Graded Quiz: Security Best Practices :Introduction to Cybersecurity Essentials (IBM Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1 — What evidence confirms fraudulent activity beyond denial?
-
❌ Authorization logs
-
❌ Access control
-
✅ Non-repudiation
-
❌ Authentication records
Explanation:
Non-repudiation ensures actions cannot be denied and provides irrefutable proof.
2. Question 2 — Why use a VPN?
-
❌ Share internet
-
❌ Translate addresses
-
✅ Encrypt data on a public network
-
❌ Allocate IP addresses
Explanation:
VPNs protect data by encrypting it over untrusted networks.
3. Question 3 — Methods requiring more than one authentication factor
Select TWO:
-
❌ Biometrics
-
❌ Fingerprint reader
-
✅ 2FA
-
❌ Access badge
-
✅ Multifactor authentication (MFA)
Explanation:
2FA & MFA explicitly require more than one authentication method.
4. Question 4 — Bank email asking to change password via link
-
✅ Phishing
-
❌ Session hijacking
-
❌ Identity theft
-
❌ Impersonation
Explanation:
A fake email + link designed to steal credentials is phishing.
5. Question 5 — Executive using phone in public; data breach
-
❌ Disabling Bluetooth
-
❌ Multifactor authentication
-
❌ Disabling NFC
-
❌ A firewall
-
Correct Answer: Disabling Bluetooth?
No—the most accurate is: -
❌ Firewall
-
❌ MFA
-
❌ NFC
-
✅ Disabling Bluetooth
Explanation:
The breach likely occurred via wireless eavesdropping. Public-area breaches commonly come from Bluetooth hijacking (Bluejacking/Bluesnarfing).
6. Question 6 — Best use case for asymmetric encryption
-
✅ Protecting data in transit against eavesdropping and tampering
-
❌ Single-key efficiency
-
❌ WWAN card
-
❌ Protecting data at rest
Explanation:
Asymmetric encryption is ideal for secure key exchange & encrypted communication.
7. Question 7 — Reduce spam
-
❌ Change password
-
✅ Only subscribe to legitimate email lists
-
❌ Don’t use throwaway accounts
-
❌ Use folders to organize
Explanation:
Limiting subscriptions reduces spam sources.
8. Question 8 — Securing isolated lab machines
-
❌ Install a VPN
-
✅ Use drive encryption
-
❌ File-level only
-
❌ Network firewall
Explanation:
The machines aren’t network-connected; encryption protects against physical theft.
9. Question 9 — Best place to get new drivers
-
❌ Torrent
-
❌ Google Play
-
❌ Apple App Store
-
✅ Original equipment manufacturer (OEM)
Explanation:
OEM sites provide safe, compatible drivers.
10. Question 10 — Are common passwords ever safe?
-
✅ Common passwords are never safe
-
❌ Easy to remember
-
❌ Length + number
-
❌ Different language
Explanation:
Common passwords are predictable and easily cracked regardless of length.
🧾 Summary Table
| Q# | Correct Answer | Key Concept |
|---|---|---|
| 1 | Non-repudiation | Proof cannot be denied |
| 2 | Encrypt data on public network | VPN purpose |
| 3 | 2FA, MFA | Multi-step authentication |
| 4 | Phishing | Credential theft scam |
| 5 | Disable Bluetooth | Prevent wireless sniffing |
| 6 | Protect data in transit | Asymmetric encryption |
| 7 | Subscribe only to legitimate lists | Spam reduction |
| 8 | Drive encryption | Protect offline machines |
| 9 | OEM website | Safe driver source |
| 10 | Common passwords never safe | Password security |