSO Online
    • Krebs on Security
    • Kreb’s Cloud Security Blog
    1. You’ve recently completed the Google Cybersecurity Certificate and decide it’s time to connect with other security professionals. Which of the following is a great way to connect with security professionals?
    • Searching for them on social media
    • Asking friends and family members who are not in the security industry to connect you with people they know
    • Staying away from social media
    • Calling different organizations and asking to speak with their security teams
    1. You’ve recently completed the Google Cybersecurity Certificate and decide it’s time to connect with other security professionals. Which of the following is a great way to connect with security professionals on social media? Select two answers.
    • Follow leaders in the security industry
    • Respond to messages of people on social media that you’re unfamiliar with, as long as their profile says they’re in the security industry
    • Read and comment on the social media posts of leaders in the security industry
    • Send messages to a security supervisor until they agree to be your mentor
    1. Fill in the blank: The first step to finding a CISO to follow on social media is to conduct a(n) _____ for the name of the CISO of an organization.
    • cross-reference check
    • background check
    • external security audit
    • internet search
    1. What is a great way to connect with security professionals or find mentors in the security industry without using social media?
    • Search for CISOs on LinkedIn®
    • Do an internet search for entry-level security analysts in your area
    • Join different security associations
    • Attend a social media training seminar
    1. Which security website covers security news and investigations into cyber attacks?
    • Online CISO
    • Kreb’s Security Perspective
    • Security Investigation by Krebs
    • Krebs on Security
    1. Which of the following is a good first step to finding a CISO to follow on social media?
    • Ask friends in the e-commerce industry about which CISOs to follow
    • Conduct a background check on CISOs in your area
    • Send multiple messages to a company on their social media page and ask how to contact their CISO directly
    • Conduct an internet search for the name of the CISO of an organization
    1. On social networks like LinkedIn®, you can find security professionals by searching for “cybersecurity analysts” or a similar search term. After this search, what is the best way to filter through those search results?
    • Filter for people who talk about # (hashtag) cybersecurity
    • Filter for people who talk about # (hashtag) product engineering
    • Filter for people who talk about # (hashtag) Python
    • Filter for people who talk about # (hashtag) social media
    1. Fill in the blank: _____ is a great way to connect with security professionals without using social media.
    • Cold calling security teams from different companies
    • Doing an internet search for entry-level security analysts in your area
    • Joining different security associations
    • Contacting a CISO directly via email
    1. Fill in the blank: Selecting a security association that _____ will help ensure you find the one that best fits your needs.
    • is within a five-mile radius of your home
    • has excellent online reviews
    • aligns with your professional goals
    • is dedicated to senior-level analysts
    1. Fill in the blank: The OWASP is a standard awareness document that lists the top _____most critical security risks to web applications.
    • 10
    • 50
    • 5
    • 20
    1. What is the best search term to use to find a security organization to join?
    • “Incident response teams”
    • “Industry associations”
    • “Top CISOs in my area”
    • “Cybersecurity industry associations”

     

    Fill in the blank: The _____ is a standard awareness document that lists the top 10 most critical security risks to web applications.

    • Programming for Security Protection
    • Wall Street Journal
    • OWASP
    • Red Teaming Blog

    Fill in the blank: _____ is an online security resource that provides information on analytics and application security, mobile and cloud security, and the Internet of Things (IoT). 

    • Krebs Knows Security
    • CSO Online
    • Krebs on Security
    • Dark Reading

     

    Which of the following is a good way to use social media to connect with security professionals? Select two answers.

      • Send messages to a security supervisor until they agree to be your mentor
    • Read and comment on social media posts of leaders in the security industry
    • Follow leaders in the security industry on social media
    • Respond to messages of people on social media that you’re unfamiliar with, as long as their profile says they’re in the security industry

     

    Week 5

     

    1. Which of the following strategies are effective ways to prepare for a job interview? Select three answers.
    • Review the job description
    • Practice describing your skills and experiences
    • Call the chief information security officer
    • Review your resume
    1. Which of the following actions should you take before a video interview to prevent technical difficulties during the interview? Select two answers.
    • Install the required video conference application
    • Conduct pre-interview research
    • Test video and audio settings
    • Adjust the lighting
    1. Fill in the blank: Establishing _____ with the interviewer is an important step to take and can help you leave a positive impression with the interviewer.
    • a conversational tone
    • data types
    • roadblocks
    • a rapport
    1. Which of the following post-interview practices is an effective way to stand out as a candidate?
    • Apply to the position again
    • Ask the interviewer how other candidates did during their interviews
    • Send a gift to the interviewer
    • Send a follow-up email to the interviewer

     

    Test your knowledge: Develop an elevator pitch

    1. Fill in the blank: Elevator pitches enable you to summarize your experience, skills, and background to potential employers in about ____.
    • 10 minutes
    • Five minutes
    • 60 seconds
    • 2 minutes
    1. What are effective strategies to use when sharing your elevator pitch? Select two answers.
    • Be succinct.
    • Mention mistakes you made at previous jobs.
    • Describe the technical skills that you plan to learn.
    • Speak at a relaxed pace.
    1. In which of the following scenarios would it be appropriate to share your elevator pitch? Select two answers.
    • At the end of a job interview
    • When meeting new friends or colleagues
    • When introducing yourself to career and business connections
    • After you receive a job offer
    1. What is a best practice when sharing your elevator pitch with a potential employer?
    • Speak in a conversational tone
    • Speak quickly
    • Use a lot of technical terms
    • Disclose why you left your previous job

     

    Weekly challenge 5

     

    1. What are examples of skills that are transferable to a cybersecurity role? Select three answers.
    • Written and verbal communication skills
    • Attention to detail
    • Collaboration skills
    • Social media skills
    1. Which personal details should be included at the top of your resume? Select three answers.
    • Your professional title
    • Your summary statement
    • Your name
    • Your education
    1. What can the skills section of your resume include? Select two answers.
    • Programming skills
    • A history of previous work experiences
    • Your email address
    • Security frameworks
    1. Which of the following statements is suitable to include in the work experience section of a resume? Select two answers.
    • Tasked with handling security challenges
    • Collaborated with a team of six to develop training for more than 25 company employees
    • Security tasks were handled
    • Conducted monthly vulnerability assessments
    1. Which of the following sections should be included at the bottom of your resume?
    • Contact information
    • Skill competencies
    • Work experience
    • Education/Certifications
    1. Fill in the blank: It is important to make sure there are no _____ errors in your resume before sending it to potential employers.
    • technical
    • location-based
    • cybersecurity
    • grammatical
    1. Fill in the blank: _____ is a good way to begin preparing for a job interview.
    • Reviewing the job description
    • Dressing in casual clothing
    • Memorizing your resume
    • Checking the company’s stock price
    1. Fill in the blank: Testing your video and audio settings before a video conference interview will help you correct any _____ before the interview.
    • nervousness
    • technical issues
    • Linux programming issues
    • confusion about interview questions
    1. Which term describes a friendly relationship in which the people involved understand each other’s ideas and communicate well with each other?
    • Phishing
    • Social networking
    • Rapport
    • Social engineering
    1. A potential candidate is interviewing for a security analyst role. The candidate says the following when responding to a scenario-based question: “The outcome led to an increase in total sales over the two months that my manager was out of the office.” Which part of the STAR method does this response demonstrate?
    • Result
    • Situation
    • Action
    • Task

     

    Shuffle Q/A

     

    1. Fill in the blank: A resume might also be referred to as a _____.
    • standard framework
    • curriculum vitae
    • professional reference
    • cover letter
    1. Which details should your resume’s summary statement include? Select two answers.
    • Your professional references’ names and email addresses
    • Specific words from the responsibilities section of the job description
    • Your professional title
    • Your strengths and relevant skills
    1. Fill in the blank: The _____ section of your resume should list capabilities that are related to the position you are applying to.
    • technical programming
    • summary statement
    • skills
    • professional references
    1. Fill in the blank: In the experience section of your resume, you should list your _____.
    • contact information
    • professional references
    • work history
    • Linux programming skills
    1. You are currently working on completing a certificate program and will complete the program soon. How should you indicate that in the certification/education section of your resume?
    • ”Completed”
    • “Partially fulfilled”
    • “In progress”
    • “Incomplete”
    1. What are effective ways to prepare for your job interview? Select three answers.
    • Practice speaking about the experiences and skills that the employer is looking for
    • Review the job description
    • Review your notes on the NIST Framework to refresh your memory
    • Research the company’s former Chief Financial Officer (CFO)
    1. Why is building rapport important in the job interview process? Select two answers.
    • It can distract the interviewer
    • It can reduce your chances of getting hired
    • It can help ease nervousness during the interview
    • It can help enhance the communication between you and the interviewer
    1. A potential candidate is interviewing for a security analyst role. The candidate says the following when responding to a scenario-based question: “It was up to me to manage the product sales for the next two months while the department manager was away from the company.” Which part of the STAR method does this response demonstrate?
    • Task
    • Situation
    • Result
    • Action
    1. Fill in the blank: After the name and summary section, the next part of your resume is the _____.
    • cybersecurity experience section
    • responsibilities section
    • professional references section
    • skills section
    1. Fill in the blank: Under the education/certification section of your resume, you should list any subjects you studied related to _______.
    • social engineering
    • Python
    • the job you are applying for
    • previous work experiences
    1. Before finalizing your resume, which of the following best practices should you follow? Select two answers.
    • Ensure your resume is a maximum of 2 pages long
    • Ensure your resume is a minimum of 3 pages long
    • Check that your resume uses at least 2 font colors
    • Check for spelling and grammatical errors
    1. Which steps are essential when preparing for a video interview? Select two answers.
    • Test your video and audio settings
    • Build a rapport with the interviewer
    • Write a cover letter
    • Find a quiet location in your home
    1. Fill in the blank: Resumes typically list your last _____ years of work experience.
    • three
    • five
    • 20
    • 10
    1. When do you begin to build rapport with your potential employer?
    • On your first day of employment
    • During the second round of interviews
    • During your first interaction by phone, email, or video conference
    • During the technical interview

     

    Fill in the blank: To calm your nerves before the interview begins, _____ and remind yourself about the preparation you have put in.

    • review Linux commands
    • take a few deep breaths
    • call your professional references
    • review other job postings

     

    A hiring manager recently reached out to you for a video interview. You have never used the software required for you to join the interview. What should you do to prepare?

    • Request an in-person interview instead
    • Download the software specified by the interviewer in advance
    • Inform the interviewer that you do not know how to use this particular software
    • Download the video conference software that you are familiar with instead

     

     

    Google Cybersecurity Professional Certificate Answers

     

     

    Related Google Career Certificates:

     

    • Google Cybersecurity Professional Certificate Answers
    • Google Data Analytics Professional Certificate Answers
    • Google Digital Marketing & E-commerce Professional Certificate Answers
    • Google IT Support Professional Certificate Answers
    • Google Project Management Professional Certificate Answers
    • Google UX Design Professional Certificate Answers

     

     

    Filed Under: Certifications

    Google Cloud SecOps Technical Credential Answers

    29 November, 2024 Por Vicen Martínez Arias

    Google Cloud SecOps Technical Credential Answers

    Google Cloud SecOps Technical Credential Answers

    This assessment will test your knowledge of the SecOps (Chronical and Mandiant) products. You must achieve a score of 80% or higher to receive the technical credential.

    All answers to pass this certification are only in our .PDF file, you can buy and download here:

    Google Cloud SecOps Technical Credential Answers

     

    Questions:

     

    Identify the Security Operations Center (SOC) Practitioner Personas that are most likely to be using Security Information and Event Management (SIEM) on a regular basis.

    Select two that apply, and then click Submit.

    • Security Analyst
    • Security Engineer
    • Software Developer
    • Malware Researcher

     

    Identify the three features referred to as “table stakes” for Security Information and Event Management (SIEM).

    Select one that applies, and then click Submit.

    • Detection, Application Monitoring, and User and Entity Behavior Analytics (UEBA)
    • Search, Application Monitoring, and Statistical Normalization
    • Search, Detection, and Visualization
    • Visualization, Vulnerability Management, and User and Entity Behavior Analytics (UEBA)

     

    The rule language in Chronicle Security Information and Event Management (SIEM) was designed for what purpose?

    Select one that applies, and then click Submit.

    • Business Intelligence
    • Data Analytics
    • Metric Visualization
    • Threat Detection

     

    Aliasing applies to what kinds of entities in Chronicle Security Information and Event Management (SIEM)?

    Select one that applies, and then click Submit.

    • Users, Internet Protocol (IP) Addresses, Domains, and Indicators of Compromise (IOCs)
    • Users, Processes, Assets, and Hashes
    • Internet Protocol (IP) Addresses, Hostnames, and Domains
    • Users, Hostnames, Binaries, and Indicators of Compromise (IOCs)

     

    What three components make up the Chronicle Entity Context Graph (ECG)?

    Select one that applies, and then click Submit.

    • Entity Context, Asset Context, and Time Domain Context
    • Host Context, Process Context, and Time Domain Context
    • Entity Context, Global Context, and Local Context
    • Entity Context, Derived Context, and Global Context

     

    What is the product name of the largest threat observatory, operated by Google, that plugs directly into Chronicle?

    Select one that applies, and then click Submit.

    • Google Cloud Threat Intelligence (GCTI)
    • Emerging Threats
    • VirusTotal
    • Mandiant Red Threats

     

    There are rules that are created by the customer or owner of a Chronicle Security Information and Event Management (SIEM) tenant, and there are a group of rules developed by Uppercase based on Google threat intelligence. What is the Google-provided rules called?

    Select one that applies, and then click Submit.

    • Default Rules
    • Curated Rules
    • Template Rules
    • Repo Rules

     

    Over what time span will Chronicle Security Information and Event Management (SIEM) re-evaluate Indicators of Compromise (IOCs) and create new correlations and alerts?

    Select one that applies, and then click Submit.

    • 72 hours
    • 1 month
    • 1 week
    • 1 year

     

    Data from Chronicle can be transparently copied out into what data warehouse for further analytics?

    Select one that applies, and then click Submit.

    • Google BigData
    • Google BigQuery
    • Google Datastore
    • Google Firestore

     

    When selecting a data source to forward to Chronicle Security Information and Event Management (SIEM), for what parsers can you expect the most rigorous testing?

    Select one that applies, and then click Submit.

    • Default Parsers
    • Diamond Parsers
    • Platinum Parsers
    • Gold Parsers

     

    What does UDM stand for?

    Select one that applies, and then click Submit.

    • Uppercase Data Model
    • Unified Data Model
    • Unicorn Data Mode
    • Uninterruptable Data Model

     

    The UDM is designed to contain models for what two types of data?

    Select one that applies, and then click Submit.

    • Events and Objects
    • Objects and Lists
    • Events and Entities
    • Events and Lists

     

    Chronicle Security Information and Event Management (SIEM) applies the schema at what point to ensure maximum performance and increase the number of pivots that can be done on data?

    Select one that applies, and then click Submit.

    • It depends on the parser
    • On search
    • Some on write, some on search
    • On write

     

    What is the primary job of the Indexing service?

    Select one that applies, and then click Submit.

    • Index the telemetry for maximum data resiliency.
    • Index the telemetry for fast retrieval.
    • Return the results of a search.
    • Create unique markers for data integrity.

     

    Which Chronicle Security Information and Event Management (SIEM) search method allows for a “grep” like functionality?

    Select one that applies, and then click Submit.

    • Unified Data Model (UDM) Search
    • Indexed Log Search
    • Raw Log Search
    • Entity Graph Search

     

    What are the two primary functions of the Partner Application Programming Interfaces (APIs)?

    Select one that applies, and then click Submit.

    • Provision new customers and process billing
    • Ingestion metrics and process billing
    • Provision new customers and rotate customer keying information
    • Provision new customers and parser tools

     

    What are the required sections of a YARA-L rule?

    Select one that applies, and then click Submit.

    • Meta, events, and condition
    • Meta, events, condition, and match
    • Meta, events, condition, and outcome
    • Meta and events

     

    Which optional field is required for a multi-event YARA-L rule?

    Select one that applies, and then click Submit.

    • Events
    • Match
    • Outcome
    • Options

     

    In YARA-L, what is the equivalent of #var > 0?

