Skip to content

IT Security: Defense against the digital dark arts(Google IT Support Professional Certificate)

Course Assignments

Module 1 challenge: Understanding Security Threats:IT Security: Defense against the digital dark arts(Google IT Support Professional Certificate) Answers:2025

Question 1 Which of the following is an example of the CIA triad’s confidentiality principle in action? ✅ Protecting online accounts with a password❌ Preventing data loss❌ Making sure data hasn’t been tampered with❌ Preventing an unwanted download Explanation:The Confidentiality principle ensures that only authorized users can access information.→ Passwords, encryption, and access controls protect… <a href="https://codeshala.io/platform/coursera/course/it-security-defense-against-the-digital-dark-artsgoogle-it-support-professional-certificate/assignment/module-1-challenge-understanding-security-threatsit-security-defense-against-the-digital-dark-artsgoogle-it-support-professional-certificate-answers2025/" rel="bookmark"><span class="screen-reader-text">Module 1 challenge: Understanding Security Threats:IT Security: Defense against the digital dark arts(Google IT Support Professional Certificate) Answers:2025</span></a>

Module 2 challenge: Pelcgbybtl (Cryptology):IT Security: Defense against the digital dark arts(Google IT Support Professional Certificate) Answers:2025

Question 1 The logic used to convert plaintext into ciphertext is called a(n) ______. ✅ Encryption algorithm❌ Integrity check❌ Permutation❌ Data protection standard Explanation:An encryption algorithm is the mathematical process that converts readable data (plaintext) into unreadable form (ciphertext) using a key. Question 2 How can you make a symmetric encryption key more difficult to… <a href="https://codeshala.io/platform/coursera/course/it-security-defense-against-the-digital-dark-artsgoogle-it-support-professional-certificate/assignment/module-2-challenge-pelcgbybtl-cryptologyit-security-defense-against-the-digital-dark-artsgoogle-it-support-professional-certificate-answers2025/" rel="bookmark"><span class="screen-reader-text">Module 2 challenge: Pelcgbybtl (Cryptology):IT Security: Defense against the digital dark arts(Google IT Support Professional Certificate) Answers:2025</span></a>

Module 3 challenge: Authentication, Authorization, Accounting:IT Security: Defense against the digital dark arts(Google IT Support Professional Certificate) Answers:2025

Question 1 Fill in the blank: In the world of AAA security, “authz” is short for _____. ✅ authorization❌ authentication❌ authored❌ authoritarian Explanation:In the AAA (Authentication, Authorization, and Accounting) model, Authn = Authentication → Verifies who you are. Authz = Authorization → Decides what you’re allowed to do. Question 2 Authorization is concerned with determining… <a href="https://codeshala.io/platform/coursera/course/it-security-defense-against-the-digital-dark-artsgoogle-it-support-professional-certificate/assignment/module-3-challenge-authentication-authorization-accountingit-security-defense-against-the-digital-dark-artsgoogle-it-support-professional-certificate-answers2025/" rel="bookmark"><span class="screen-reader-text">Module 3 challenge: Authentication, Authorization, Accounting:IT Security: Defense against the digital dark arts(Google IT Support Professional Certificate) Answers:2025</span></a>

Module 4 challenge: Securing Your Networks:IT Security: Defense against the digital dark arts(Google IT Support Professional Certificate) Answers:2025

Question 1 Which tenet of security are flood guards designed to help ensure? ✅ Availability❌ Authentication❌ Authorization❌ Accounting Explanation:Flood guards protect against DoS (Denial-of-Service) and DDoS (Distributed Denial-of-Service) attacks. These attacks aim to make a network or service unavailable. Flood guards maintain availability, one of the CIA triad principles (Confidentiality, Integrity, Availability). Question 2 What… <a href="https://codeshala.io/platform/coursera/course/it-security-defense-against-the-digital-dark-artsgoogle-it-support-professional-certificate/assignment/module-4-challenge-securing-your-networksit-security-defense-against-the-digital-dark-artsgoogle-it-support-professional-certificate-answers2025/" rel="bookmark"><span class="screen-reader-text">Module 4 challenge: Securing Your Networks:IT Security: Defense against the digital dark arts(Google IT Support Professional Certificate) Answers:2025</span></a>

Module 5 challenge: Defense in Depth:IT Security: Defense against the digital dark arts(Google IT Support Professional Certificate) Answers:2025

Question 1 A hacker gained access to a network through malicious email attachments. Which one of these is important when talking about methods that allow a hacker to gain this access? ✅ An attack vector❌ An attack surface❌ An ACL❌ A 0-day Explanation:An attack vector is the method or pathway a hacker uses to gain… <a href="https://codeshala.io/platform/coursera/course/it-security-defense-against-the-digital-dark-artsgoogle-it-support-professional-certificate/assignment/module-5-challenge-defense-in-depthit-security-defense-against-the-digital-dark-artsgoogle-it-support-professional-certificate-answers2025/" rel="bookmark"><span class="screen-reader-text">Module 5 challenge: Defense in Depth:IT Security: Defense against the digital dark arts(Google IT Support Professional Certificate) Answers:2025</span></a>

Module 6 challenge: Creating a Company Culture for Security:IT Security: Defense against the digital dark arts(Google IT Support Professional Certificate) Answers:2025

Question 1 When handling credit card payments, the organization needs to adhere to the _____. ✅ PCI DSS❌ ISO❌ HIPAA❌ IEEE Explanation:PCI DSS (Payment Card Industry Data Security Standard) defines strict requirements for securing credit card data — including encryption, network segmentation, and secure storage practices. Question 2 What tools can be used to discover… <a href="https://codeshala.io/platform/coursera/course/it-security-defense-against-the-digital-dark-artsgoogle-it-support-professional-certificate/assignment/module-6-challenge-creating-a-company-culture-for-securityit-security-defense-against-the-digital-dark-artsgoogle-it-support-professional-certificate-answers2025/" rel="bookmark"><span class="screen-reader-text">Module 6 challenge: Creating a Company Culture for Security:IT Security: Defense against the digital dark arts(Google IT Support Professional Certificate) Answers:2025</span></a>