Graded Quiz: Common Security Threats and Risks :Introduction to Cybersecurity Essentials (IBM Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1 — What does confidentiality mean?
-
❌ Rules that allow access to all parties
-
❌ Prevent data from being changed
-
❌ Hide data
-
✅ Rules that restrict access only to those who need to know
Explanation:
Confidentiality ensures only authorized individuals can access the information.
2. Question 2 — Which part of CIA Triad was broken?
-
❌ Availability
-
❌ Accessibility
-
❌ Data breach
-
✅ Confidentiality
Explanation:
Maria’s private exam results were sent to the wrong person — a confidentiality violation.
3. Question 3 — Why clean whiteboards/desktops?
-
❌ Exposure to logon credentials
-
✅ A loss of intellectual property
-
❌ Social engineering
-
❌ Damage to reputation
Explanation:
Visitors may accidentally see confidential plans, designs, or strategic information.
4. Question 4 — Meaning of PII
-
❌ Protected identity information
-
✅ Personally Identifiable Information
-
❌ Private Internet Identifier
-
❌ Personnel Internal Information
5. Question 5 — David steals a laptop
-
❌ Cyberbullying
-
❌ Identity theft
-
❌ Unauthorized access
-
✅ Hardware theft
Explanation:
Physically stealing a laptop = hardware theft.
6. Question 6 — Searching trash for data
-
❌ Data dump
-
❌ Data leak
-
❌ Snooping
-
✅ Dumpster diving
7. Question 7 — Looking at your screen while logging in
-
❌ Eavesdropping
-
✅ Shoulder surfing
-
❌ MITM
-
❌ Snooping
8. Question 8 — Pop-ups after installing search engine
-
❌ Virus
-
❌ Trojan
-
✅ Adware
-
❌ Spyware
9. Question 9 — Supervisor asks you to use her credentials
-
❌ Ignore request
-
✅ Politely decline; remind her sharing credentials violates policy
-
❌ Do it because she’s a supervisor
-
❌ Forward to IT
10. Question 10 — What is a Trojan Horse?
-
❌ Keylogger
-
❌ Inserts ads
-
✅ Tricks you into installing software that looks legitimate
-
❌ Ransomware
🧾 Summary Table
| Q# | Correct Answer | Key Concept |
|---|---|---|
| 1 | Restrict access only to those who need to know | Confidentiality |
| 2 | Confidentiality | CIA triad |
| 3 | Loss of intellectual property | Physical info protection |
| 4 | Personally Identifiable Information | PII |
| 5 | Hardware theft | Cybercrime type |
| 6 | Dumpster diving | Physical security threat |
| 7 | Shoulder surfing | Credential theft |
| 8 | Adware | Malware type |
| 9 | Decline & cite policy | Credential security |
| 10 | Trick user into installing fake software | Trojan |