    Select one that applies, and then click Submit.

    • $var
    • &var
    • %var
    • $var = 1

     

    For what kind of field will the nocase operator cause an error?

    Select one that applies, and then click Submit.

    • Optional Fields
    • String Fields
    • Enumerated Fields
    • Classless Inter-Domain Routing (CIDR) Fields

     

    What are the special operators that can act on a repeated field value in YARA-L?

    Select one that applies, and then click Submit.

    • ANY, ALL
    • AND, NOT
    • ANY, NONE
    • OR, NOT

     

    What is the maximum time range for a match section of a multi-event rule in YARA-L?

    Select one that applies, and then click Submit.

    • 1 day
    • 1 week
    • 48 hours
    • 72 hours

     

    What two operators in YARA-L create a sliding window of time that will match events in a specific order?

    Select one that applies, and then click Submit.

    • until, after
    • before, gt
    • lt, gt
    • before, after

     

    What string function can be used to decode encoded command lines, especially in PowerShell?

    Select one that applies, and then click Submit.

    • strings.decode
    • strings.base64_decode
    • strings.hashmatch
    • strings.encode

     

    When considering parsing in Chronicle Security Information and Event Management (SIEM), a data source must always be associated with what?

    Select one that applies, and then click Submit.

    • Metadata event type
    • Data Application Programming Interface (API)
    • Metadata path
    • Data label

     

    What are the extract functions used in Google’s Configuration-based Normalization?

    Select one that applies, and then click Submit.

    • JSON, XML, KV, GROK, and CSV
    • JSON, TSV, KV, and CSV
    • XML, KV, CSV, TSV, and SQL
    • XML, KV, and CSV

     

    What are the two search modes available in Chronicle Security Information and Event Management (SIEM)?

    Select one that applies, and then click Submit.

    • Regex and field query
    • Unified Data Model (UDM) Search and grep regex
    • Unified Data Model (UDM) Search and Raw Log Scan
    • Unified Data Model (UDM) Search and YARA-L

     

    On the Mandiant Advantage Threat Intelligence home page, high-level activity metrics for which types of threats are shown on the dashboard?

    Select one that applies, and then click Submit.

    • Actor, Smishing, and Vulnerability
    • Actor, Malware, and Vulnerability
    • Vulnerability, Insider Threat, and Phishing
    • Actor, Phishing, and Vulnerability

     

    What is the minimum Mandiant Threat Intel subscription level that provides access to MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) tactics and techniques for Mandiant-tracked Actors and Malware?

    Select one that applies, and then click Submit.

    • Threat Intelligence Security Operations
    • Malware Intelligence Operations
    • Threat Operations
    • Security Operations Assistance Platform

     

    If a prospect requires a keyword-driven solution for deep, dark, and open web reconnaissance, which Mandiant Threat Intelligence subscription should be considered?

    Select one that applies, and then click Submit.

    • Deep Web Threat Monitoring
    • Dark Search Tools
    • Digital Threat Monitoring
    • Digital Actor Monitoring

     

    What is the minimum Mandiant Threat Intelligence subscription level that provides full-narrative strategic to tactical analysis and access to 20+ report types from Mandiant frontline threat intelligence analysts?

    Select one that applies, and then click Submit.

    • Mandiant Threat Level Report
    • Threat Aggregation
    • Mandiant Weather Report
    • Threat Intelligence Fusion

     

    Mandiant Threat Intelligence malware profiles include malware detections written in what language?

    Select one that applies, and then click Submit.

    • SQL
    • YARA
    • KSQL
    • Snort

     

    Which Mandiant Threat Intelligence Application Programming Interface (API) version four endpoint will return a list of all threat actors?

    Select one that applies, and then click Submit.

    • /v4/actor
    • /v4/actors.all
    • /mandiant/threatactors
    • /mati/actors

     

    Which Mandiant Threat Intelligence API version 4 endpoint will return information about vulnerabilities, including in a given period, by Identity Document (ID) or Common Vulnerabilities and Exposures (CVE)?

    Select one that applies, and then click Submit.

    • /v4/actors
    • /v4/vulnerability.all
    • /v4/vulnerability
    • /v4/vuln

     

    Which Mandiant Threat Intelligence Application Programming Interface (API) version 4 endpoint will return a list of indicators?

    Select one that applies, and then click Submit.

    • /var/indicators.all
    • /v4/threats/indicators
    • /v4/actor/indicator
    • /v4/indicator

     

    Mandiant Attack Surface Management (ASM) supports scanning for vulnerability exploitation that was demonstrated during the SolarWinds events publicized in December 2020. What kind of vulnerability exploitation was it?

    Select one that applies, and then click Submit.

    • Supply chain attack
    • Phishing attack
    • RAT-based attack
    • Insider threat

     

    When does Mandiant Attack Surface Management (ASM) require some form of authentication for discovery?

    Select one that applies, and then click Submit.

    • Insider Threat
    • When integrating into Cloud Assets or third party tools
    • Always
    • Never

     

    Mandiant Attack Surface Management (ASM) discovers technologies using what method?

    Select one that applies, and then click Submit.

    • Secure SHell (SSH) prompt scanning
    • Simple Network Management Protocol (SNMP) query
    • Banner scanning
    • Fingerprinting

     

    Which tab in the Mandiant Attack Surface Management (ASM) interface provides a high level exportable executive summary of the ASM solution’s findings?

    Select one that applies, and then click Submit.

    • Insights
    • Big Picture
    • Executive Review
    • 30,000 Foot View

     

    In Attack Surface Management, what is a seed?

    Select one that applies, and then click Submit.

    • A foothold where an attacker might gain entry to an environment
    • A specific piece of software running on an entity
    • A zip file downloaded to an endpoint
    • A starting point for discovery

     

    Which of the following are examples of issues that Mandiant Attack Surface Management (ASM) can identify?

    Select three that apply, and then click Submit.

    • Vulnerabilities
    • Misconfigurations
    • Expired Certificates
    • Disabled Endpoint Solution

     

    Which of the following is a currently supported outbound integration for Mandiant Attack Surface Management (ASM)?

    Select one that applies, and then click Submit.

    • Tenable
    • PaloAlto Xpanse
    • JIRA
    • Trellix Helix

     

    What part of an Entity page shows how Attack Surface Management (ASM) found this entity from the initial seed as well as the task that uncovered it?

    Select one that applies, and then click Submit.

    • Associated Issues
    • Discovery Context
    • Entity Context
    • Scoping Map

     

    What collection scan settings can be supplied if custom input types are required?

    Select one that applies, and then click Submit.

    • Cookies, Ports, and Headers
    • Cookies, Internet Protocol (IP) Addresses, and Authentication Tokens
    • Ports, Cookies, and Secure SHell (SSH) Keys
    • Headers, Bearer Tokens, and Internet Protocol (IP) Addresses

     

    What are the main types of actors used in Mandiant Security Validation?

    Select two that apply, and then click Submit.

    • Server
    • Network
    • Database
    • Endpoint

     

    What happens to an Actor in a protected Theater after the conclusion of each test?

    Select one that applies, and then click Submit.

    • They are deleted.
    • They are reverted to their original state.
    • They are reverted to a traditional endpoint actor.
    • An Automated Environmental Change/Drift Analysis (AEDA) job is generated for that actor for all actions in the test.

     

    The ability to automate drift detection, reducing manual efforts in standardization, is a function of what module of Mandiant Security Validation?

    Select one that applies, and then click Submit.

    • Endpoint Protected Theater
    • Threat Actor Assurance Module
    • Email Theater
    • Advanced Environmental Drift Analysis

     

    When considering a Proof of Concept (POC) of Mandiant Security Validation, in addition to the Success Criteria, what other customer information should be documented before the beginning of the POC?

    Select three that apply, and then click Submit.

    • Customer Validation Use Cases
    • Customer Network Infrastructure and Deployed Security Controls
    • Customer Internet Egress Internet Protocol (IP) Addresses
    • Customer Security Lifecycle Framework

     

    Which are the two MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) tactics that are not covered by Mandiant Security Validation?

    Select two that apply, and then click Submit.

    • Resource Development
    • Reconnaissance
    • Command and Control
    • Defense Evasion

     

    How do you Sync integrations between your Director and Third party integrations?

    Select one that applies, and then click Submit.

    • Go to Settings > Integrations. Locate the integration you want to sync to the appropriate table. Click the vertical ellipses in the last column. Click Sync in the drop-down list. Wait for the sync to complete.
    • Go to Settings > Configuration. Configure the Application you want to sync in the appropriate table. Click the vertical ellipses in the last column. Click Sync in the drop-down list. Wait for the sync to complete.
    • Integrations do not need to Synchronize with the director, only output from the alerting system is required.
    • You do not need to Sync them, it is automated.

     

    What is the name of the core Mandiant Security Validation component that is required for running actions against Network Security Controls, Linux, Mac, and Linux endpoint controls, and Email controls.

    Select one that applies, and then click Submit.

    • Director
    • Agents
    • Actors
    • Modules

     

    What is the scope of selecting the “All Environments” button when creating a playbook?

    Select one that applies, and then click Submit.

    • The function will run on all future environments.
    • The function will run all the time, regardless of the playbook selection.
    • The function will run on all current environments.
    • This function created within the playbook will run on all current environments as well as on all future environments.

     

    Identify the use of blocks.

    Select one that applies, and then click Submit.

    • Repeatable actions
    • Condition features
    • Insight features

     

    Who typically has sufficient rights to turn off the “simulator” mode?

    Select one that applies, and then click Submit.

    • Security Operations Center (SOC) Analyst
    • Assistant
    • Admin

     

    What is the difference between Jobs and Connectors within Chronicle Security Orchestration, Automation, and Response (SOAR)?

    Select one that applies, and then click Submit.

    • Connectors notify us of any errors in the alert ingestion process. Jobs notify if a specific job has failed at least three times (sends a notification for each specific job once every three hours).
    • Connectors are used to ingest cases into the platform. Jobs support healthcheck and synchonization tasks.
    • Jobs are used to ingest cases into the platform. Connectors support healthcheck and synchonization tasks.
    • Connectors include tasks or actions to be performed by the playbook. Jobs are notified if a specific action has failed at least three times across all cases it was performed in.

     

    Where can you check all the Active System Modules?

    Select one that applies, and then click Submit.

    • Integrations
    • Permissions
    • Ontology
    • License Management

     

    How can a manual action within a playbook be identified?

    Select one that applies, and then click Submit.

    • The purple color
    • Hand symbol
    • “M” letter
    • “MAN” letters

     

    What allows you to create repetitive steps within a workflow and put together a string of inputs and outputs?

    Select one that applies, and then click Submit.

    • Blocks
    • Actions
    • Events
    • Playbooks

     

    Where can you find the execution log of an Alert?

    Select one that applies, and then click Submit.

    • Action
    • Problem
    • Chronicle Blog
    • Case

     

    What can you find within the Chronicle Security Orchestration, Automation, and Response (SOAR) Marketplace?

    Select one that applies, and then click Submit.

    • Security Information and Event Management (SIEM) vendors
    • Power Ups and Integrations
    • Phishing Alert Tips

     

     

    Download Now!

     

    Filed Under: Certifications

    Google Cloud SecOps Sales Credential Answers

    29 November, 2024 Por Vicen Martínez Arias

    Google Cloud SecOps Sales Credential Answers

    Google Cloud SecOps Sales Credential Answers

    This learning path is designed to help you understand the solution capabilities, value proposition, and competitive differentiation for Google Cloud SecOps products (Chronicle and Mandiant) to equip you with the tools to deliver effective solution messaging.

    All answers to pass this certification are only in our .PDF file, you can buy and download here:

    Google Cloud SecOps Sales Credential Answers

     

    Google Cloud Security Overview

     

    How do you stop adversaries’ attacks if they are bypassing normal endpoint or network security controls?

    Select three that apply, and then click Submit.

    • Understand how the threat actors will attack you
    • Understand your attack surface
    • Integrate with third-party applications
    • Build an effective detection and response capability, so you can detect these attacks early

     

    Which products and solutions can Google help you transfer your cyber defense with?

    Select three that apply, and then click Submit.

    • Threat Ready with Mandiant
    • Threat Detections, Investigation, and Response
    • Anti-Fraud Solutions
    • Managed Offense

     

    Threat Ready with Mandiant is about helping you answer some core questions. Identify.

    Select three that apply, and then click Submit.

    • Who’s targeting us?
    • Why do I need a pen test at all?
    • Where are we exposed?
    • Are you prepared for an attack?

     

    Identify how much the supply chain’s initial infection vector has increased.

    Select one that applies, and then click Submit.

    • <1% in 2020 to 17% in 2021
    • <10% in 2020 to 27% in 2021
    • <5% in 20202 to 19% in 2023

     

    How many new malware families were identified by Mandiant in 2022?

    Select one that applies, and then click Submit.

    • 588
    • 625
    • 500

     

    Identify the name of the Security Artificial Intelligence (AI) Workbench’s specialized Large Language Model (LLM).

    Select one that applies, and then click Submit.

    • Sec-PaLM
    • Threat Intel
    • BeyondCorp Enterprise

     

    Why do many of the leading security vendors build their capabilities on Google Cloud?

    Select five that apply, and then click Submit.

    • Secure Cloud
    • Protection and visibility at planet scale
    • Leader in data privacy and sovereignty
    • Only Cloud vendor committed to shared fate
    • Google Security innovations
    • Least expensive service on the market

     

    Identify Google Cloud’s security solutions that work at scale to eliminate entire classes of threats.

    Select all that apply, and then click Submit.

    • Google Safe Browsing protects over 5 billion devices each day from malware and social engineering.
    • Google’s embedded security monitoring for over 2.5 billion active Gmail users to protect against phishing, malware, and spam.
    • VirusTotal, the world’s premier malware intelligence service, has over 2.4 billion files in its dataset.
    • Chronicle and Security Command Center analyze petabytes of information each day for threat detection and response.
    • Google’s network prevented a 46 million request-per-second Distributed Denial-of-Service (DDoS) attack on a customer, the largest L7 attack recorded to date.

     

    Identify the different aspects of moving to the cloud.

    Select one that applies, and then click Submit.

    • Security controls, visibility challenges, and threats to be managed
    • Users, applications, and use cases

     

    What is a zero-day exploit?

    Select one that applies, and then click Submit.

    • A cyber-attack that targets a software vulnerability that is unknown to the software vendor or antivirus vendors
    • A vulnerability once made public, is known as an UNC
    • A vulnerability once made public, is known as an FIN

     

    Chronicle Security Operations

     

    Who is Chronicle Security Operations (SecOps) for?

    Select one that applies, and then click Submit.

    • Security operations teams in small and mid-size organizations, not security service providers
    • Security operations teams in mid to large-size organizations, not security service providers
    • Security operations teams in mid to large-size organizations as well as security service providers

     

    What does Security Operations (SecOps) do?

    Select one that applies, and then click Submit.

    • Empowers Security Operations (SecOps) teams to detect and investigate cyber threats across the customer environment, including Google Cloud, other clouds, and on-premises
    • Empowers Security Operations (SecOps) teams to detect, investigate, and respond to cyber threats across the customer environment, including Google Cloud, other clouds, and on-premises
    • Empowers Security Operations (SecOps) teams to detect, investigate, and respond to cyber threats on Google Cloud only

     

    What sets Chronicle Security Operations (SecOps) apart?

    Select one that applies, and then click Submit.

    • Google scale, speed of search, and threat intelligence
    • Easiest to use solution
    • Most intuitive interface

     

    What is Chronicle Security Operations (SecOps) competitive advantage?

    Select one that applies, and then click Submit.

    • Chronicle Security Operations (SecOps) is the cheapest solution currently on the market
    • You get Google Workspace functionality included with Chronicle Security Operations (SecOps)
    • Get all your data at a disruptive cost, at your fingertips with Google intelligence, leveraging automated responses and Google best practices

     

    Identify the key capabilities of Chronicle Security Operations.

    Select one that applies, and then click Submit.

    • Collection, detection, investigation, and response
    • Automation, detection, and AI Security Workbench
    • Collection, investigation, alert monitoring

     

    Who are the target audiences for Chronicle Security Operations (SecOps)?

