Skip to content

Module 4 Graded Quiz: Identity and Physical Control :Introduction to Cybersecurity Tools & Cyberattacks (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1 — Verifying a user’s permissions

  • ❌ Identity management

  • ❌ Deprovisioning

  • ❌ Provisioning

  • Authorization

Explanation:
Authorization checks whether a user is allowed to perform a specific action.


2. Question 2 — Authentication for high-security research lab

  • ❌ Remote authentication

  • Biometric authentication

  • ❌ Kerberos

  • ❌ OTP

Explanation:
Biometrics (fingerprint, iris, face recognition) rely on unique physical/behavioral traits, ideal for high-security areas.


3. Question 3 — Access control where users cannot change permissions

  • ❌ ABAC

  • Mandatory Access Control (MAC)

  • ❌ RBAC

  • ❌ Rule-based AC

Explanation:
MAC enforces strict policies that users cannot modify, suitable for military environments.


4. Question 4 — Access control device with chips storing credentials

  • Smart cards

  • ❌ Tokens

  • ❌ SSH keys

  • ❌ Certificates

Explanation:
Smart cards contain embedded chips to store credentials and perform secure cryptographic operations.


5. Question 5 — Factors in multifactor authentication

  • ❌ Iris scan + PIN (valid MFA but not the expected diverse answer)

  • ❌ Security question + password (weak)

  • ❌ Fingerprint + retina (both “something you are” → NOT MFA)

  • Password and PIN (Actually No—both are “something you know”)
    Correct MFA must mix categories.
    Correct answer: Iris scan and PIN

Explanation:
MFA = two or more of: something you know, have, or are.

  • Iris scan = something you are

  • PIN = something you know
    So it satisfies true MFA.


6. Question 6 — Former employee with hidden camera

  • Surveillance

  • ❌ Tailgating

  • ❌ Unauthorized access

  • ❌ Dumpster diving

Explanation:
A concealed camera recording inside the facility is an act of covert surveillance.


7. Question 7 — Outdoor measure to log all entries

  • ❌ Access controls

  • Cameras

  • ❌ Alarms

  • ❌ Signage

Explanation:
CCTV cameras record all entries and support access-review activities.


8. Question 8 — Example of human vigilance

  • ❌ Cameras

  • ❌ Motion sensors

  • ❌ Biometric readers

  • Vigilant receptionists

Explanation:
Human vigilance = alert humans noticing unusual behavior.


9. Question 9 — Solution for power disruptions

  • ❌ ESD protection

  • Install backup power supplies

  • ❌ Surge protectors

  • ❌ Climate control

Explanation:
UPS or backup generators prevent downtime during outages.


10. Question 10 — Distinguish harmless vs real threats

  • ❌ AI systems (too general)

  • Intelligent perimeter security systems

  • ❌ Robotic guards

  • ❌ Drone detection

Explanation:
Intelligent perimeter systems use sensors + analytics to filter false alarms (like animals) vs real threats.


🧾 Summary Table

Q# Correct Answer
1 Authorization
2 Biometric authentication
3 MAC
4 Smart cards
5 Iris scan and PIN
6 Surveillance
7 Cameras
8 Vigilant receptionists
9 Backup power supplies
10 Intelligent perimeter security systems