Skip to content

Graded Quiz: Common Security Threats and Risks :Introduction to Cybersecurity Essentials (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1 — What does confidentiality mean?

  • ❌ Rules that allow access to all parties

  • ❌ Prevent data from being changed

  • ❌ Hide data

  • Rules that restrict access only to those who need to know

Explanation:
Confidentiality ensures only authorized individuals can access the information.


2. Question 2 — Which part of CIA Triad was broken?

  • ❌ Availability

  • ❌ Accessibility

  • ❌ Data breach

  • Confidentiality

Explanation:
Maria’s private exam results were sent to the wrong person — a confidentiality violation.


3. Question 3 — Why clean whiteboards/desktops?

  • ❌ Exposure to logon credentials

  • A loss of intellectual property

  • ❌ Social engineering

  • ❌ Damage to reputation

Explanation:
Visitors may accidentally see confidential plans, designs, or strategic information.


4. Question 4 — Meaning of PII

  • ❌ Protected identity information

  • Personally Identifiable Information

  • ❌ Private Internet Identifier

  • ❌ Personnel Internal Information


5. Question 5 — David steals a laptop

  • ❌ Cyberbullying

  • ❌ Identity theft

  • ❌ Unauthorized access

  • Hardware theft

Explanation:
Physically stealing a laptop = hardware theft.


6. Question 6 — Searching trash for data

  • ❌ Data dump

  • ❌ Data leak

  • ❌ Snooping

  • Dumpster diving


7. Question 7 — Looking at your screen while logging in

  • ❌ Eavesdropping

  • Shoulder surfing

  • ❌ MITM

  • ❌ Snooping


8. Question 8 — Pop-ups after installing search engine

  • ❌ Virus

  • ❌ Trojan

  • Adware

  • ❌ Spyware


9. Question 9 — Supervisor asks you to use her credentials

  • ❌ Ignore request

  • Politely decline; remind her sharing credentials violates policy

  • ❌ Do it because she’s a supervisor

  • ❌ Forward to IT


10. Question 10 — What is a Trojan Horse?

  • ❌ Keylogger

  • ❌ Inserts ads

  • Tricks you into installing software that looks legitimate

  • ❌ Ransomware


🧾 Summary Table

Q# Correct Answer Key Concept
1 Restrict access only to those who need to know Confidentiality
2 Confidentiality CIA triad
3 Loss of intellectual property Physical info protection
4 Personally Identifiable Information PII
5 Hardware theft Cybercrime type
6 Dumpster diving Physical security threat
7 Shoulder surfing Credential theft
8 Adware Malware type
9 Decline & cite policy Credential security
10 Trick user into installing fake software Trojan