    Select one that applies, and then click Submit.

    • Level 1 and 2 Analysts only
    • Chief Information Security Officer (CISO), Security Operations Center (SOC) Manager, Security Engineer, Cloud Stakeholder
    • Practitioners only

     

    Which segments are considered warm or hot and have the qualification lead for Chronicle Security Operations (SecOps)?

    Select two that apply, and then click Submit.

    • Small and Midsize Business (SMB) with no Security Information and Event Management (SIEM) usage, up to one analyst, no security operations team, and less than 10 daily meaningful alerts
    • Medium with minimal Security Information and Event Management (SIEM) capabilities, two to three full-time analysts, some alert handling, and 11–100 daily meaningful alerts
    • Medium enterprise with mid-range Security Information and Event Management (SIEM) capabilities, four to 10 full-time analysts, an eight-by-five (8×5) Security Operations Center (SOC), and 101–500 daily meaningful alerts
    • Large enterprise with mature Security Information and Event Management (SIEM) capability, more than 10 full-time analysts, a twenty-four-by-seven (24×7) Security Operations Center (SOC), and more than 500 daily meaningful alerts

     

    What are the top Go-to-Market (GTM) plays for Chronicle Security Operations (SecOps)?

    Select one that applies, and then click Submit.

    • Standard Security Information and Event Management (SIEM) (new or replacement) and SIEM augmentation only
    • Security Information and Event Management (SIEM) augmentation only
    • Standard Security Information and Event Management (SIEM) (new or replacement), SIEM augmentation, Cloud Threat Detection and Incident Response (TDIR), and Security Operations Center (SOC) transformation

     

    What does Chronicle Security Orchestration, Automation, and Response (SOAR) use to group related alerts into threat-centric cases?

    Select one that applies, and then click Submit.

    • Integration with VirusTotal solution
    • Patented technology
    • Artificial Intelligence (AI) Security Workbench

     

    Identify how a playbook is selected for an alert generated in Chronicle Security Orchestration, Automation, and Response (SOAR).

    Select one that applies, and then click Submit.

    • Manually, from a selection of playbooks
    • Automatically, based on the alert

     

    What are the Chronicle Security Orchestration, Automation, and Response (SOAR) playbooks?

    Select one that applies, and then click Submit.

    • Guides on how to use Chronicle and deploy across an organization
    • How to sell Chronicle Security Orchestration, Automation, and Response (SOAR) to end users
    • Repeatable processes that automate repetitive tasks to free up analyst time and guide the analyst through the process of investigating and remediating alerts

     

    What does a Chronicle Security Orchestration, Automation, and Response (SOAR) playbook begin with?

    Select one that applies, and then click Submit.

    • A trigger
    • A manual action from the analyst
    • A report

     

    Identify the key benefit of using Chronicle Security Orchestration, Automation, and Response (SOAR) playbooks.

    Select one that applies, and then click Submit.

    • Create customizable views
    • Enable manual selection of views

     

    Given below are some statements about Chronicle Security Orchestration, Automation, and Response (SOAR). Identify the correct statements.

    Select one that applies, and then click Submit.

    • Chronicle Security Orchestration, Automation, and Response (SOAR) summarizes all the remediation actions that the user might want to take in one central location.
    • Chronicle Security Orchestration, Automation, and Response (SOAR) enables security teams to detect, investigate, and respond to threats at Google speed and scale.

     

    How would you summarize the power of the Google Cloud Security Operations Suite?

    Select one that applies, and then click Submit.

    • Google Cloud Security Operations Suite enables modern threat detection and investigation with the speed, scale, and intelligence of Google.
    • Google Cloud Security Operations Suite enables modern threat detection, investigation, and response with the speed, scale, and intelligence of Google.
    • Google Cloud Security Operations Suite provides Google Workspace-powered alert detection for cloud environments.

     

    Identify which phrase summarizes Chronicle Security Information and Event Management (SIEM) correctly.

    Select one that applies, and then click Submit.

    • Best-of-breed automated response tool for on-premises environments
    • Reporting and analytics tool for incident response
    • Ingest and analyze massive amounts of data and provide cutting-edge detection

     

    Identify which phrase summarizes Chronicle Security Orchestration, Automation, and Response (SOAR) correctly.

    Select one that applies, and then click Submit.

    • Ability to automate responses and provide a centralized workbench for the Security Operations Center (SOC)
    • Analyze small amounts of data for alert set-ups
    • Security Operations Center (SOC) tool to provide cutting-edge security Artificial Intelligence (AI)

     

    From which source can Chronicle Security Information and Event Management (SIEM) ingest and analyze data?

    Select one that applies, and then click Submit.

    • Google Cloud, other clouds, Endpoint Detection and Response (EDR), and on-premises environments
    • Any cloud environment sold through Google Cloud
    • Only on-premises environments

     

    What is the default retention period for hot and actionable data for Chronicle Security Information and Event Management (SIEM)?

    Select one that applies, and then click Submit.

    • 3 months
    • 6 months
    • 9 months
    • 12 months

     

    What can you find in the Malware detection view?

    Select one that applies, and then click Submit.

    • Additional information from VirusTotal and Mandiant
    • Additional information from the Security Command Center
    • Additional information from Web Risk

     

    Mandiant Sales Overview

     

    Identify the problems that Mandiant Consulting Services solves for customers.

    Select seven that apply, and then click Submit.

    • Incident Response
    • Ransomware
    • Targeted Attack Testing
    • Security Due Diligence
    • Operational Technology (OT)/Industrial Control Systems (ICS)
    • Skills Gap
    • Cyber Risk Management
    • Budget Constraints

     

    Identify the key differentiators of Mandiant Consulting Services.

    Select four that apply, and then click Submit.

    • Industry-leading intelligence and frontline expertise
    • Focuses on a single offering
    • Specializes in cyber security
    • Leverages insights into the latest attacker Tactics, Techniques, and Procedures (TTPs) and applies them to Red Team assessments
    • Delivers cyber security training by frontline consultants

     

    How would you combat the comment “Your solution is too expensive”?

    Select all that apply, and then click Submit.

    • Most Incident Response (IR) providers rely on outdated, offline methodologies
    • Mandiant’s purpose-built technology results in less people and less time—with an overall lower cost
    • Mandiant performs Incident Response (IR) and assesses compromises with less people in less time with greater efficacy
    • Mandiant can engage in a matter of hours without shipping hardware

     

    How would you combat the comment “Your solution is too expensive” with proof points?

    Select all that apply, and then click Submit.

    • Mandiant’s work on most of the largest and most publicized incidents in history makes it uniquely qualified to assist with technical response and crisis management
    • Mandiant is trusted worldwide. Customers include 40% of the Fortune 100
    • Mandiant’s annual M-Trends report is a proof point

     

    Which of the following is not a role in consulting?

    Select two that apply, and then click Submit.

    • Deployment and integration
    • Long-term staffing needs
    • Assessments, programs, and guidance

     

    What should a Chief Executive Officer (CEO) know about cyber security?

    Select all that apply, and then click Submit.

    • Understand the impacts on your bottom line
    • Know that everyone is responsible
    • Staff your security team
    • Be ready for Ransomware
    • Invest in technology to enable remote work

     

    What is the meaning of strategic readiness?

    Select one that applies, and then click Submit.

    • Improving capabilities against future compromise
    • Testing controls and operations with a real-world attack
    • Developing a mature security posture with improved processes and technologies

     

    With Mandiant Expertise on Demand providing flexible access to cyber security expertise, what does a subscription include?

    Select one that applies, and then click Submit.

    • Daily News Analysis, Quarterly Threat Briefs, Mandiant Advantage Threat Intelligence Free, and the Mandiant Incident Response Retainer (With Optional Service Level Agreement (SLA))
    • Monthly News Analysis, Yearly Threat Briefs, Mandiant Advantage Threat Intelligence, and the Mandiant Incident Response Retainer (With no optional Service Level Agreement (SLA))

     

    What should a Head of Information Security (InfoSec) know about cyber security?

    Select three that apply, and then click Submit.

    • Supervise the team, hire, and manage the budget
    • Drive efficiencies and cost-savings
    • Oversee security operations
    • Analyze multiplying threats

     

    What should a Chief Information Officer (CIO) know about cyber security?

    Select all that apply, and then click Submit.

    • Digital transformation and Change Management
    • Digital adoption and employee training
    • Latest technology
    • Cyber security dangers
    • Financial inadequacies

     

    What is the name of the software that Mandiant deploys to perform validation testing?

    Select one that applies, and then click Submit.

    • Actors
    • Agents
    • Simulators

     

    Identify the check that uses a benign exploit to test the asset exposure for Attack Surface Management.

    Select one that applies, and then click Submit.

    • A Neutral Check
    • A Passive Check
    • An Active Check

     

    Identify how Chronicle Security Orchestration, Automation, and Response (SOAR) enables enterprises and Managed Security Services Providers (MSSPs) to gather data and security alerts from different sources.

    Select one that applies, and then click Submit.

    • Orchestration and Automation, Threat Intelligence, and Incident Response
    • Security Validation, Managed Defense, and Threat Intelligence
    • Security Automation, Incident Response, and Threat Intelligence

     

    Mandiant Attack Surface Management has a native integration with a Mandiant Advantage product. Identify.

    Select one that applies, and then click Submit.

    • Security Validation
    • Threat Intelligence
    • Expertise on Demand
    • Managed Defense

     

    What does EASM stand for?

    Select one that applies, and then click Submit.

    • Enterprise Attack Surface Management
    • Expanding Attack Surface Management
    • External Attack Surface Management

     

    What does ASM stand for?

    Select one that applies, and then click Submit.

    • Attack Surface Management
    • Artificial Surface Management
    • Active Storage Management

     

    What is Mandiant Attack Surface Management based on?

    Select one that applies, and then click Submit.

    • Software-as-a-Service (SaaS)
    • On-Premises

     

    Fingerprinting applies to which entity types?

    Select all that apply, and then click Submit.

    • All entities
    • Domains
    • Netblocks
    • Network Services and Uniform Resource Identifiers (URIs)

     

    Identify the type of organization that has many acquisitions or companies, has a hard time with visibility, and is a good candidate for Attack Surface Management.

    Select one that applies, and then click Submit.

    • Smaller
    • Mid-Size
    • Larger
    • Privately Owned

     

    Identify what scoping use to determine a true/false?

    Select one that applies, and then click Submit.

    • Heuristics and Global Intelligence
    • Algorithmic and Emotional Intelligence

     

    Identify the primary target audience for Mandiant Threat Intelligence.

    Select one that applies, and then click Submit.

    • Vulnerability and Hunting
    • Security Operations Center (SOC) and Incident Response (IR)
    • Cyber Threat Intel and Risk

     

    Identify the Mandiant Threat Intel subscription that includes all the reports, threat actor profiles, malware families, and vulnerabilities.

    Select one that applies, and then click Submit.

    • Fusion
    • Security Operations
    • Intelligence Access

     

    What does BAS stand for?

    Select one that applies, and then click Submit.

    • Boring Analyst Stories
    • Breach and Attack Simulation
    • Breach Analysis Signals
    • Breach Attack Source

     

    Why do organizations need Cyber Threat Intelligence?

    Select three that apply, and then click Submit.

    • Organizations have to know what actions they need to take to mitigate risk.
    • Organizations must apply very limited security resources against endless, evolving threats.
    • Organizations need to know if they are targets in this ever-evolving threat landscape.
    • Organizations do not have to know what actions they need to take to mitigate risk.

     

    Identify the ecosystems from which customers can decouple the underlying application infrastructure.

    Select three that apply, and then click Submit.

    • OpenSource
    • One Source
    • Open Source
    • Open-Source

     

    What are the relevant threats that can be identified to reduce risk?

    Select all that apply, and then click Submit.

    • Ransomware
    • Identified Threat Actors
    • Supply-Chain Compromise
    • Advanced Persistent Threat (APT38)
    • Advanced Persistent Threat (APT41)
    • FIN1

     

    Identify how Mandiant Threat Intelligence Security Operations helps customers.

    Select one that applies, and then click Submit.

    • Respond and Report
    • Detect, Triage, and Respond
    • Detect, Triage, Investigate, and Respond
    • Investigate and Respond
    • Report Only

     

    Approximately how many hours of Incident Response engagements occur per year?

    Select one that applies, and then click Submit.

    • 5000
    • 200000
    • 20000
    • 100000

     

    From the Dashboard, what would you select to display the Actors, Malware, MITRE Adversarial Tactics, Techniques, and Common Knowledge (MITRE ATT&CK) mapping, and Vulnerabilities?

    Select one that applies, and then click Submit.

    • Explore
    • Research Tools
    • File Analysis
    • Search

     

    Applied intelligence offerings focus on producing intelligence for customers. What are the key outcomes?

    Select all that apply, and then click Submit.

    • Research
    • Analysis
    • Written Reports
    • Threat Briefings

     

    Identify some of the best practices for scoping Mandiant Security Validation (MSV) Proof of Concepts (POCs).

    Select four that apply, and then click Submit.

    • Limit the scope to three to five Actors (one hosted Actor, one network, and one endpoint recommended).
    • Strongly recommended not to include Protected Theater, Email Theater, or the use of Mac or Linux deployments.
    • Understand if a proxy or web security service is being used.
    • Ensure that the test plan and Proof of Concept (POC) execution are aligned with the customer’s expected outcomes. Do not over-scope.
    • Suggest the lowest value or hardest to set up integrations.

     

    Identify how Mandiant Security Validation helps customers improve their security.

    Select one that applies, and then click Submit.

    • Proving effectiveness, reducing risk, and optimizing and rationalizing investments
    • Adding an endpoint firewall to the network stack
    • Including anti-virus agents in the installation
    • Proving effectiveness, eliminating risk, and degrading investments

     

    Identify how Mandiant Security Validation continuously validates and measures effectiveness of a customer’s Cyber Security controls.

    Select three that apply, and then click Submit.

    • Measuring control effectiveness
    • Optimizing and rationalizing investments
    • Continuously monitoring and improving risk visibility
    • Disabling automated drift detection

     

    Identify the ideal candidates for Mandiant Security Validation.

    Select one that applies, and then click Submit.

    • Organizations that have concerns around specific threats (i.e., ransomware) or threat actors
    • Organizations that are not mature enough or have the resources to execute
    • Organizations that do not run their own Security Operations Center (SOC)
    • Organizations looking to “check a box”

     

    How is Mandiant Security Validation designed to measure the effectiveness of security controls?

    Select one that applies, and then click Submit.

    • Emulating real attacks
    • Simulating real attacks

     

    Mandiant Security Validation helps answer critical questions. Identify.

    Select all that apply, and then click Submit.

    • Can we be compromised?
    • Are our cyber defenses working?
    • Are we prepared for the prevalent threat of ransomware?
    • Can we prove it?

     

    Identify what needs to be deployed to ensure Mandiant Security Validation is effective.

    Select one that applies, and then click Submit.

    • Actor
    • Internet of Things (IoT)
    • Virus protection

     

    What is Mandiant Security Validation all about?

    Select three that apply, and then click Submit.

    • Mandiant Security Validation is another way to consume and realize value from Threat Intelligence.
    • Mandiant Security Validation proactively understands how you can defend and respond to real cyber security attacks.
    • Mandiant Security Validation uses intel and allows organizations to test their security detection, prevention, and response capabilities against real threats.
    • Mandiant Security Validation is the same as Attack Surface Management.

     

    What does Mandiant Security Validation help with and how does it accomplish this?

    Select three that apply, and then click Submit.

    • Assess
    • Optimize/Rationalize
    • Monitor
    • Overlook

     

    Identify the requirement for using Mandiant Security Validation.

    Select one that applies, and then click Submit.

    • Prioritizing the threats that are most relevant to the organization
    • Identifying the security technologies that the organization has in place
    • Enabling a walkthrough of the approaches to determine that the organization is safe against the latest attacks

     

    Google Cloud Sales Credentials

     

    What is the mission of Google Cloud?

    Select the correct option, and then click Submit.

    • Global scale, distributed security infrastructure
    • Organize your information and supercharge it for you
    • Higher availability and lower latency

     

    What does “Identifying the objective of customer’s business needs” mean?

