Graded Quiz: Safe Browsing Practices :Introduction to Cybersecurity Essentials (IBM Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1 — Why do hackers target companies?
-
❌ Learn MFA
-
❌ Check unsafe browsing habits
-
✅ To steal sensitive data such as IP, trade secrets, and sell them on the dark web
-
❌ Learn about non-approved apps
Explanation:
The primary motive is financial gain through stolen valuable data.
2. Question 2 — Best protection on unsecured Wi-Fi
-
❌ Root/jailbreak device
-
✅ Use a VPN
-
❌ Password-protected public Wi-Fi
-
❌ Bluetooth
Explanation:
A VPN encrypts traffic, protecting against eavesdropping.
3. Question 3 — Strong password
-
❌ IluvMyCat
-
❌ BlackJack1963
-
✅ X5j13$#eCM19
-
❌ ToBeorNotToBe
Explanation:
Strong passwords contain randomness, numbers, special characters, and no dictionary words.
4. Question 4 — Stranger asked for email → you get spam
-
❌ Impersonation
-
❌ Identity stolen
-
✅ Phishing/social engineering to obtain your email for spamming
-
❌ Email hacked
Explanation:
The attacker collected your email and added it to spam lists.
5. Question 5 — True statement about cookies
-
❌ Cookies contain viruses
-
❌ Cookies do not track activity
-
❌ Cookies slow down hard drive
-
✅ I can get a cookie from a website I’ve never been to
Explanation:
Third-party cookies load from ads or embedded content, even if you never visited that site directly.
6. Question 6 — Valid characteristic of a CA certificate
-
✅ Issued from a trusted Certificate Authority
-
❌ Self-signed
-
❌ Not required for HTTPS
-
❌ Should be hashed with MD5
Explanation:
Trusted CAs issue valid certificates; MD5 is insecure.
7. Question 7 — What is SSL used for?
-
❌ Stop expiration warnings
-
✅ Prevent interception and tampering of data
-
❌ Prevent drive-by malware
-
❌ Prevent SQL injection
Explanation:
SSL/TLS encrypts data in transit.
8. Question 8 — Browser redirects
-
❌ Identity stolen
-
❌ Hacker controlling device
-
❌ Computer part of botnet
-
✅ Computer infected with malware causing redirects
Explanation:
Browser-hijacking malware changes your traffic paths.
9. Question 9 — Risk of rooting/jailbreaking
-
❌ All data deleted
-
❌ Not charged for apps
-
❌ Device bricked (possible but not most common security risk)
-
✅ Data exposed to hackers
Explanation:
Rooting removes built-in protections, exposing system data.
10. Question 10 — Genuine Certificate Authority root store
-
✅ Microsoft
-
❌ Adobe
-
❌ Apple App Store
-
❌ Google Play Store
Explanation:
Microsoft maintains a root certificate store trusted by Windows.
🧾 Summary Table
| Q# | Correct Answer |
|---|---|
| 1 | Steal sensitive data for dark web |
| 2 | VPN |
| 3 | X5j13$#eCM19 |
| 4 | Phishing/social engineering |
| 5 | Can get a cookie from a website never visited |
| 6 | Issued by trusted CA |
| 7 | Prevent data interception/tampering |
| 8 | Malware redirecting browser |
| 9 | Data exposed to hackers |
| 10 | Microsoft |