Skip to content

Graded Quiz: Security Best Practices  :Introduction to Cybersecurity Essentials (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1 — What evidence confirms fraudulent activity beyond denial?

  • ❌ Authorization logs

  • ❌ Access control

  • Non-repudiation

  • ❌ Authentication records

Explanation:
Non-repudiation ensures actions cannot be denied and provides irrefutable proof.


2. Question 2 — Why use a VPN?

  • ❌ Share internet

  • ❌ Translate addresses

  • Encrypt data on a public network

  • ❌ Allocate IP addresses

Explanation:
VPNs protect data by encrypting it over untrusted networks.


3. Question 3 — Methods requiring more than one authentication factor

Select TWO:

  • ❌ Biometrics

  • ❌ Fingerprint reader

  • 2FA

  • ❌ Access badge

  • Multifactor authentication (MFA)

Explanation:
2FA & MFA explicitly require more than one authentication method.


4. Question 4 — Bank email asking to change password via link

  • Phishing

  • ❌ Session hijacking

  • ❌ Identity theft

  • ❌ Impersonation

Explanation:
A fake email + link designed to steal credentials is phishing.


5. Question 5 — Executive using phone in public; data breach

  • ❌ Disabling Bluetooth

  • ❌ Multifactor authentication

  • ❌ Disabling NFC

  • ❌ A firewall

  • Correct Answer: Disabling Bluetooth?
    No—the most accurate is:

  • ❌ Firewall

  • ❌ MFA

  • ❌ NFC

  • Disabling Bluetooth

Explanation:
The breach likely occurred via wireless eavesdropping. Public-area breaches commonly come from Bluetooth hijacking (Bluejacking/Bluesnarfing).


6. Question 6 — Best use case for asymmetric encryption

  • Protecting data in transit against eavesdropping and tampering

  • ❌ Single-key efficiency

  • ❌ WWAN card

  • ❌ Protecting data at rest

Explanation:
Asymmetric encryption is ideal for secure key exchange & encrypted communication.


7. Question 7 — Reduce spam

  • ❌ Change password

  • Only subscribe to legitimate email lists

  • ❌ Don’t use throwaway accounts

  • ❌ Use folders to organize

Explanation:
Limiting subscriptions reduces spam sources.


8. Question 8 — Securing isolated lab machines

  • ❌ Install a VPN

  • Use drive encryption

  • ❌ File-level only

  • ❌ Network firewall

Explanation:
The machines aren’t network-connected; encryption protects against physical theft.


9. Question 9 — Best place to get new drivers

  • ❌ Torrent

  • ❌ Google Play

  • ❌ Apple App Store

  • Original equipment manufacturer (OEM)

Explanation:
OEM sites provide safe, compatible drivers.


10. Question 10 — Are common passwords ever safe?

  • Common passwords are never safe

  • ❌ Easy to remember

  • ❌ Length + number

  • ❌ Different language

Explanation:
Common passwords are predictable and easily cracked regardless of length.


🧾 Summary Table

Q# Correct Answer Key Concept
1 Non-repudiation Proof cannot be denied
2 Encrypt data on public network VPN purpose
3 2FA, MFA Multi-step authentication
4 Phishing Credential theft scam
5 Disable Bluetooth Prevent wireless sniffing
6 Protect data in transit Asymmetric encryption
7 Subscribe only to legitimate lists Spam reduction
8 Drive encryption Protect offline machines
9 OEM website Safe driver source
10 Common passwords never safe Password security