Coursera Cyber Security in Manufacturing – quiz answers

Coursera Cyber Security in Manufacturing course – quiz answers to all weekly questions (weeks 1-4):

  • Week1: Introduction to Digital Manufacturing Security
  • Week 2: Guidance on Securing Digital Manufacturing Operations
  • Week 3: Protecting Operational Technologies and Intellectual Property
  • Week 4: Breach Response

You may also be interested in Google Data Analytics Professional Certificate Course 1: Foundations – Cliffs Notes.


Week 1: Introduction to Digital Manufacturing Security quiz answers

The purpose of this module is to introduce you to the information security need, framework and processes, as it applies to creating a strong and secure Digital Manufacturing and Design infrastructure.

1. True or False?

According to the 2017 Data Breach Investigation Report of Verizon, all data breaches were due to external attacks.

  • True
  • False

2. _______________ means that the system can be modified only by authorized parties and only in authorized ways.

Integrity

3. Which of the following is not a step of Information Security Management System (ISMS) framework?

  • Risk Management
  • Risk Assessment
  • Risk Creation
  • Selection of appropriate controls

4. True or False?

The third line of defense in three line defense model performs operations such as internal and external audit.

  • True
  • False

5. True or False?

Using encryption on a network for communication can prevent eavesdropping of data package.

  • True
  • False

6. True or False?

Information Security Management Systems (ISMS) is an organized strategy to managing information in a secure manner.

  • True
  • False

7. _______________ states that a system should not grant permission based on a single condition.

  • Information Security Management Systems (ISMS)
  • Separation of privilege
  • Interoperability
  • Technical assistance

Week 2: Guidance on Securing Digital Manufacturing Operations quiz answers

The purpose of this module is to introduced you to the various components of the digital manufacturing operation and the basic security concepts that can be used to protect these components.

1. Which of the following is a type of virtualization? (Select all that apply)

  • Network virtualization
  • Desktop virtualization
  • Application virtualization

2. _____________ is the ability of people, machines and devices to communicate via a single platform or a network.

What do you think?

Interoperability

3. _________ is “a discipline concerned with the design, evaluation and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them.

What do you think?

Human Machine Interaction

4. True or False?

Human Machine interaction is the study of interactive interface between humans and machine.

  • True
  • False

5. True or False?

By using Internet Of Things (IOT), devices and machines can be monitored but cannot be controlled

  • True
  • False

6. True or False?

In requirements phase, minimum acceptable levels of security should be defined.

  • True
  • False

7. In _________ phase of Security Development LifeCycle (SDLC), all project functions are analyzed.

What do you think?

implementation

8. In ____________ threats are intentionally designed to harm a system.

What do you think?

malicious

9. True or False?

Encapsulation means while developing a software, different functionalities are developed in the form of separate modules, instead of writing complete software as a single file.

  • True
  • False

10. Which of the following functions are offered by Secure/Multipurpose Internet Mail Extension?

  • Signed data
  • Pretty good privacy
  • Identification step
  • Verification step

Week 3: Protecting Operational Technologies and Intellectual Property quiz answers

The purpose of this module is to describe how the various operational steps of digital manufacturing – that includes – supply chain, shipping process, mobile device usage and the associated communication – can be protected, along with the Intellectual Property (IP) items that arise during digital manufacturing and design.

1. Arrange the following options in order of security program for a SCADA system:

A. Perform risk and vulnerability assessment

B. Define responsibilities

C. Define objectives

D. Define mitigation controls

B. Define responsibilities

C. Define objectives

A. Perform risk and vulnerability assessment

D. Define mitigation controls

2. True or False?

If a USB was plugged into a Stuxnet worm-affected system, the worm would infiltrate the USB device and spread to any subsequent computing systems that the USB was plugged into.

  • True
  • False

3. Which of the following is an entity of supply chain?

  • Supplier
  • Retailer
  • Manufacturer
  • Supplier, Retailer and Manufacturer

4. True or False?

Supply chain security provides security against security threats including terrorism

  • True
  • False

5. Which one item provides the most security concern in mobile security device usage?

  • OS updates
  • Connecting to a trusted website
  • Downloading from safe platforms
  • Strong authentication practices

6. True or False?

Service set identifier is a hardware device which helps connect local mobile or wired devices to a wireless network.