    Select the correct option, and then click Submit.

    • Identifying groups of products and services designed to solve customer’s business issues
    • Identifying the highest-level outcome that a customer desires to achieve to address a business issue
    • Identifying specific business issues that can be addressed with Google Cloud services and related products

     

    True or false? Google Cloud Professional Services provides a business-focused solution for Chrome browsers, Chrome OS, and Chrome devices.

    Select the correct option, and then click Submit.

    • False
    • True

     

    Which of the following options is NOT a key differentiator of Google Cloud versus its competitors?

    Select the correct option, and then click Submit.

    • Best-in-Class Security
    • Best of Google
    • Aggressive pricing
    • Embedded, Artificial Intelligence AI/Machine Learning (ML)
    • Hybrid and Multi-Cloud

     

    True or false? Investing in the differentiation journey will enable you to increase business impact, showcase success, and boost visibility.

    Select the correct option, and then click Submit.

    • True
    • False

      

    You are in a sales team meeting with a company whose information technology (IT) department is not very familiar with what is cloud technology. What is the best way to describe cloud technology to the customer?

    Select the correct option, and then click Submit.

    • Cloud technology is all of the technology and processes needed to store, manage, and access data running programs that are transferred to the cloud.
    • Cloud technology is where the company stores its data and files.
    • Cloud technology occurs when a company shifts to virtual machines.
    • Cloud technology is the process of migrating a company from on-premises to a data center.

     

    Now that the company understands cloud technology a bit more, they want to know what value Google Cloud provides to companies. What is the best messaging to provide to the customer around Google Cloud?

    Select the correct option, and then click Submit.

    • Google Cloud helps companies transform by providing products and solutions designed to address a company’s business challenges.
    • Google Cloud consists of products and services like Gmail that companies use to transform.
    • Google Cloud has data centers all around the world and provides a secure private network.
    • Google Cloud is a Platform as a Service.

     

    Scenario: Bright1980 (a fictitious company) is a large enterprise retail company that sells trendy clothing to a target audience of 24- to 45-year-olds. The company’s contract with another cloud provider is up for renewal in six months. After qualifying the customer and conducting research about the industry and company, you meet with a few executives from Bright.  After sharing the insights you’ve gathered from your research on their industry, company, and current cloud provider situation. Which of the following approaches is the best way to begin to identify the appropriate solution for the customer?

    Select the correct option, and then click Submit.

    • Ask the customer about their current cloud provider situation and ask the customer to speak more about their level of satisfaction with the other cloud provider.
    • Ask the customer to tell you more about their business needs and objectives.
    • Tell the customer how Google Cloud solutions can help their business.
    • Tell the customer all about cloud technology and Google Cloud.

     

    When analyzing a customer’s business needs, which of the following approaches should be used?

    Select the correct option, and then click Submit.

    • Analyze the business needs against a solution and use case.
    • Analyze the business needs against Google’s differentiators.
    • Analyze the business needs against a product.
    • Analyze the business needs against a priority service.

     

    The Bright1980 executives asked for a high-level overview of some of the main products and services that Google Cloud offers. 

    Description: The products and solutions offered can help companies modernize their infrastructure, develop new applications to transform customer experiences, manage data at scale to build new capabilities, and generate insights from data with smart analytics so that they can digitally transform, innovate, and drive their business even further.

    Which of the following products and services aligns with the description mentioned?

    Select the correct option, and then click Submit.

    • Google Cloud
    • Google Cloud Professional Services
    • Google Workspace
    • Chrome Enterprise

     

    Description: Reimagine how businesses work by powering teams to be faster, smarter, and more collaborative than ever before. A cloud-native solution that delivers seamless, real-time collaboration, powerful search, and proactive security tools using the scale of signals that Google sees every day.

    Which of the following products and services aligns with the description mentioned?

    Select the correct option, and then click Submit.

    • Google Workspace
    • Google Cloud Partners
    • Chrome Enterprise
    • Google Cloud

     

    Description: A business-focused solution that enables people to work securely in the cloud, getting them up and running quickly with the flexibility to work from anywhere. It is secure by design and offers cloud-based management tools, integration with third-party products, and 24/7 support for IT administrators.

    Which of the following products and services aligns with the description mentioned?

    Select the correct option, and then click Submit.

    • Google Cloud
    • Google Cloud Professional Services
    • Google Workspace
    • Chrome Enterprise

     

    Description: Helps customers and partners get the most out of Google products. They offer service lines such as consulting services, Technical Account Management, and training and certification to ensure that company staff are brought up to speed quickly with the latest knowledge on Google products.

    Which of the following products and services aligns with the description mentioned?

    Select the correct option, and then click Submit.

    • Google Cloud Partners
    • Google Cloud Professional Services
    • Google Cloud
    • Google Workspace

     

    Description: Thousands of trusted, experienced experts covering a wide range of specialties, industries, workloads, and solution pillars. Helps Google Cloud customers innovate faster, scale smarter, and stay secure.

    Which of the following products and services aligns with the description mentioned?

    Select the correct option, and then click Submit.

    • Google Cloud
    • Google Cloud Professional Services
    • Google Cloud Partners
    • Google Workspace

     

    Proofpoint: BigQuery automatically scales to thousands of cores in seconds. AWS and Azure need manual configuration.

    Identify which key differentiator the proof point aligns with.

    Select the correct option, and then click Submit.

    • Best-in-class Security
    • Best of Google Cloud
    • Fully Managed No Operations
    • Hybrid and Multi Cloud

     

    Proofpoint: Our focus on transformation poses exciting opportunities to evolve business productivity and collaboration, allowing employees to accomplish more.

    Identify which key differentiator the proof point aligns with.

    Select the correct option, and then click Submit.

    • Best of Google Cloud
    • Embedded Artificial Intelligence / Machine Learning
    • Fully Managed No Operations
    • Hybrid and Multi Cloud

     

    Proofpoint: AutoML and BigQuery ML enable teams without data, scientists to use AI/ML with capabilities not offered by competitors.

    Identify which key differentiator the proof point aligns with.

    Select the correct option, and then click Submit.

    • Hybrid and Multi Cloud
    • Fully Managed No Operations
    • Best-in-class Security
    • Embedded Artificial Intelligence / Machine Learning

     

    Proofpoint: Only Anthos enables application deployment and management on-premises and across clouds, with 100% software solution and no hardware lock-in.

    Identify which key differentiator the proof point aligns with.

    Select the correct option, and then click Submit.

    • Best of Google
    • Best-in-class Security
    • Hybrid and Multi Cloud
    • Embedded Artificial Intelligence / Machine Learning

     

    Modigo asks you why Google Cloud would be the best choice for transforming their business. As you start to mention Google Cloud differentiators, you realize you should remember to back up each differentiator with a proof point. 

    Proofpoint: One of the largest privately managed networks, minimizing risk of customers being exposed to the public internet.

    Identify which key differentiator the proof point aligns with.

    Select the correct option, and then click Submit.

    • Best of Google Cloud
    • Best-in-class Security
    • Hybrid and Multi Cloud
    • Fully Managed No Operations

     

     

    Download Now!

     

     

    Filed Under: Certifications

    Google Workspace Sales Credential Answers

    29 November, 2024 Por Vicen Martínez Arias

    Google Workspace Sales Credential Answers

    Google Workspace Sales Credential Answers

    All answers to pass this certification are only in our .PDF file, you can buy and download here:

    Google Workspace Sales Credential Answers

     

    Questions:

     

    Defining Transform Work

     

    What Google solution helps organizations truly transform the way they work?

    Select the best answer.

    • Backup, DR, and Archival
    • Google Workspace
    • Security Operations and Analytics

     

    What are the three service groups in Google Workspace?

    Select the best answer.

    • Communicate, Collaborate, Control
    • Infrastructure Modernization, Application Modernization, Data
    • Security, Machine Learning, X-Piller
    • Build and Use AI, Compliance Modernization, Edge Apps

     

    Finding Transform Work Opportunities

     

    For the  digital native organization, what is NOT a good topic for Google Workspace?

    Select the best answer.

    • Helpfulness (Google AI)
    • Enhanced security
    • Cost consolidation
    • Simplicity – get going fast
    • Driving collaboration
    • Managing load balancing for virtual servers

     

    When speaking to an existing account, what topic is the BEST strategy to focus your conversation?

    Select the best answer.

    • Artificial intelligence
    • User experience
    • Cost and complexity consolidation
    • Simplicity

     

    What is NOT the best customer scenario for you to pursue?

    Select the best answer.

    • Within 18 to 24 months or more of enterprise agreement renewal
    • Customers on Microsoft without leveraging Teams
    • Customers still on legacy Microsoft software
    • Has made a recent purchase of O365 or is completing an O365 rollout

     

    You have a customer that is interested in transforming work. The customer has 12 – 18 months left on their current Enterprise Agreement. What are the next steps?

    Select the best answer.

    • This is an ideal time to talk with the customer about migration.
    • Contact the Workspace team for immediate migration.
    • Contact Professional Services to support the migration.
    • Disengage from the opportunity.

     

    Positioning the Value of Transform Work

     

    Your customer needs to attract and retain new talent to help them stay competitive in their market. How does Google Workspace help address this challenge?

    Select the best answer.

    • Google Workspace tools are familiar to new talent who expects to work collaboratively and efficiently.
    • Google Workspace enables employees to work locally on desktop applications and in a browser.
    • Google Workspace enables a hybrid working model with cloud and desktop productivity tools.

     

    You have a customer who uses Microsoft and more than two additional point solutions but wants a solution that can consolidate costs. What is the best value statement to use?

    Select the best answer.

    • Everything we do starts from a foundation of trust: security, privacy, compliance, and transparency.
    • Google Workspace reduces your costs and improves TCO/ROI. Let us show you the cost savings calculator.
    • With AppSheet, employees can digitize and streamline processes and improve data quality with custom-built apps that connect directly with Google Workspace.
    • Enterprise Essentials is a cost-efficient way to scale analytical capability and get more value out of BigQuery.

     

    Transform Work Questions or Objections

     

    You are in a conversation with a customer discussing workforce transformation. The customer says, “What we have is good enough. Why would I risk moving to Google?” What is the best way to respond?

    Select the best answer.

    • Google Workspace is most known for its implementations in schools.
    • Google Workspace offers the most advanced features in the industry.
    • Google Workspace fundamentally changes the way your organization gets work done.
    • Google Workspace has the highest market share for collaboration tools.

     

    Download Now!

     

    Filed Under: Certifications

    Google Workspace Deployment Services Credential Answers

    29 November, 2024 Por Vicen Martínez Arias

    Google Workspace Deployment Services Credential Answers

    Google Workspace Deployment Services Credential Answers

    • Exam questions: 54
    • Target Passing Rate = 75%
    • All questions are weighted evenly (no credit for partially correct answers).

    All answers to pass this certification are only in our .PDF file, you can buy and download here:

    Google Workspace Deployment Services Credential Answers

     

    Questions:

     

    An organization has created a Google Workspace Vault default retention rule which retains all Gmail messages for all users in the domain for 30 days. There are no active custom rules. A user receives a message on January 1. The user deletes the message and empties it from Trash on January 15. What is the earliest date on which the message will no longer be searchable in Vault?

    • January 31
    • January 15
    • March 1
    • February 15

     

    You are migrating Exchange accounts to Google Workspace with Google Workspace Migration for Microsoft Exchange (GWMME). When must a mapping file be used?

    • Never. Mappings are included in the GWMME control file.
    • The mapping file is required for all Gmail, Contacts and Calendar migrations.
    • When migrating from an IMAP server.
    • When you need to migrate Calendars and the legacy email addresses are different from the Google Workspace addresses.

     

    Which two types of data CANNOT be retained using Google Workspace Vault?

    Select 2 Correct Responses

    • Off-the-record Chat conversations
    • Email
    • On-the-record Chat conversations
    • Google Sheets
    • Calendar Entries
    • Google Slides

     

    A customer wants to disable all the Google Workspace marketplace applications that access Drive and Gmail. What is the recommended approach to disabling users from adding applications that access Drive and Gmail?

    • Use the Google Workspace Admin console to disable all OAuth access to the selected services
    • Set an alert for all installations of Marketplace applications to trigger an action to suspend a user until the application is removed
    • Use the Admin SDK API to run a script that removes access to all applications on a scheduled basis
    • Disable users from installing applications in the Marketplace in the Google Workspace Admin console

     

    An organization has provisioned all of their employees in Google Workspace and pointed their MX records to Google. They want to configure email for some users to be delivered in Gmail, while email for other users is delivered to a legacy mail system. What should they do?

    • Set up split delivery in their legacy mail system and forward all Google Workspace user mail to aspmx.l.google.com
    • Create a Google Group for all legacy mail system users and place the group in an organizational unit that has a “Default Routing” setting to the legacy mail system.
    • Add legacy mail system users to an organizational unit and configure a Routing setting to direct mail to the legacy system.
    • Place all legacy users in an organizational unit and configure the outbound gateway to the IP address of the legacy mail system.

     

    An organization’s MX record points to an inbound mail gateway (gateway1) that must relay all messages through a second gateway (gateway2) before sending messages to Gmail. What are the two Google recommended settings in this architecture?

    Select 2 Correct Responses

    • Check “Automatically detect external IP” in the Inbound gateway configuration.
    • Add the IP address for gateway1 to the Inbound gateway setting.
    • Add IP addresses for both gateway1 and gateway2 to the email whitelist.
    • Add IPs for both gateway1 and gateway2 to the Inbound gateway setting.
    • Ensure that all inbound messages receive a custom header to bypass Google spam checks

     

    A customer has set the Google session control expiration for 8 hours, but reports that users are not being prompted to re-authenticate as expected. What are the two possible causes of this issue?

    Select 2 Correct Responses

    • The session timeout setting on a third party SSO provider is set longer than the Google session configuration
    • Users reporting the issue are on mobile devices which are not subject to the authentication timeout
    • An IP whitelist has been configured which takes priority over the session control
    • Only Gmail and Drive are subject to session control and user’s are probably using other services
    • Users are members of an administrative role that is not subject to session timeout length

     

    Which access method does NOT allow enforcement of policy controls on iOS devices by Google Workspace?

    • Google-provided Gmail app
    • Google Sync (Microsoft ActiveSync)
    • Adding an account type of “Google” through the Mail, Calendar, and Contacts menu
    • iOS Sync

     

    Which of the following is required In order to achieve free/busy interoperability between Google and Microsoft Exchange?

    • Exchange web services must be opened on port 443 for https://calendar.google.com
    • Exchange web services must be opened on port 443 for all of Google’s IPv6 net blocks
    • Exchange web services must be opened on port 443 for all of Google’s IP blocks
    • Exchange web services must be opened on port 443 for a small subset of Google’s IP blocks

     

    An organization has configured their domain to automatically cancel calendar events for deleted users in the Google Workspace Admin console. Which best describes what happens when a user account is deleted?

    • Future events on the user’s primary calendar are cancelled 21 days later. No cancellation emails are sent.
    • Future events are cancelled on the user’s primary calendar immediately. Cancellation emails are sent.
    • All events are cancelled on the users primary calendar immediately. No cancellation emails are sent.
    • Future events on the user’s primary and secondary calendars are cancelled 21 days later. No cancellation emails are sent.

     

    An organization’s primary mail domain is altostrat.com. They would like to set up dual delivery of mail and have chosen the subdomain apps.altostrat.com to facilitate mail routing to Google Workspace. Which action must they take?

    • Register apps.altostrat.com as the primary domain for Google Workspace.
    • Point the MX records for altostrat.com to aspmx.l.google.com.
    • Point the MX record for apps.altostrat.com to aspmx.l.google.com.
    • Add apps.altostrat.com as an alias Google Workspace domain.

     

    Which Gmail policy type can alter the inbound route of email for specific users?

    • Internal-receiving
    • Content compliance
    • Default routing
    • Inbound gateway

     

    What is Google’s recommended network protocol for Google Meet traffic?

    • QUIC
    • Unsecured TCP
    • Secured UDP
    • Secured TCP
    • Unsecured UDP

     

    An organization has many administrators across different regions and wants to segment the user management by region. How is this accomplished?

