Skip to content

Module 2 Graded Quiz: Cybersecurity Threats :Introduction to Cybersecurity Tools & Cyberattacks (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1 — Government-sponsored attacker

  • ❌ Insider threat

  • Nation-state actor

  • ❌ Organized crime

  • ❌ Script kiddie

Explanation:
Nation-states conduct cyberattacks to target critical infrastructure, espionage, or political influence.


2. Question 2 — Competitor finds printed confidential designs

  • ❌ Oblivious insider

  • ❌ Malicious insider

  • Negligent insider

  • ❌ Professional insider

Explanation:
The employee did not intend harm but acted carelessly, exposing sensitive information.


3. Question 3 — Why be aware of AI hallucinations?

  • ❌ Prevent deepfakes

  • ❌ Prevent malicious code

  • ❌ Prevent spam

  • To ensure the assistant answers customer queries accurately

Explanation:
Hallucinations cause AI to generate false or misleading information, affecting product recommendations and customer trust.


4. Question 4 — Protect system from malware

  • ❌ Use others’ systems

  • ❌ Never download files at all

  • ❌ Use systems with GPUs

  • Learn about botnets

Explanation:
Understanding malware (worms, botnets, Trojans) helps you avoid infection and practice safe behavior.


5. Question 5 — Legitimate-looking application that is malicious

  • ❌ Bot

  • ❌ Keylogger

  • Trojan

  • ❌ Worm

Explanation:
Trojans disguise themselves as safe programs to trick users into installing them.


6. Question 6 — Detect new/unknown malware

  • ❌ Caution with email

  • ❌ OS updates

  • ❌ Strong passwords

  • Heuristic analysis

Explanation:
Heuristics detect malware based on behavior patterns, even if it has never been seen before.


7. Question 7 — Purpose of Quad9

  • ❌ Warns about spear phishing

  • Safeguards users against malware & phishing threats

  • ❌ Enhances critical thinking

  • ❌ Adds MFA

Explanation:
Quad9 is a secure DNS service that blocks malicious domains.


8. Question 8 — Tool to secure Linux servers

  • ❌ Keyloggers

  • ❌ Backdoors

  • ❌ Spyware

  • Rootkit hunter

Explanation:
Rootkit Hunter scans Linux systems for rootkits, malware, backdoors, and vulnerabilities.


9. Question 9 — Delivery boy enters by following employee

  • ❌ Whaling

  • Tailgating

  • ❌ Shoulder surfing

  • ❌ Dumpster diving

Explanation:
Tailgating occurs when an unauthorized person gains access by following someone else through a secure door.


10. Question 10 — Suspicious text message with link

  • Smishing

  • ❌ Spoofing

  • ❌ SEO poisoning

  • ❌ Vishing

Explanation:
Smishing = SMS-based phishing.


🧾 Summary Table

Q# Correct Answer
1 Nation-state actor
2 Negligent insider
3 Ensures AI answers accurately
4 Learn about botnets
5 Trojan
6 Heuristic analysis
7 Safeguards users from malware (Quad9)
8 Rootkit hunter
9 Tailgating
10 Smishing