  • True
  • False

7. True or False?

Weak authentication is a security concern for cloud computing on providers end.

  • True
  • False

8. _________________ is a type of Internet-based computing that provides shared computer processing resources such as CPU, memory, disk space or software to remotely based computer systems.

What do you think?

Cloud computing

9. True or False?

Watermarking allows sharing of files or data over the internet such that it can be accessed only by legitimate users with valid encryption-decryption keys.

  • True
  • False

10. _________ attack refers to security breaches by an authorized personnel.

What do you think?

Insider

Week 4: Breach Response quiz answers

The purpose of this module is to teach you how to respond to security breaches when they happen. We will start with the threat landscape and system failures and investigate the interplay between security and reliability, which are essential for building dependable systems. The mechanism of continuous monitoring to detect security breaches, and strategies for forensics, breach response, and recovery will also be described.

1. A _________ is a potential or actual undesirable event that may be malicious or accidental.

Answer: threat

2. True or False?

Threat model can not be implemented into an existing security system.

  • True
  • False

3. ___________ is the ability of a system or component to perform its required functions under stated conditions for a specified period of time.

Answer: Reliability

4. True or False?

Reliability deals with the internal functioning or updates of a system, while security deals with system threats and vulnerabilities.

  • True
  • False

5. Which of the following level activities of an organization’s system is targeted by Data Leaks Prevention (DLP)? (Select all that apply).

  • Client Level
  • Network Level
  • Storage Level

6. True or False?

At present, there are no open source tools for Data Leaks Prevention.

  • True
  • False

7. Which of the following is a type of intruder?

  • Masquerader
  • Clandestine user
  • Misfeasor
  • Masqueraders, Clandestine users, and Misfeasors are all examples of types of intruders

8. True or False?

Nowadays, systems which are 100% secure are available in market.

  • True
  • False

9. Which of the following is the correct order of steps of breach recovery?
Containment of the attack
Follow up of the attack
Monitoring for an attack
Identification of the attack
Recovery from the attack
Eradicate impact of attack

  • 1 → 2→ 3 → 4 → 5 → 6
  • 6 → 5 → 4 → 3 → 2 → 1
  • 3 → 4 → 1 → 6 → 5 → 2
  • 2 → 1 → 6 → 4 → 4 → 5

10. ________________ is a procedure to collect information and digital evidences about any cyber crime so as to present them to law enforcement agencies.

Answer: Cyber forensics

Related content

Basic Statistics Mini-Course

Google Data Analytics Professional Certificate Course 1: Foundations – Cliffs Notes

Google Data Analytics Professional Certificate Course 2: Ask Questions – quiz answers

Google Data Analytics Professional Certificate Course 3: Prepare Data – quiz answers

Google Data Analytics Professional Certificate Course 4: Process Data – quiz answers

Google Data Analytics Professional Certificate Course 5: Analyze Data – quiz answers

Google Data Analytics Professional Certificate Course 6: Share Data – quiz answers

Google Data Analytics Professional Certificate Course 7: Data Analysis with R – quiz answers

Google Data Analytics Professional Certificate Course 8: Capstone – quiz answers

IT career paths – everything you need to know

Back to DTI Courses

1st Annual University of Ottawa Supervisor Bullying ESG Business Risk Assessment Briefing

Disgraced uOttawa President Jacques Frémont ignores bullying problem

How to end supervisor bullying at uOttawa

PhD in DTI uOttawa program review

Rocci Luppicini – Supervisor bullying at uOttawa case updates

The case for policy reform: Tyranny

The trouble with uOttawa Prof. A. Vellino

The ugly truth about uOttawa Prof. Liam Peyton

uOttawa engineering supervisor bullying scandal

uOttawa President Jacques Frémont ignores university bullying problem

uOttawa Prof. Liam Peyton denies academic support to postdoc

Updated uOttawa policies and regulations: A power grab

What you must know about uOttawa Prof. Rocci Luppicini

Why a PhD from uOttawa may not be worth the paper it’s printed on

Why uOttawa Prof. Andre Vellino refused academic support to postdoc

Supervisor Bullying

Text copying is disabled!