    • Configure super administrator access for each administrator and assign them to specific OUs.
    • Use a group filter to delegate administrative rights to specific users based on group membership.
    • Move each IT administrator into the same OU as the users in their respective region and grant them the “User Management Admin” system role.
    • Delegate administrators to specific OUs using the “User Management Admin” system role.

     

    You are in the Early Adopters phase of a Google Workspace deployment. Which set of users does Google recommend that you deploy in this phase?

    • Executives and IT staff
    • 25% of users from technical teams
    • 10% of users from across all business units
    • IT staff and the project team

     

    A customer with over 25,000 Windows machines wants to enforce strict control over Chrome extensions installed in their environment. What should they do?

    • Chrome extensions are controlled only at the user level and must be restricted only through written policies
    • The customer should create Chrome manifest files to whitelist extensions during deployment of Chrome browser
    • Use the Google Admin console to deploy only approved extensions to all users
    • Use Google provided group policy templates (.adm and .admx) to create a centrally controlled level of restriction
    • Chrome browser natively inspects and verifies all extensions by default so no further action is needed

     

    An organization with 10,000 employees has multiple Active Directory forests within their environment. When provisioning users for Google Workspace, which two actions does Google recommend when possible?

    Select 2 Correct Responses

    • Use the Admin console to manually provision users.
    • Divide the employees into separate Google Workspace instances based on Active Directory membership.
    • Consolidate all forests into a single Active Directory.
    • Configure a dedicated (aggregated) LDAP system for GCDS provisioning.
    • Configure a single instance of GCDS using a reverse proxy to connect to all forests.

     

    Which option do Google Workspace administrators NOT have for enforcing second factor authentication (2SV) for their users?

    • Selective enforcement for diverse user populations
    • Allow custom grace periods for new employees to enroll in 2SV
    • Admins can enroll and enforce users in 2SV automatically
    • Enforcement from a specific date
    • Give users the ability to choose “trusted devices” for less frequent 2SV challenges

     

    You are using Google Workspace Calendar Interop for Microsoft Exchange to share availability information between legacy and Google Workspace calendars. Which of the following must you do to allow Exchange users to see Google Calendar availability information?

    • Ensure that Google Workspace users do not appear in the Exchange Global Address List.
    • Create a “Google Calendar” group in Exchange and add all Google Workspace users to this group.
    • Create a role account in Google Workspace to be used by Exchange to get each Google user’s availability information.
    • Move the Google Workspace users to a specific organizational unit (OU) and enable calendar sharing.

     

    Which of the following is true when handling conflict accounts with Google Workspace customers?

    • User’s can decide whether to allow their existing address and data to be added to the corporate Google Workspace tenant
    • Administrators can opt-in all existing conflict accounts to be added to the corporate Google Workspace tenant
    • User’s can decide whether to allow their existing address to be added to the corporate Google Workspace tenant
    • User’s can decide whether to allow their existing data to be added to the corporate Google Workspace tenant

     

    An organization wants to achieve optimal network performance when accessing Google Workspace. Which of the following is a Google recommended best practice for network routing?

    • Proxy all network connections to Google through a centralized location and closely measure that location’s bandwidth usage.
    • Perform DNS lookups geographically close to users
    • Use a reverse proxy within your network perimeter
    • Proxy enterprise Google Workspace traffic separately from other traffic via Google’s netblocks
    • Implement a cloud access security broker (CASB) to funnel all requests to Google

     

    While using Google Cloud Directory Sync (GCDS) to provision groups, an administrator notices that GCDS creates the desired groups, but does not populate them with users. What is the most likely cause of this problem?

    • The administrator entered an incorrect value for the User Email Address attribute.
    • The administrator set the Groups search rule to (&(objectclass=group)(mail=*)).
    • The administrator set the Groups search rule to (objectclass=group).
    • The administrator left the Groups search rule blank.

     

    A 300-person company is running Microsoft Exchange 2010. Google Workspace Migration for Microsoft Exchange (GWMME) will be used to migrate data from Exchange to Google Workspace. Which action must be taken to run GWMME?

    • Install GWMME on the Exchange server.
    • Create a Service account and authorize its Client ID in the Google Workspace Admin console domain.
    • Enable IMAP in Exchange.
    • Decrypt personal contacts.

     

    A customer reports that a large percentage of their users received a phishing email. The customer wants to immediately remove the message from their environment. What action should they take?

    • Use the phishing classification via the Gmail API to remove the message
    • Search for and remove the message from all mailboxes via the Admin Console Investigation Tool
    • Send an email to all users notifying them of the incident and instructing them to remove the message in question.
    • Use Google Workspace Vault to remove the message from all mailboxes
    • Use IMAP to connect to mailboxes and remove the message

     

    Due to security requirements, an organization requires blocking access to consumer Gmail (gmail.com) while allowing enterprise Google Workspace account access (company.com). How is this accomplished?

    • Turn off Gmail for consumer accounts in the organizational service settings in the Google Workspace Admin console.
    • Create a CNAME record for gmail.com in your DNS settings to redirect consumer traffic.
    • Add a “X-GoogApps-Allowed-Domains HTTP header” header to outbound Google Workspace traffic at your network perimeter.
    • Disallowing access to consumer Gmail can only be accomplished via written policy versus technical means

     

    A customer moving to Google Workspace wants to replace the current ticketing system with a Google Workspace account tickets@company.com. Which of the following limits is likely to cause issues with this goal?

    • 25 GB of mail storage capacity
    • 100 Auto-forward mail filters
    • 50,000 received messages per day
    • 4 GB of bandwidth per day (upload and download)
    • 2,000 sent messages per day

     

    Which API can you use to list, create, and modify Google Workspace users?

    • Google Workspace Admin Settings API
    • Google Google Workspace Users API
    • Admin SDK Directory API
    • Admin SDK Enterprise License Manager API
    • Google Domain Shared Contacts API

     

    Which three of the following actions can be configured for messages matching a content compliance rule?

    Select 3 Correct Responses

    • Quarantine
    • Deliver with modification
    • Reject
    • Suspend User
    • Deliver after time interval

     

    Which of the following is not available as a means of interoperability between Google Workspace and legacy platforms?

    • Full access to calendar events across recent Exchange platforms
    • Sophisticated mail routing rules for moving email between platforms
    • Federation for XMPP standard based chat systems
    • Presence in Microsoft Office files to detect when it’s safe to edit document
    • Shared video conferencing between SIP/H.323 systems

     

    An organization is migrating all the employees to Google Workspace except for a small, independent group of users in Antarctica. You want to include the users in Antarctica in the global address list for Google Workspace without additional licensing costs. What should you do?

    • Add domain shared contact records for the Antarctic users.
    • Add user accounts for the Antarctica users, but suspend their accounts.
    • Create an organizational unit for only the Antarctica users.
    • Add a new contact for each Antarctica user in the administrator’s “My Contacts” list.

     

    Google Workspace Migration for Microsoft Exchange (GWMME) uses a control comma-separated values (CSV) file to map legacy accounts to Google Workspace accounts. An organization yourdomain.com is migrating from Exchange where user Google Workspace addresses will remain unchanged from the Exchange environment. How should each user entry be entered into the control file?

    • user@yourdomain.com, user@yourdomain.com, Google Workspace password
    • user@yourdomain.com, user@yourdomain.com
    • user@yourdomain.com
    • user@yourdomain.com, user@yourdomain.com, Google Workspace Organizational Unit

     

    What is the Google-recommended SPF setting for a domain that uses Google Workspace as the primary mail system?

    • v=spf1 include:_ghs.google.com ~all
    • v=spf1 a:google.com mx ptr ~all
    • v=spf1 a:aspmx.l.google.com -all
    • v=spf1 include:_spf.google.com ~all
    • v=spf1 include:_spf.google.com -all

     

    As the administrator for your Google Workspace domain you need to investigate why one of your users didn’t receive an important message. The message was sent to them 45 days ago. What should you do?

    • Obtain the message ID from the sender and use the Gmail API to locate the message.
    • Obtain the message ID from the sender and use the Email Log Search feature to confirm the post delivery message status.
    • Use the Email Log Search feature in the Admin console to confirm whether the message was delivered using sender and recipient SMTP addresses.
    • Use the subject of the message and the Email Log Search feature to confirm the post delivery message status.

     

    An organization wants to enforce policies on iOS devices. Which step must you perform before enabling iOS Sync in the Admin console?

    • Configure a whitelist of iOS apps to be installed as managed applications.
    • Disable Google Sync.
    • Enable device activation.
    • Install and set up the Apple Push Certificate.

     

    An organization has successfully installed Password Sync in their environment. They report that not all Active Directory user passwords are syncing to Google Workspace. What should they do to resolve this problem?

    • Ensure that Password Sync is installed on their Windows Server Core with the Active Directory role.
    • Ensure that Google Cloud Directory Sync (GCDS) has completed the initial password sync.
    • Ensure that Password Sync is installed on every writable domain controller.
    • Ensure that Password Sync is installed on their Microsoft Exchange Server.

     

    An organization wants to deploy Google Drive File Stream but is concerned about potential implications to their network due to limited bandwidth. What is the Google recommended way to mitigate these concerns?

    • Strategically deploy Drive File Stream only to users with ample network bandwidth
    • Use registry (Windows) and defaults (macOS) controls on specific clients to reduce requirements
    • Allow only Google native files to be streamed to reduce bandwidth
    • Drive File Stream automatically scans networks for available bandwidth and reduces usage
    • Use the bandwidth controls in the Google Admin console to reduce requirements

     

    A user created a Google Site in the domain altostrat.com. The user wants to make the site accessible using the URL http://myproject.altostrat.com. What should the administrator do?

    • Configure a web address mapping in the site settings.
    • Create a TXT record that contains “name: myproject value:altostrat.com.”
    • Configure a web address mapping in the Admin console.
    • Create a CNAME record that points myproject.altostrat.com to google.com.

     

    Which of the following is true regarding Google’s native mobile device management (MDM) platform?

    • Basic mode MDM is enabled by default for all Google Workspace accounts
    • Advanced mode MDM is enabled by default for all Google Workspace accounts
    • Basic mode MDM is required for all accounts that use third party MDM providers
    • Advanced mode MDM is required for all accounts that use third party MDM providers

     

    What of the following is NOT required to use Endpoint Verification?

    • Chrome browser
    • Chrome OS
    • Endpoint Verification Chrome extension
    • Endpoint Verification custom executable

     

    You are working in the Google Workspace Admin console. You need to block sign-in attempts from applications that do not use modern security standards, and thus are considered less secure. What type of applications should you block?

    • Applications that rely on certificate based authentication to access an account programmatically
    • Applications that rely on plain SSO authentication to access an account programmatically
    • Applications that rely on plain authentication to access an account programmatically
    • Applications that rely on username/password authentication to access an account programmatically

     

    An organization has the following Vault rules configured:
    -A default rule that retains messages for 5 years.
    -A custom rule that retains messages with label “misc” for 3 years.
    “An organization has the following Vault rules configured:
    -A default rule that retains messages for 5 years.
    -A custom rule that retains messages with label “misc” for 3 years.
    For a conversation started on 1/1/2013, if a user put the “misc” label on a single message in the conversation sent on February 1, 2013, what will the status of all messages in the conversation be on February 1, 2016?

    • All messages up to the labelled message are deleted. All messages sent after are retained until 2018.
    • All messages up to the labelled message are kept. All messages sent after are removed.
    • None of the messages are deleted.
    • All of the messages are deleted.

     

    You are installing Google Workspace Migration for HCL Notes (GWMHN) and want to ensure that it will run in the organization’s environment. What should you do?

    • Sign the GWMHN templates with the migration server ID or the ID of a user who has the rights to run agents on the server.
    • Sign the GWMHN templates with a special Google ID and grant the ID full access to all of the organization’s mail servers.
    • Place GWMHN in a separate Domino organization and cross-certify it with the customer organization.
    • Install a GWMHN instance on each of the organization’s mail servers.

     

    What must an administrator ensure before using a third party mobile device management (MDM) system for Google Workspace devices?

    • Good device policy application must be installed on all devices
    • Both Google advanced and basic mode MDM must be disabled
    • Users will not require Android Enterprise because it only works with Google MDM
    • Google advanced mode MDM must be disabled
    • No native Google applications will be used by users for access Google Workspace data

     

    Which two of the following are supported by Google Workspace Migration for Microsoft Exchange (GWMME)?

    Select 2 Correct Responses

    • ICS
    • MBOX
    • Microsoft Exchange profile
    • PST
    • CSV

     

    Which of the following is not a supported source for identifying users during a login challenge to Google Workspace?

    • SMS text of pin code
    • Google Authenticator code
    • Voice call pin code
    • Employee ID
    • Recovery email account

     

    You have developed a script that uses the Drive API to add files to Google Drive. The script exits early with a 403: Rate Limit exceeded response from the Google servers. What two steps can you take?

    Select 2 Correct Responses

    • Request additional quota in the Developer Console project.
    • Implement exponential back-off in your code
    • Add the Override_Rate_Limit header to each API request.
    • Insert a delay between each API call in your code.
    • Batch your requests.

     

    How can a Google Workspace administrator programmatically access a user’s data without any manual authorization on the user’s part?

    • Individual user accounts must always consent to having their data accessed
    • A support ticket can be filed with Google support to allow time based access to user data by the super administrator
    • User accounts can be granted the ‘Data Authority’ administrative role to access other user’s data
    • Grant a service account domain-wide delegation of authority
    • Super administrators get access to all user data by default in Google Workspace

     

    When using Password Sync to synchronize passwords, how is the password sent to Google from Active Directory?

    • Salted SHA-1 over HTTP
    • Clear text over HTTP
    • Salted SHA-512 over HTTPS
    • Clear text over HTTPS
    • MD-5 over HTTPS

     

    What is Google’s maximum suggested latency for Google Meet?

    • 3,000ms
    • 400ms
    • 1,000ms
    • 100ms
    • 20ms

     

    An organization reports that valid email messages sent by their users are being marked as spam by several recipient domains. They ask for your help addressing this issue. What should you do?

    • Recommend that they talk to the recipient’s domain administrators and request being added to their whitelist.
    • Create a Google provided CNAME record in their DNS settings.
    • Ensure that SPF, DKIM, and DMARC are set up correctly for their domain.
    • Add the recipient domains to the outbound whitelist in Google Workspace.

     

    What is Google’s recommended approach for analyzing patterns in mail flow for large organizations?

    • Use the “export Gmail traffic” option in the Google Workspace Admin console to download all data in .csv format for use in the tool of their choice
    • Use Google Workspace’s Big Query export functionality and use the SQL interface for analyzing patterns
    • Google Workspace provides customizable graphs directly in the Google Workspace Admin console for this purpose
    • Use in-line network monitoring tools to capture packet level data for advanced analytics

     

    An organization, domain.com, wants to change their primary Google Workspace domain to newdomain.com. Which steps will achieve this goal?

    • Add newdomain.com as an additional domain in the Google Workspace Admin console of domain.com; then use the MAKE PRIMARY option to promote newdomain.com as the account’s primary domain.
    • Provision newdomain.com as a new primary domain. Use domain whitelisting from newdomain.com to domain.com to allow users to sign in to newdomain.com.
    • Provision newdomain.com as a new primary domain. Use the Domains.get method of the Directory API to merge domain.com into newdomain.com.
    • Add newdomain.com as a domain alias to domain.com; allow users to sign in using their primary address or their domain alias address.

     

    An organization is using Google Calendar Interop for Microsoft Exchange. Users are provisioned in both Google and the legacy environment. When doing lookups from a Google Workspace account, you want to ensure that free/busy status for a user comes from Exchange. Which two methods should you choose?

    Select 2 Correct Responses

    • Move the user in Google to an organization unit (OU) with the Calendar service disabled.
    • Suspend the user in Google.
    • Disable sharing of the user’s primary Google calendar within their organization.
    • Add the user to the “Exchange Calendar” Google Group.
    • Delete the user’s primary Google calendar.

     

    A Google Workspace account is set up with a third-party Single Sign-On (SSO) solution. Which access method will require the user to enter their password stored in Google Workspace versus their SSO login credential?

