40. When handling credit card payments, the organization needs to adhere to the _____.

  • ISO
  • HIPAA
  • PCI DSS
  • IEEE

41. What characteristics are used to assess the severity of found vulnerabilities? Select all that apply.

  • Remotely exploitable or not
  • Type of access gained
  • Chance of exploitation
  • Use of encryption or not

42. Which of the following are bad security habits commonly seen amongst employees in the workplace? Select all that apply.

  • Password on a post-it note
  • Log out of website session
  • Leave laptop logged in and unattended
  • Lock desktop screen

43. Which of the following are examples of security tools that can scan computer systems and networks for vulnerabilities? Select all that apply.

  • Wireshark
  • Nessus
  • OpenVAS
  • Qualys

44. Consider the following scenario:

Your company wants to establish good privacy practices in the workplace so that employee and customer data is properly protected. Well-established and defined privacy policies are in place, but they also need to be enforced. What are some ways to enforce these privacy policies? Select all that apply.

  • Print customer information
  • Audit access logs
  • Apply the principle of least privilege
  • VPN connection

45. Third-party services that require equipment on-site may require a company to do which of the following? Select all that apply.

  • Unrestricted access to the network
  • Provide additional monitoring via a firewall or agentless solution
  • Provide remote access to third-party service provider
  • Evaluate hardware in the lab first

46. What are some behaviors to be encouraged in order to build a security-conscious culture? Select all that apply.

  • Locking your screen
  • Shaming people who haven’t done a good job of ensuring their company’s security
  • Checking website URLs when authenticating
  • Asking security-related questions

Devendra Kumar

Project Management Apprentice at Google

Leave a Reply