it security defense against the digital dark arts week 6 answers

Risk in the Workplace

1. What are some examples of security goals that you may have for an organization? Check all that apply.

  • To protect customer data from unauthorized access
  • To prevent unauthorized access to customer credentials
  • To implement a strong password policy
  • To deploy an Intrusion Prevention System

2. Which of these would you consider high-value targets for a potential attacker? Check all that apply.

  • Authentication databases
  • Customer credit card information
  • Logging server
  • Networked printers

3. What's the purpose of a vulnerability scanner?

  • It protects your network from malware.
  • It blocks malicious traffic from entering your network.
  • It detects vulnerabilities on your network and systems.
  • It fixes vulnerabilities on systems.

4. What are some restrictions that should apply to sensitive and confidential data? Check all that apply.

  • It can be transferred via email.
  • It can be accessed and stored on personal devices.
  • It can be accessed and stored on personal devices.
  • It can be stored on encrypted media only.

5. What's a privacy policy designed to guard against?

  • Eavesdropping on communications
  • Misuse or abuse of sensitive data
  • Attackers stealing customer data
  • Denial-of-service attacks

Devendra Kumar

Project Management Apprentice at Google

Leave a Reply