    • Google Workspace Sync for Microsoft Outlook
    • Google Workspace Migration for Microsoft Outlook
    • Android device using Android sync
    • Google Admin console

     

    Google Workspace Deployment Services Credential Answers

     

    Filed Under: Certifications

    Google Maps Platform Sales Fundamentals Credential Answers

    29 November, 2024 Por Vicen Martínez Arias

    Google Maps Platform Sales Fundamentals Credential Answers

    Google Maps Platform Sales Fundamentals Credential Answers

    All answers to pass this certification are only in our .PDF file, you can buy and download here:

    Google Maps Platform Sales Fundamentals Credential Answers

     

    Questions:

     

    Getting started

     

    How can the use of geospatial intelligence help drive growth?

    Select the best answer.

    • Enhances digital customer understanding, engagement, and experience across the entire customer lifecycle.
    • Standardizes addresses across the world.
    • Manages APIs in a more secure and scalable fashion.
    • Provides a petabyte-scale, low cost analytics data warehouse that can scale to meet the needs of the business.

     

    The Market Opportunity

     

    Google Maps Platform: What is it?

     

    When was Google Maps launched?

    Select the best answer.

    • 2005
    • 2006
    • 2007
    • 2004

     

    Google Maps Platform is divided into three distinct product categories. What are those categories?

    Select the best answers.

    • Visualizations
    • Routes
    • Locations
    • Places
    • Destinations
    • Areas
    • Maps
    • Geographies

     

    What are three competitive strengths of the Google Maps Platform?

    Select the best answers.

    • Global coverage
    • Cross-platform support
    • Speed and scale
    • People love Google Maps

     

    Google Maps Platform: How does it work?

     

    A customer wants to know which Maps API is best for finding the distance between many locations on a map. What is the correct answer?

    Select the best answer.

    • Distance Matrix API
    • Roads API
    • Geolocation API
    • Places API

     

    A customer wants to reduce the number of erroneous delivery addresses that end-users provide on their website. Which API is best suited for this purpose?

    Select the best answer.

    • Streetview API
    • Geolocation API
    • Geocoding API
    • Places Autocomplete API

     

    Google Maps Platform: Use cases

     

    Your customer would like to direct their customers and delivery drivers from point A and B as quickly and efficiently as possible. What can they use to lower costs, improve experiences, and optimize their workforce?

    Select the best answer.

    • Place and Autocomplete
    • Layer custom data on top of Maps
    • Geolocation and Geocoding APIs
    • Directions, Distance Matrix, and Roads

     

    Selling Google Maps Platform

     

    You’re preparing for a sales conversation with a customer experience manager for a regional healthcare clinic. During your research, you uncover that the manager’s clinic has a non-Google digital maps implementation on their website. This customer is likely in which stage of Google Maps Platform readiness spectrum?

    Select the best answer.

    • Optimizing
    • Landing
    • Exploring
    • Expanding

     

    During your conversation with the customer experience manager of a healthcare clinic, you uncover that their day-to-day role involves managing their customer app, including troubleshooting and support. This customer is likely a…

    Select the best answer.

    • User buyer
    • Executive buyer
    • Budget-holder
    • All of the above

     

    Leading the sales conversation

     

    You’re preparing for a sales conversation with an eCommerce director for a clothing retailer. In your research, you uncover that this customer is an established customer with the Google Cloud team. Your next step is…

    Select the best answer.

    • Prepare your agenda for this upcoming call.
    • Reach out to current Googlers at Google Cloud who manage this account.
    • Reach out to former Googlers who now work for this retailer.
    • Reach out to known partners who work with this retailer.

     

    Pricing the opportunity

     

    The Google Maps Platform pricing philosophy is driven by a series of key principles and considerations, including…

    Select the best four answers.

    • Fastest path to closing the sale
    • Balance adoption and revenue
    • Business model alignment
    • Customer value
    • Operational simplicity
    • Terms of Service negotiations

     

    The Google Maps Platform Terms of Service help protect the customer and Google Maps. Which of the following situations are not permitted under Google Maps Platform Terms of Service?

    Select two answers.

    • A manufacturer has approached you about improving its online ordering system and wants to integrate Google Maps Platform into its system to help improve asset tracking.
    • A financial services firm is looking to integrate address Autocomplete into the location mapping feature of its application to improve user experience. The customer currently uses a different provider for its maps software but is open to replacing it with Google Maps Platform.
    • Your customer has a food delivery service application and wants to integrate Google Maps Platform for a better customer experience. The application serves customers primarily in Singapore with expansion plans into Malaysia, Thailand, and Vietnam.
    • A regional healthcare clinic with multiple locations has approached you about integrating Google Maps Platform on its website. The clinic’s marketing team is requesting that any Google-related logos be removed so as not to detract from the website’s newly updated look and feel.

     

    Market Intelligence

     

    Read Julio’s objection and choose a response. Your choices affect whether the seller Ofelia handles the objection successfully. To complete this module, you must answer the scenario-based question correctly to move forward.

    Hi Ofelia. I had a chance to think about your proposal. Implementing appointment setting on our Google Maps implementation can probably help us get to our business goal of 10% growth

    Sounds like the solution Ofelia proposed is out of scope for the customer. How should Ofelia respond to Julio’s objection?

    • Ah, I understand. In the past when I’ve experienced scope issues, I’ve found that it’s often an issue of prioritization. Is there any way you can get the team to prioritize this?
    • Ah, I understand. I’m curious — since 90% of your conversions come from mobile, how will streamlining how visitors make appointments using Autocomplete impact your business goals for the year?

     

    Reread Julio’s response to your question.

    Well, making appointments more seamless would definitely help drive foot traffic into our stores. But we only have one developer – Sonja – and she already has more projects than she can handle.

    It looks as if Ofelia needs to continue digging deeper to discover the root of Julio’s objection. How should Ofelia respond to Julio?

    • There are never enough developers, right? Listen, I’ve led other customers through similar situations. It’s not an impossible ask for Sonja. The reason I’m pushing is that my research shows that 90% of your conversions are through mobile.
    • Wow, that sounds like a lot of work for one person! I understand the resource constraints; however, studies have shown that conversions increase when people can more seamlessly engage with your brand. How would you feel if we partnered with Sonja to make this implementation as easy as possible for her?

     

    Reread Julio’s statement and choose a response.

    That’d be great. Honestly, I’ve been saying for a while that I believe we’re losing customers due to customer experience on our site, but it just keeps dropping to the bottom of the priority list. I can bring it to our chief technology officer and see if he’ll bump this up in Sonja’s task queue. But I don’t see that happening anytime soon.

    Now that Ofelia has discovered the root cause of the objection, she needs to diffuse it. How should Ofelia respond?

    • That must be frustrating, Julio. I understand why you feel can’t make an impact on the site. I really think we can help you. I think you’ll see a sharp increase in total site conversions to foot traffic if we follow through with a strategy I came up with for your team. Would you like to hear more about it and allow me to answer more of your questions?
    • That must be frustrating, Julio. I understand why you feel like you can’t impact the site. Some of our other partners have felt the same way. However, companies like yours with significant web traffic who prioritized user experience found a dramatic increase in in-store foot traffic. I have some thoughts on how we can move forward partnering together.

     

    Reread Julio’s statement and choose a response.

    I’m definitely interested in hearing your thoughts on this, Ofelia. To tell the truth, it would be a personal win for me to make this happen.

    Now that Ofelia diffused the objection, she needs to deliver the right solution. How should Ofelia respond?

    • I’d be happy to partner with you on this, Julio. We can have our internal team run a test of the implementation on your site first to make sure it’s working for you. If it’s a success, we can focus on improving customer experience using Autocomplete to drive more foot traffic in your stores.
    • We really understand the resource load your developer is under and we’d like to help offset it. Resources aren’t a problem for us. We can get an internal team to help you right away.

     

    Download Now!

     

    Filed Under: Certifications

    Google Education Deployment Credential Answers

    29 November, 2024 Por Vicen Martínez Arias

    Google Education Deployment Credential Answers

    Google Education Deployment Credential Answers

    This learning path was designed to prepare sales reps for conversations with customers on the Google for Education deployment process. Upon completing this course, learners will be able to guide educational institutions to sign up for a Google Workspace for Education account, select a domain option, set up organizational units, create and apply policies, enroll Chrome devices in a domain, and complete a phased roll-out.

    All answers to pass this certification are only in our .PDF file, you can buy and download here:

    Google Education Deployment Credential Answers

     

    Questions:

     

    1: Google Workspace for Education

     

    What must an educational institution do to get started with Google for Education?

    Select one.

    • Sign up for a Google Workspace for Education account.
    • Get their domain verified by a third-party verification team.
    • Provide an accreditation certificate to the Google Workspace for Education team.
    • Create a net-new domain for use with Google Workspace for Education.

     

    Why must schools verify that they own their domain?

    Select one.

    • To ensure that the domain is not being used for a Google service without their permission.
    • To purchase the Google Chrome Enterprise Upgrade.
    • To transfer the domain to Google and allow Google to manage it
    • To transfer ownership of their data to Google IT admins.

     

    Once a school receives the acceptance email for Google Workspace for Education, what can they do?

    Select one.

    • Access the Google Admin console
    • Configure FTP settings with Google console
    • Use the Cloud Firestone application
    • Access the Chrome Admin console

     

    2: School Domains

     

    What is the most common domain setup for schools that manage more than one domain?

    Select one.

    • Primary domain with multiple Google Workspace for Education accounts
    • Multiple domains with a single Google Workspace for Education account
    • Separate Google Workspace for Education accounts for multiple domains
    • Primary domain with separate Google Workspace for Education accounts

     

    What domain setup is seen as the simplest and easiest to manage, and therefore often best suited for Google Workspace for Education customers?

    Select one.

    • Primary domain with a single Google Workspace for Education account
    • Multiple domains with a single Google Workspace for Education account
    • Separate Google Workspace for Education accounts for multiple domains
    • Primary domain with separate Google Workspace for Education accounts

     

    If a school district sets up separate Google Workspace for Education accounts with separate domains for each school, what considerations should they be aware of?

    Select two.

    • It is generally is not recommended for schools as it limits sharing capabilities.
    • It requires management of multiple Google Admin console accounts.
    • It is easy to transfer a user between domains.
    • There is a single unified administration management experience.

     

    3: Organizational Units

     

    What user account method allows schools to automatically provision users, groups, and contacts based on the user data in an LDAP server, such as Microsoft Active Directory?

    Select one.

    • Add users and groups manually
    • Upload a .csv file
    • Use Google Cloud Directory Sync
    • Create a provisioning application

     

    4: User, Device, and App Policies

     

    Now that we have reviewed the user and device policies schools should consider, check your knowledge!

    Drag and drop the policy description to match the policy name.

    • Forced re-enrollment: Ensures that if a Chrome OS device is lost or stolen and completely wiped, the device will still have the policies and security settings in place.
    • Guest mode: Allows a Chrome OS device to be signed into with a non-school related account.
    • Sign-in restriction: Ensures that only the school’s registered students and staff can log into school Chrome OS devices.
    • Enforce verified boot: Ensures that staff or students cannot boot school devices in developer mode, which can potentially expose the school to malicious programs.

     

    Schools can use Chrome OS devices for student assessments. There are three scenarios to deliver assessments. If the assessment is delivered as a “Single App Kiosk,” how is it configured?

    Select one.

    • A testing provider sets up a new domain specifically for taking the test and the student takes the assessment on the provider-issued account.
    • A school delivers the test through kiosks without having to sign in which requires the school to have the Chrome OS devices enrolled in their domain.
    • The testing provider creates the exam as a Chrome OS kiosk app and the exam app runs in full-screen mode.

     

    5: Enroll Chrome Devices

     

    What services are offered as part of Google Chrome Partner Services?

    Select three.

    • Updating Chrome OS to the latest build.
    • Associating the Chrome OS devices to the correct organizational units.
    • Enrolling Chrome OS devices into the school’s domain.
    • Installing multi-device security software.

     

    How do schools enable enrollment mode during manual enrollment?

    Select one.

    • Press Ctrl+Alt+E on the Google account login screen.
    • Contact Google Admin support.
    • Contact Google Chrome Partner Services.
    • Press Ctrl+Alt+D on the Google account login screen.

     

    What happens if a school does not enroll all Chrome OS devices ahead of letting users sign into them?

    Select all that apply.

    • They will be unable to enforce the device policies.
    • They are no longer eligible for Google Chrome Partner Services.
    • Multi-device sign-in access will be disabled.
    • If a user logs in before enrolling the Chrome OS device,  it will need to be wiped before it can be enrolled.

     

    6: Google Workspace for Education License Deployment

     

    Who within a school’s domain can distribute Google Workspace for Education paid licenses to users?

    • Google Workspace Administrator with access to the Admin console
    • Teachers in Google Classroom
    • The school principal
    • Students

     

    Which users should you remove from OU(s) or group(s) before assigning licenses, to avoid giving those users licenses?

    • Classroom teachers
    • Suspended users
    • IT Admins
    • Current students

     

    Which of the following license deployment methods matches the data in the LDAP server, such as Microsoft Active Directory?

    • GAM
    • Google Cloud Directory Sync (GCDS)
    • Enterprise License Manager API
    • User-based automatic license assignment

     

    7: Phased Rollout and Additional Services

     

    Let’s test your knowledge!

    Drag the rollout activity to the associated phase.

    Phase 1: Core IT

    • Pilot the communications, marketing campaigns, training, and Google Guides; the school’s IT staff complete Google Certified IT Administrator Pathways and Badges training.

    Phase 2: Early Adopter

    • Profile the user community, send a user readiness survey, and establish a Google Guides program; develop plans for training, communications, marketing, and Google Guides.

    Phase 3: Global Go-Live

    • Execute a support plan that improves the users’ experience, speeds resolution of issues, and keeps the project team focused on any critical challenges.

     

    If a school would like assistance with training and professional development for Google for Education, what is recommended?

    Select one.

    • Contact Google support teams for detailed training plans.
    • Engage a Google Professional Development Partner.
    • Engage the school’s internal support team for implementation.
    • Start a marketing campaign for Google for Education.

     

    Google for Education Deployment Assessment

    • You must score at least 80% to pass the test. 
    • 16 questions

     

    A school has turned on Google Workspace for Education core services, but the IT admin wants to prevent sharing outside of the school domain. What core service setting should the IT admin check?

    • Drive sharing settings
    • Hangouts Meet communication settings
    • Vault sharing settings
    • Gmail communication settings

     

    A region with multiple districts and schools wants to set up an organizational unit structure and has delegated administrators for each first-level organizational unit. Organization and control is a priority. What organizational structure should you recommend?

    • Single-level structure
    • Role-oriented structure
    • Multi-level structure
    • Organization-oriented structure

     

    A school would like assistance with training and professional development for Google for Education. What should be recommended?

    • Engage the school’s internal support team for implementation.
    • Start a marketing campaign for Google for Education.
    • Contact Google support teams for detailed training plans.
    • Engage a Google Professional Development Partner.

     

    A school wants assistance configuring the school’s Google Admin console and associating the Chrome devices to the correct organizational units. What Chrome device enrollment option should be recommended?

    • Chrome device manual enrollment.
    • Google’s approved partner service offerings.
    • Google’s Chrome Partner services.
    • Update Chrome OS on the Chrome device.

     

    What is the first step an educational institution must take to get started with Google for Education?

    • Create a net-new domain to use with Google Workspace.
    • Sign up for a Google Workspace for Education account.
    • Provide an accreditation certificate to the Google Workspace for Education team.
    • Get their domain verified by a third-party verification team

     

    What domain setup option is generally not recommended for schools because it creates management overhead?

    • Separate Google Workspace for Education accounts for multiple domains.
    • Primary domain with a Google Workspace for Education account.
    • Multiple domains with a Google Workspace for Education account.
    • Sub-domains with a Google Workspace for Education account.

     

    When an IT admin submits a ticket to Google support, what should be included?

    • The Chrome and platform version of the affected Chrome device.
    • The Google Workspace training that has been completed by the user.
    • The user’s contact information including personal phone number.
    • The organizational unit stucture choosen by the school.

     

    Once a school receives the acceptance email for Google Workspace for Education, what can they do?

