Skip to content

Module 1 challenge: Understanding Security Threats:IT Security: Defense against the digital dark arts(Google IT Support Professional Certificate) Answers:2025

Question 1

Which of the following is an example of the CIA triad’s confidentiality principle in action?

Protecting online accounts with a password
❌ Preventing data loss
❌ Making sure data hasn’t been tampered with
❌ Preventing an unwanted download

Explanation:
The Confidentiality principle ensures that only authorized users can access information.
Passwords, encryption, and access controls protect confidentiality.

  • Integrity = data not altered (tampering prevention)

  • Availability = ensuring data is accessible


Question 2

Which of the following is an example of a zero-day vulnerability?

A group of hackers finds a flaw in a new software product and takes advantage of it before the vendor or developer finds it.
❌ Voluntary bad download
❌ Adware
❌ Keylogger

Explanation:
A zero-day vulnerability is a security flaw unknown to the vendor, exploited before a patch exists — giving attackers “zero days” to fix it.


Question 3

What kind of malware can block access to data and decrease the availability of security by holding the system hostage?

Ransomware
❌ Spyware
❌ Adware
❌ Logic bomb

Explanation:
Ransomware encrypts files and demands payment to restore access — impacting availability, one of the CIA triad components.


Question 4

An unhappy systems administrator installed malware that attacked after a timed event, rather than when it was installed. What type of malware does this describe?

A logic bomb
❌ Spyware
❌ Ransomware
❌ Rootkit

Explanation:
A logic bomb is triggered by a specific condition or time, not immediately upon installation — often used for sabotage by insiders.


Question 5

A victim connects to a network they think is legitimate, but the network is really an identical network controlled by a hacker. What type of network attack are they a victim of?

An evil twin
❌ Logic bomb
❌ DoS
❌ DNS cache poisoning

Explanation:
An evil twin is a rogue Wi-Fi access point mimicking a legitimate one to intercept sensitive data like passwords or financial info.


Question 6

Which one of the following is a type of DoS attack?

A SYN flood attack
❌ Brute force attack
❌ DNS cache poisoning attack
❌ Rogue AP attack

Explanation:
A SYN flood overwhelms a server by sending excessive connection requests without completing them — a classic Denial of Service (DoS) method.


Question 7

An attacker sends a large number of SYN packets, but does not send any ACK messages back. The connection stays open and uses up the source’s resources. What is this attack called?

A half-open attack
❌ DNS cache poisoning attack
❌ Ping flood
❌ Zero-day exploit

Explanation:
A half-open (SYN flood) attack exploits the TCP handshake process, leaving connections incomplete to exhaust server resources.


Question 8

Which of the following measures can prevent injection attacks?

Input validation
Data sanitization
❌ Flood guards
❌ Log analysis systems

Explanation:
SQL and code injection attacks occur when user input is not properly filtered.

  • Input validation ensures only safe data is accepted.

  • Data sanitization cleans potentially harmful characters or scripts.


Question 9

Which of the following best helps you strengthen your password?

Incorporate symbols, numbers, and capital letters
❌ Pet’s name
❌ Precompiled list
❌ Movie title

Explanation:
Strong passwords are long, unique, and complex, using uppercase, lowercase, numbers, and special symbols — not easily guessed personal info.


Question 10

An attacker leaves a flash drive loaded with malware on a table. Someone plugs the drive into their computer to see what’s on it and accidentally installs malware. What kind of attack is this?

Baiting
❌ Tailgating
❌ Phishing
❌ DDoS

Explanation:
Baiting uses physical or digital “lures” (like USB drives or fake downloads) to trick users into installing malware — a form of social engineering.


🧾 Summary Table

Q# ✅ Correct Answer Concept
1 Protecting accounts with a password CIA – Confidentiality
2 Hackers exploit unknown flaw Zero-day vulnerability
3 Ransomware Malware that locks data
4 Logic bomb Timed or triggered attack
5 Evil twin Fake Wi-Fi attack
6 SYN flood Type of DoS
7 Half-open attack TCP handshake abuse
8 Input validation, Data sanitization Prevent injection attacks
9 Use complex characters Strong password design
10 Baiting Social engineering trick