Module 6 challenge: Creating a Company Culture for Security:IT Security: Defense against the digital dark arts(Google IT Support Professional Certificate) Answers:2025
Question 1
When handling credit card payments, the organization needs to adhere to the _____.
✅ PCI DSS
❌ ISO
❌ HIPAA
❌ IEEE
Explanation:
PCI DSS (Payment Card Industry Data Security Standard) defines strict requirements for securing credit card data — including encryption, network segmentation, and secure storage practices.
Question 2
What tools can be used to discover vulnerabilities or dangerous misconfigurations in systems and networks?
✅ Vulnerability scanners
❌ Bastion hosts
❌ Firewalls
❌ Antimalware software
Explanation:
Vulnerability scanners (like Nessus or OpenVAS) automatically identify system weaknesses and insecure configurations, helping teams patch before attackers exploit them.
Question 3
What is penetration testing?
✅ Attempting to break into a system or network for the purpose of verifying the systems in place.
❌ Giving access to a bad actor
❌ Assessing computers for weaknesses (that’s vulnerability scanning)
❌ Phishing emails
Explanation:
Penetration testing (ethical hacking) simulates real attacks to verify how well security controls defend against threats — a proactive step beyond vulnerability scanning.
Question 4
What are some ways to enforce privacy policies?
✅ Apply the principle of least privilege
✅ Audit access logs
❌ VPN connection
❌ Print customer information
Explanation:
-
Least privilege: Give users only the access needed for their role.
-
Audit logs: Review who accessed what and when — detecting unauthorized activity.
Question 5
Which of the following is recommended to secure authentication?
✅ 2-factor authentication
❌ Strong encryption (used for data, not login verification)
❌ Vulnerability scanning
❌ Password rotation
Explanation:
Two-factor authentication (2FA) adds a layer of security by requiring a second verification method (e.g., code, fingerprint) — greatly reducing account compromise risk.
Question 6
When thinking about credential theft, what is one of the greatest workplace cybersecurity risks?
✅ Phishing emails
❌ Keylogging
❌ Credential stealing texts
❌ Blackmail
Explanation:
Phishing is the #1 cause of credential theft — users are tricked into revealing passwords or clicking malicious links that capture credentials.
Question 7
What is a quick way of evaluating a third party’s security?
✅ A security assessment questionnaire
❌ Manual review
❌ Penetration testing
❌ Signed contract
Explanation:
Security questionnaires help evaluate third-party vendors’ security practices efficiently — covering controls like encryption, access management, and compliance.
Question 8
Google provides free _____, which is a good starting point when assessing third-party vendors.
✅ vendor security assessment questionnaires
❌ Business apps
❌ Cloud storage
❌ Mobile phone services
Explanation:
Google provides free Vendor Security Assessment Questionnaires (VSAQ) to help organizations evaluate vendor cybersecurity posture.
Question 9
What are some behaviors to encourage to build a security-conscious culture?
✅ Asking security-related questions
✅ Checking website URLs when authenticating
✅ Locking your screen
❌ Shaming people
Explanation:
Security culture grows through positive reinforcement and awareness — encouraging vigilance, responsible device use, and teamwork.
Question 10
Once the scope of the incident is determined, the next step would be _____.
✅ containment
❌ remediation
❌ documentation
❌ escalation
Explanation:
After identifying the scope of an incident, the next immediate action is containment — isolating affected systems to prevent further spread or damage before remediation.
🧾 Summary Table
| Q# | ✅ Correct Answer | Concept |
|---|---|---|
| 1 | PCI DSS | Credit card data security |
| 2 | Vulnerability scanners | Detect system weaknesses |
| 3 | Penetration testing | Ethical hacking simulation |
| 4 | Least privilege, Audit logs | Enforcing privacy |
| 5 | 2FA | Strengthen authentication |
| 6 | Phishing emails | Common credential theft method |
| 7 | Security assessment questionnaire | Vendor evaluation |
| 8 | Vendor security assessment questionnaires | Google tool |
| 9 | Ask questions, check URLs, lock screen | Building security culture |
| 10 | Containment | Next step after scoping incident |