    • Access the Google Admin console.
    • Access the Chrome Admin console.
    • Use the Cloud Firestone application.
    • Configure FTP settings with Google console.

     

    A Higher Ed instituion has separate domains for each school within the instituion, such as “law.university.edu”, “eng.university.edu”, and “med.university.edu”. Each student body has different email policy requirements. What domain setup should you recommend?

    • Separate Google Workspace for Education accounts for multiple sub-domains.
    • Multiple domains with a single Google Workspace for Education account.
    • Separate Google Workspace for Education accounts for each of the school domains.
    • A single Google Workspace for Education account with the primary domain

     

    If a school has an existing domain, why is verification of domain ownership required?

    • To ensure that the domain is not being used for a Google service without permission.
    • To purchase the Google Chrome Enterprise upgrade and show proof of purchase.
    • To transfer ownership of their data to Google IT admins to manage and control.
    • To transfer the domain to Google and allow Google to manage the instance.

     

    A school wants all of its teachers to have access to the “Remind: School Communication” app. What should the IT admin do?

    • Ask the Super Admin to set up an organizational unit for the Google Dictionary extension.
    • Set Chrome policies to prompt users to install the Chrome app with instructions.
    • Contact Google support and submit a ticket to instal the app across the organizational unit.
    • Set Chrome policies to force-install the app and pin it to the Chrome taskbar.

     

    Select the correct response to the customer’s question: What happens if a Chrome device is not enrolled?

    • Multi-device sign-in access is be disabled.
    • You will no longer be eligible for Google Chrome Partner Services.
    • Policies cannot be applied and/or enforced on the device.
    • Users cannot log into the device with a managed account.

     

    A school IT admin wants to allow a group of users to manage certain service settings and devices. What admin role should the school IT admin assign?

    • Help Desk Admin
    • Chrome Admin
    • Reseller Admin
    • Services Admin

     

    A school IT admin wants to ensure that only the school’s registered students, staff, and teachers can use school Chrome devices. What device policy should be disabled?

    • Guest mode
    • Automatic updates
    • Disabled device return instructions
    • Forced re-enrollment

     

    A single school with the domain “school.edu” would like to set up the school domain to ensure simple management. What domain setup should you recommend?

    • Separate Google Workspace for Education accounts for multiple sub-domains.
    • Multiple domains with a single Google Workspace for Education account.
    • A single Google Workspace for Education account with the primary domain.
    • Separate Google Workspace for Education accounts for multiple domains.

     

    A school wants to disable student access to browse the web during an exam. How should the school set up the exam with Chromebooks?

    • Set up the exam as a single app kiosk.
    • Set up private sessions for the exam.
    • Set up PDF only access for the exam.
    • Set up a Google form for the exam.

     

    A school has decided to roll out Google for Education, and has set up and provisioned the IT staff accounts. For a successful rollout, what other activities should happen in the first phase?

    • Deploy Google for Education to all students, teachers, and staff, and share Google’s training modules and support site.
    • Profile the user community and develop plans for training, communications, marketing, and Google Guides.
    • Roll out Google for Education with a cross-section of users and start communications to students, staff, and teachers.
    • Gather all project and support team members in a conference room for at least a week beforing going live to all users.

     

    A district with multiple schools wants to allow specific roles to consume Chrome Education Upgrades. What user policy allows users in a specific organizational unit to enroll new Chrome OS devices?

    • Device upgrade permission
    • Chrome enrollment permission
    • Device enrollment permission
    • Chrome upgrade permission

     

     

    Google Education Deployment Credential Answers

     

     

    Filed Under: Certifications

    Google Education Sales Credential Answers

    29 November, 2024 Por Vicen Martínez Arias

    Google Education Sales Credential Answers

    Google Education Sales Credential Answers

    Begin your training in Google for Education sales with the courses that meet our credentials requirements

    All answers to pass this certification are only in our .PDF file, you can buy and download here:

    Google Education Sales Credential Answers

     

    Questions:

     

    Introduction to Google for Education

     

    How do Chromebooks meet the needs of different users?

    Select the correct option, and then click Submit.

    • Chromebooks come in a single format that can be customized for a specific use case or user type
    • Chromebooks come in a variety of formats to suit the needs of different users, including students, teachers, administrators
    • Chromebooks come in several formats suitable only for students
    • Chromebooks come in several formats suitable only for teachers

     

    Which of the following statements about ChromeOS updates is true?

    Select the correct option, and then click Submit.

    • Users need to manually install every update
    • Updates happen automatically in the background
    • Security updates are optional
    • ChromeOS never receives updates

     

    What do educational institutions need in order to manage devices centrally?

    Select the correct option, and then click Submit.

    • A high-performance Chromebook
    • A ChromeOS Flex license
    • Google Workspace for Education
    • Chrome Education Upgrade

     

    Which of the following benefits does Chrome Education Upgrade provide?

    Select the four options that apply, then click Submit.

    • Managed access
    • Enhanced teaching tools
    • Faster boot-up
    • Simplified deployment
    • Longer battery life
    • Advanced security
    • 24/7 IT admin support
    • LTE connectivity

     

    What are Google Workspace for Education’s central values?

    Select the four options that apply, then click Submit.

    • Simple
    • Helpful
    • Cloud-based
    • Global
    • Flexible
    • Comprehensive
    • Secure
    • Accessible

     

    Which Google Workspace for Education edition gives educational institutions access to easy-to-use tools, at no cost?

    Select the correct option, and then click Submit.

    • Education Standard
    • Education Fundamentals
    • Teaching and Learning Upgrade
    • Education Plus

     

    How do Google Workspace for Education tools enhance educational environments?

    Select the correct option, and then click Submit.

    • They help educators streamline administrative tasks
    • They give administrators access to critical management tools
    • They let students easily collaborate with each other
    • All of the above

     

    Which of the following are benefits that Google Workspace for Education offer?

    Select the three options that apply, then click Submit.

    • Network configuration
    • Plagiarism detection
    • Classroom management
    • Fast installation
    • Automatic updates
    • Collaboration and productivity

     

    ChromeOS for Education and ChromeOS Flex

     

    What makes Chromebooks an ideal choice for the classroom?

    Select the correct option, and then click Submit.

    • They have a battery life of up to 4 hours
    • They are compatible with ChromeOS Flex
    • They are designed to be lightweight and durable
    • They automatically block access to social media

     

    What does the verified boot process do?

    Select the correct option, and then click Submit.

    • Verifies that multiple users are not using the same Chromebook
    • Ensures that the operating system has not been compromised
    • Confirms that each website is sandboxed
    • Ensures that legacy applications are not running on the Chromebook

     

    Which features are ChromeOS devices optimized to provide?

    Select the two options that apply, then click Submit.

    • Security from the start
    • Touchless access identification
    • Isolated charging
    • Starts fast, stays fast
    • Automatic antivirus software updates

     

    Every Chromebook runs on ChromeOS with a copy operating system running in the background. Why is this beneficial for users?

    Select the correct option, and then click Submit.

    • Faster RAM hardware leads to more efficient workstreams
    • Verified boot installs the known safe backup OS every time the device is started up
    • Running both operating systems on one device at the same time makes it twice as powerful
    • One version of the OS can be used while the other gets updated, keeping data secure and users productive

     

    Which of the following statements about Chrome Education Upgrade are correct?

    Select the three options that apply, then click Submit.

    • With Chrome Education Upgrade, IT administrators can manage devices locally, instead of managing them from the cloud
    • Chrome Education Upgrade has a 1:1 relationship with each device
    • Chrome Education Upgrade is attached to the device, not each individual user
    • With Chrome Education Upgrade, IT administrators can manage up to 100 policies
    • Educational institutions can manage devices from one console with Chrome Education Upgrade
    • Educational institutions receive Chrome Education Upgrade with each ChromeOS Flex purchase they make

     

    What is one of the central features of Chrome Education Upgrade?

    Select the correct option, and then click Submit.

    • The ability to collaborate using Microsoft apps
    • The ability to enroll to different domains
    • The ability to restrict sign-in to the school’s domain
    • The ability to use Chrome Education Upgrade on several devices at once

     

    Which two management capabilities does the Google Admin console include?

    Select the correct option, and then click Submit.

    • User and device policies
    • Identification and visibility policies
    • Domain and support policies
    • User and visibility policies

     

    Which of the following products lets users run ChromeOS on legacy PCs and Macs?

    Select the correct option, and then click Submit.

    • ChromeOS Repurposing
    • ChromeOS Deployment
    • ChromeOS Transformation
    • ChromeOS Flex

     

    Google Workspace for Education

     

    Which edition(s) provide enhanced teaching and learning tools?

    Select the two options that apply, then click Submit.

    • Education Fundamentals
    • Education Standard
    • Teaching and Learning Upgrade
    • Education Plus

     

    Which of the following are among the premium Google Meet features included with Teaching and Learning Upgrade?

    Select the three options that apply, then click Submit.

    • Additional storage
    • 24/7 admin support
    • Breakout rooms
    • Polling
    • Q&A
    • Practice sets

     

    Which paid edition feature lets large numbers of people from the school domain engage with synchronous learning via Google Meet?

    Select the correct option, and then click Submit.

    • Attendance reports
    • Originality reports
    • Google Admin console
    • Live stream

     

    Which edition does this apply to? “In addition to the 100 TB of pooled cloud storage, schools get 20 GB added to the shared pool for each license across their entire domain.”

    Select the correct option, and then click Submit.

    • Education Plus
    • Teaching and Learning Upgrade
    • Education Fundamentals
    • Education Standard

     

    Which editions provide additional proactive security tools?

    Select the two options that apply, then click Submit.

    • Education Fundamentals
    • Education Standard
    • Teaching and Learning Upgrade
    • Education Plus

     

    Which of the following features are part of the enhanced security tools available with the paid editions?

    Select the two options that apply, then click Submit.

    • Investigation tool
    • Originality reports
    • Attendance reports
    • Personalized Cloud Search
    • Security dashboard

     

    How does the investigation tool support proactive security?

    Select the correct option, and then click Submit.

    • By saving time and triaging threats like phishing attempts
    • By locating breakout rooms that may be left unlocked
    • By identifying the super admins in a domain
    • By limiting the number of users that can join live streams

     

    A school wants to gain more granular insight into students’ Google Classroom usage. Which tool in Education Standard or Education Plus offers usage trends and patterns?

    Select the correct option, and then click Submit.

    • Investigation tool
    • Advanced reporting with logs in BigQuery
    • Windows 10 device management
    • Device monitoring in the Google Admin console

     

    Google Workspace for Education Customer Objection Handling

     

    What is a defining characteristic of a good prospecting question?

    Select the correct option, and then click Submit.

    • It is open-ended
    • It builds rapport and trust with your customer
    • It generates a more detailed response that may provide useful context
    • All of the above

     

    Which question will help you learn more about how your prospect is currently managing threats and phishing?

    Select the correct option, and then click Submit.

    • How confident are you about managing threats such as phishing?
    • Do you manage phishing security threats?
    • Are you concerned about threats such as phishing?
    • Is your current security system effective at preventing threats such as phishing?

     

    Which question will help you learn more about your customer’s online collaboration needs?

    Select the correct option, and then click Submit.

    • Do you have an online video meeting solution?
    • To what extent do your video conferencing tools support collaboration?
    • What is the best online learning tool you’ve used?
    • Are you interested in using enhanced online collaboration tools?

     

    What can the 4 A’s model be used for?

    Select the correct option, and then click Submit.

    • To identify common challenges in education
    • To find better customers
    • To handle objections effectively
    • To identify key decision-makers

     

    Which of the following is the fourth step of the 4 A’s model?

    Select the correct option, and then click Submit.

    • Analyze
    • Argue
    • Answer
    • Acknowledge

     

    Why is it important to identify stakeholders’ roles and responsibilities early in the sales process?

    Select the correct option, and then click Submit.

    • To demonstrate to the stakeholders that you are interested in their institution and understand how they’re structured
    • To increase your chances of getting a meeting with the stakeholders
    • To ensure that you bring all relevant decision-makers into the conversation from the start
    • To close a deal more quickly

     

    Who are the main stakeholders that you are likely to pitch the Google Workspace for Education paid editions to?

    Select the three options that apply, then click Submit.

    • The Technology Leader
    • The Marketing Leader
    • The Institutional Development Leader
    • The Executive Education Leader
    • The Curriculum Leader

     

    Which category from the 4 A’s model does the following statement correspond to? “I understand your concern, and I’m happy to address it. At the beginning of 2020 the Meet team worked hard to develop a wider set of features, including attendance tracking and breakout rooms, to answer the needs of schools delivering online and hybrid learning.”

    Select the correct option, and then click Submit.

    • Anticipate
    • Acknowledge
    • Ask
    • Answer

     

    Google Workspace for Education Renewals and Customer Success

     

    When should you contact customers to review their progress and success with license assignment?

    Select the correct option, and then click Submit.

    • Within 1 month of the initial sale
    • Within 2 months of the initial sale
    • Within 3 months of the initial sale
    • Within 6 months of the initial sale

     

    Your customer is currently on the Teaching and Learning Upgrade, but has expressed interest in learning more about premium Security features. Which of the following is the best edition to position as an upsell?

    Select the correct option, and then click Submit.

    • Education Standard
    • Education Fundamentals
    • Chrome Education Upgrade
    • Education Plus

     

    Ideally, when should you begin your renewal communications campaign?

    Select the correct option, and then click Submit.

    • 60 days before the customer’s subscription end date
    • 15 days before the customer’s subscription end date
    • 90 days before the customer’s subscription end date
    • 30 days before the customer’s subscription end date

     

    What is a Product Usage Review?

    Select the correct option, and then click Submit.

    • An email campaign that lets you demonstrate new paid features to customers
    • A tool for identifying which educational institutions use competitors’ solutions
    • A document with step-by-step instructions that explains how to use different paid features
    • A customer success engagement tool that evaluates a customer’s usage of paid features

     

    What can you do when you run a Product Usage Review?

    Select the two options that apply, then click Submit.

    • Update information in the Partner Sales Console
    • Execute your 90-60-30-15 renewals campaign
    • Validate the value and impact of the paid editions
    • Audit license assignment

     

    One of your customer’s main deal drivers for purchasing Education Plus was the enhanced Security features, but the Product Usage Review reveals very limited use of the investigation tool. How should you proceed?

    Select the correct option, and then click Submit.

    • Advise executive education leaders to require that IT administrators use the investigation tool
    • Demo the investigation tool’s features during the Product Usage Review and share support resources after the meeting
    • Ignore the low usage, and focus on demonstrating the value of another popular feature instead
    • Recommend purchasing a third-party security tool that helps manage the customer’s Google environment

     

    What problem might arise if you don’t maintain continuous communication with your customer between purchase and renewal?

    Select the correct option, and then click Submit.

    • Your customer might not remember to use their premium features
    • You might miss opportunities to support them
    • You might forget what their unique needs are
    • Your customer might think that you’re not interested in their institution

     

    Which of the following options can help you during the renewal cycle?

    Select the correct option, and then click Submit.

    • Help customers set goals
    • Introduce key stakeholders to popular features
    • Set customer milestones for feature usage
    • All of the above

     

     

    Google Education Sales Credential Answers

     

     

    Filed Under: Certifications

    ChromeOS for enterprise: Deployment Credential Answers

    29 November, 2024 Por Vicen Martínez Arias

    ChromeOS for enterprise: Deployment Credential Answers

    ChromeOS for enterprise: Deployment Credential Answers

    Begin your training in deploying Chrome Enterprise with courses that meet our credentials requirements.

    This learning path is designed to prepare pre-sales technical reps to identify Enterprise and Education prospects that are strong fits for ChromeOS. Upon completing this learning path, learners will be able to recall the steps involved in the Identify and Qualify phases of the ChromeOS sales cycle, recall how the Chrome Readiness IT Scorecard (CRIS tool) works, understand how to categorize ChromeOS prospects in terms of their readiness to deploy ChromeOS, and use questions from the CRIS tool to evaluate fictitious prospects.

    All answers to pass this certification are only in our .PDF file, you can buy and download here:

    ChromeOS for enterprise: Deployment Credential Answers

     

    Questions:

     

    Level 1: Evaluating Technical Readiness for ChromeOS

     

    Module 1: The ChromeOS Sales Cycle

     

    What are the 5 phases of the ChromeOS Sales Cycle?

    • Identify, Qualify, Validate, Close, Deploy
    • Identify, Qualify, Confirm, Prove, Close
    • Identify, Validate, Demo, Close, Deploy
    • Identify, Verify, Demo, Prove, Close

     

    What is the main goal of the Identify phase?

    • Determine which ChromeOS features to demo for the prospect
    • Determine whether ChromeOS is a good fit for the prospect
    • Determine whether to sell a proof of concept to the prospect
    • Determine whether the prospect has any specific concerns about ChromeOS

     

    What is the main goal of the Qualify phase?

    • Determine whether ChromeOS is a good fit for the prospect
    • Determine whether the prospect has any specific concerns about ChromeOS
    • Show the prospect how ChromeOS is a great solution for them
    • Scope a ChromeOS pilot for the prospect

     

    Which of the following is the first step in the Qualify phase?

    • Evaluate whether the prospect’s technical environment is a good fit for ChromeOS
    • Determine the prospect’s use case(s) and the features of ChromeOS that could help them
    • Build and deliver a strong demo of ChromeOS and the Google Admin console
    • Know when to sell a Proof of Concept to the prospect

     

    Module 2: Introduction to the Chrome Readiness IT Scorecard

     

    If a prospect receives a score of 3 on a CRIS question, they are an ideal customer for ChromeOS as it relates to that question.

    • False
    • True

     

    What does a high score in the Chrome Readiness IT Scorecard (CRIS) tool indicate?

    • The prospect is likely to be a challenging, high-risk customer due to their technical setup
    • The prospect is an ideal ChromeOS customer due to their technical setup
    • The prospect is not enthusiastic about the idea of adopting ChromeOS
    • The prospect is likely to be an enthusiastic adopter of ChromeOS

     

    A prospect that receives a score of 1 on a Security question will not be able to deploy ChromeOS.

    • False
    • True

     

    What is the Chrome Readiness IT Scorecard (CRIS) used for?

    • To help assess a prospect’s readiness to deploy ChromeOS
    • To help determine which features should be demonstrated to a prospect
    • To help determine what the prospect’s use cases are
    • To help assess a prospect’s willingness to move to ChromeOS

     

    Module 3: Categorizing ChromeOS Prospects

     

    Which of the following characteristics are common in prospects that are worth chasing? Choose the three correct answers.

    Select 3 Correct Responses

    • Are an existing Google Workspace or G Suite customer
    • Have a heterogeneous printing environment
    • Are in between device upgrade cycles
    • Have a strong virtual desktop infrastructure

     

    Which of the following characteristics are common in prospects that are not worth chasing right now but are worth waiting for?

    • Are an existing Google Workspace or G Suite customer
    • Are in between device upgrade cycles
    • Have a heterogeneous printing environment
    • Currently lack budget for new devices

     

    Which of the following characteristics are common in prospects that should be dropped for now? Choose the two correct answers.

    Select 2 Correct Responses

    • Currently lack budget for new devices
    • Have a heterogeneous printing environment
    • Are in between device upgrade cycles
    • Have complex network authentication requirements

     

    Module 4: Asking Questions to Understand a Prospect’s Readiness for ChromeOS

     

    Level 2: Building & Delivering a Strong Demo

     

    Module 1: Google Admin Console Concepts & Terminology

     

    You want to set up a managed guest session. Where in the Google Admin console should you click to start this process?

    • Organizational units (OUs)
    • Users
    • Apps
    • Devices

     

    Which two things can be organized in an Organizational Unit (OU)?

    Select 2 Correct Responses

    • Devices
    • Networks
    • Apps
    • Users

     

    Which of the following statements about policies is true?

    • Policies can be overridden by a policy applied at a higher level in the hierarchy
    • Policies are inherited by lower levels in the OU hierarchy
    • Policies are inherited by higher levels in the OU hierarchy
    • Policies cannot be overridden by a policy applied at a lower level in the hierarchy

     

    What types of policies can be defined in the Google Admin console?

    • Settings for devices only
    • Settings for users or devices
    • Settings for users only

     

    What type of app adds functionality to a browser?

    • Progressive Web Apps
    • Android apps
    • Chrome Web Store apps
    • Extensions

     

    Module 2: Building a Demo for a Specific Use Case

     

    Which two things should you prepare in advance of each demo?

    Select 2 Correct Responses

    • Test enrolling a device
    • Download the apps you want to demo
    • Set up kiosk mode in a sub OU
    • Set up the OU structure

     

    Which of the following would be the best use case for kiosk mode?

    • A device at an airport that only allows customers to check-in
    • A device in a hotel lobby that allows guests to use multiple apps
    • A device that will be used by multiple students for their lessons
    • A device for back office staff to check their emails and order stock on

     

    What should you do when demoing apps? Choose the best answer.

    • Show specific apps that are relevant to the prospect based on what you learned in the identify phase
    • Show the vast range of apps available to ChromeOS
    • Show an app from each category: extensions, android apps, Chrome Web Store apps and PWA/Web apps
    • Show how the Google Workspace apps maximize collaboration in ChromeOS

     

     

    ChromeOS for enterprise: Deployment Credential Answers

     

     

    Filed Under: Certifications

    ChromeOS for enterprise: Sales Credential Answers

    29 November, 2024 Por Vicen Martínez Arias

    ChromeOS for enterprise: Sales Credential Answers

    ChromeOS for enterprise: Sales Credential Answers

    Begin your training in deploying Chrome Enterprise with chrome with courses that meet our credentials requirements.

    All answers to pass this certification are only in our .PDF file, you can buy and download here:

    Chrome Enterprise and SMB Sales Credential Answers

     

    Questions:

     

    ChromeOS for enterprise: Introduction

     

    Module 1: State of the workplace

     

    In today’s workplace, what is the general trend for remote work?

    • Increasing
    • Decreasing
    • Remains the same
    • Non-existent

     

    True or false? IT departments are supporting a hybrid workplace, where individuals may work from various locations–such as the office, in the field, and at home.

    • True
    • False

     

    True or false? Frontline workers are often in the field and need access to critical business applications on the go.

    • True
    • False

     

    True or false? A “cloud worker” is someone who can work from anywhere because they can access critical business applications from the cloud.

    • True
    • False

     

    Module 2: ChromeOS key differentiators

     

    What is the name of the chip that encrypts data?

    • Hercules
    • Titan
    • Jupiter
    • Colossus

     

    What is the process that isolates malicious web pages to contain threats?

    • Sandboxing
    • Virtualization
    • Verification
    • Encryption

     

    What does the verified boot process do?

    • Confirms that each web site is sandboxed
    • Verifies that multiple users are not using the same Chromebook
    • Ensures that legacy applications are not running on the Chromebook
    • Ensures that the operating system has not been compromised

     

    According to the agreement that Google has with original equipment manufacturers (OEMs), what is the minimum duration that a Chromebook battery charge must last?

    • At least four hours
    • At least 10 hours
    • At least six hours
    • At least two hours

     

    Module 3: Versatility and types of ChromeOS devices

     

    Every Chrome device runs on ChromeOS with a copy operating system running in the background. Why is this beneficial for end users?

    • Verified boot installs the known safe backup OS every time the device is started up.
    • Running both operating systems on one device at the same time makes it twice as powerful.
    • Faster RAM hardware leads to more efficient workstreams.
    • One version of the OS can be used while the other gets updated, keeping data secure and users productive.

     

    Which of the following is one of the three steps in determining the right ChromeOS device for a prospect?

    • Map out the device specifications required for these use cases
    • Ask their users what their technical preferences are
    • Provide prospects with three different devices for testing
    • Recommend one device per organization workstream type

     

    ChromeOS devices are optimized to provide a number of features. Select two of these features from the list below.

    Select 2 Correct Responses

    • Comprehensive browsing
    • Security from the start
    • Isolated charging
    • Starts fast, stays fast
    • Touchless access identification

     

    While all ChromeOS devices can be utilized as shared devices, which is typically best suited to digital signage?

    • Chromebook Enterprise
    • Chromebooks
    • Chromeboxes
    • Chromebases

     

    Module 4: Chrome Enterprise Upgrade and Chromebook Enterprise Devices

     

    Which of the following upgrade options are available to Chrome Enterprise Upgrade customers?

    Select 1 Correct Responses

    • Three-year upgrade
    • Semi-annual upgrade
    • Annual upgrade
    • Perpetual upgrade

     

    Which of the following apply to user policies? Select all that apply.

    Select 2 Correct Responses

    • User policies follow users across devices.
    • User policies can allow or block guest mode on the device.
    • User policies can be applied to individual users or across an organizational unit.
    • User policies are attached to the device, not the individual user.

     

    Which of the following options allows you to run ChromeOS on repurposed PCs and Macs?

    • ChromeOS Repurposing license
    • ChromeOS Deployment license
    • ChromeOS Flex license
    • ChromeOS Transformation license

     

    Which of the following are features provided by Chrome Enterprise Upgrade? Select all that apply.

    Select 3 Correct Responses

    • Chrome Enterprise Upgrade has a one-to-many relationship with devices.
    • Chrome Enterprise Upgrade is attached to the device, not each individual user.
    • Chrome Enterprise Upgrade has a 1:1 relationship with each device.
    • Devices can be managed from one site.

     

    Module 5: Google’s end-to-end solutions

     

    Which process allows users to run legacy applications on ChromeOS?

    • Specialization
    • Consolidation
    • Edification
    • Virtualization

     

    Which feature of Google Play scans over 50 billion apps per day to protect users?

    • Google Play Scan
    • Google Play Kiosk Mode
    • Google Play Advanced
    • Google Play Protect

     

    Which of the following components allows IT departments to manage all ChromeOS devices from one centralized, cloud-based apparatus?

    • Google Upgrade console
    • Google Admin console
    • Google Sandbox console
    • Google Virtualization console

     

    Which of the following applications are part of Google Workspace? Select all that apply.

    Select 4 Correct Responses

    • Google Docs
    • Google Sheets
    • Gmail
    • Google Slides

     

    Module 6: Recommending devices for ChromeOS use cases

     

    What is a feature of Parallels Desktop for ChromeOS?

    • Users can run legacy, proprietary and full-featured software, such as Microsoft Office, locally from their ChromeOS device.
    • Applications leveraging Parallels Desktop can be only accessed with an internet connection.
    • Legacy, proprietary and full-featured software needs to be managed and accessed only through the original program’s admin console.
    • When a user leaves their session, Parallels Desktop keeps running in the background, decreasing a device’s processing speed.

     

    Which two enterprise management capabilities does the Google Admin Console include?

    • Identification and visibility policies
    • Domain and support policies
    • User and device policies
    • User and visibility policies

     

    What are the benefits of running a virtualized environment for legacy applications?
    Select two correct answers.

    Select 2 Correct Responses

    • Save workers time and hardware storage space through through virtualized workspaces
    • Align newer programs with well-known legacy systems for ease of use
    • Secure virtualization of full desktop workspaces or individual applications
    • Ability to run managed guest sessions on ChromeOS devices to automatically launch virtualized environment
    • A cost-effective way of avoiding device upgrades while adhering to industry compliance

     

    For enterprise customers who are not ready to commit to a full Google Workspace license, what stand-alone workspace solution should you recommend as an alternative?

    • A three-in-one license for Docs, Sheets, and Slides
    • Gmail Plus
    • Google Drive Enterprise
    • Google Workspace Essentials license

     

    ChromeOS for enterprise: Delivering a Strong Pitch

     

    Module 1: The ChromeOS Pitch Rubric

     

    Module 2: Explain the Benefits of ChromeOS

     

    You are speaking to a prospect in the healthcare industry. They want to automate their appointment booking system to give their patients greater autonomy. Which cloud-ready use case should you reference to establish yourself as a trusted advisor?

    • Information workers
    • Front of house workers
    • Field or mobile workers
    • Customers

     

    Which feature(s) should you discuss when explaining that simple management is a major benefit of switching to ChromeOS? Select two.

    Select 2 Correct Responses

    • Google Admin console
    • Google Workspace
    • Cloud Identity
    • Chrome Enterprise Upgrade

     

    You’re explaining to a prospect that ChromeOS offers secure endpoints, user protections and cloud-based management. Which of the main ChromeOS benefits are you explaining?

    • Creating a modern employee experience
    • Apps for every worker
    • Fast deployment
    • Built-in and proactive security

     

    Module 3: Share Customer Stories & Testimonials

     

    True or false? Sharing customer stories can help to create a sense of urgency at the prospect.

    • True
    • False

     

    Where should you go to find the right customer success stories and testimonials for your prospect? Select two.

    Select 2 Correct Responses

    • Works with Chromebook website
    • Chrome Enterprise Customer Stories website
    • Google for Education Customer Stories website
    • Chrome Enterprise Partner Drive

     

    When sharing customer stories/testimonials with your prospect, which kind of organizations or schools should you focus on? Select three.

    Select 3 Correct Responses

    • Organizations or schools that are the prospect’s peers
    • Organizations or schools that are in different regions from the prospect
    • Organizations or schools that are the prospect’s competitors
    • Organizations or schools that are in the same region as the prospect

     

    Module 4: Prove There Are ChromeOS Devices for all Use Cases

     

    What is the first step in the Chrome Enterprise three-step process to ensure that you recommend the right devices to a prospect?

    • Identify the prospect’s primary use cases and needs
    • Share stories/testimonials of existing ChromeOS customers with your prospect
    • Review other products, services and peripherals
    • Map out the device specifications required for the prospect’s use cases

     

    What is a Chromebox?

    • A solid-state, all-in-one device designed for security
    • A laptop that runs ChromeOS, designed to run cloud-based apps
    • A Chromebook built with Chrome Enterprise Upgrade capabilities
    • A desktop variant of Chromebook that runs ChromeOS

     

    What is a Chromebase?

    • A desktop variant of Chromebook that runs ChromeOS
    • A laptop that runs ChromeOS, designed to run cloud-based apps
    • A Chromebook built with Chrome Enterprise Upgrade capabilities
    • A solid-state, all-in-one device designed for security

     

    You’re currently speaking to a prospect in the retail sector. Their employees are back-of-house workers who use shared devices to quickly access product specifications, up-to-date inventory data, and timesheets. Which use case would you use to choose the right devices for the prospect?

    • Power usage
    • Apps and virtualization
    • Browsing and single tasks
    • Collaborating

     

    Module 5: Recommend Other Products, Services, and Peripherals

     

    You’re currently speaking to a prospect that works in a prominent law firm with offices distributed globally. Their clients like to receive paper copies of legal documents so the company is reluctant to digitize their entire process. Which service would you recommend?

    • Google Cloud services (e.g. Google Workspace or Cloud Identity)
    • USB-C docking stations and other hardware
    • Identity solutions (e.g. Okta)
    • Third-party print solutions (e.g. Papercut and directprint.io)

     

    Where can you find out which products and accessories are compatible with Chromebooks?

    • The Chrome Web Store website
    • The Google for Education website
    • The Chrome Enterprise website
    • The Works with Chromebook website

     

    How does zero-touch enrollment work?

    • End-users manually enroll devices
    • Google engineers manually enroll devices
    • IT admins manually enroll devices
    • Devices enroll automatically when end users connect their device to the internet

     

    You’re currently speaking to a prospect in the computer software industry that requires power usage devices with additional coding capabilities. Which services would you recommend? Select two.

    Select All Correct Responses

    • Identity solutions (e.g. Okta)
    • Virtual Desktop Infrastructure solutions (e.g. Citrix and VMWare)
    • Google Cloud services (e.g. Google Workspace and Cloud Identity)
    • VMWare Workspace ONE

     

     

    Chrome Enterprise and SMB Sales Credential Answers

     

     

    Filed Under: Certifications

    Next Page »

    Google Workspace promo code FREE

    G Suite promo code

    Categories

    • Certifications
    • Google Workspace News
    • Hosting
    • Technology

    Try SemRush FREE

    Semrush FREE coupon

    Aviso legal - Politica de privacidad - Politica de cookies - Contratación
    DMCA.com Protection Status