Final Exam: Cybersecurity Architecture :Cybersecurity Architecture (IBM Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1
Main drawback of overly complex security measures:
-
❌ Divide network into segments
-
❌ Divide into macro/micro
-
✅ Complicate the process for legitimate users, leading to circumvention
-
❌ Difficult to implement
Explanation:
If security is too difficult to use, users bypass it, weakening security.
2. Question 2
Focus of workforce identity management:
-
✅ Managing employee identities within an organization
-
❌ Managing asset identities
-
❌ Managing external partners
-
❌ Managing customer identities
3. Question 3
Most important factor for a BYOD program:
-
❌ Remote wipe
-
✅ Consent
-
❌ Monitoring
-
❌ Software requirements
Explanation:
You must obtain employee consent before enforcing monitoring or wipe policies.
4. Question 4
Definition of micro-segmentation:
-
❌ Two large segments
-
❌ Large zones
-
❌ Macro/micro parts
-
✅ Creating multiple small zones within a network
5. Question 5
Tools for threat hunting:
-
❌ Sandbox environments
-
❌ Traffic analysis tools
-
✅ SIEM and XDR tools
-
❌ MFA tools
6. Question 6
Solution to manage Incident Responses:
-
❌ SOC
-
❌ EDR
-
❌ SIEM
-
✅ SOAR
Explanation:
SOAR systems automate and orchestrate incident response workflows.
7. Question 7
Why use both source code & dynamic scanners?
-
❌ Speed
-
❌ Overlapping vulnerabilities
-
❌ Affordability
-
✅ They identify different types of vulnerabilities
8. Question 8
What does QSC do?
-
❌ Structure pattern for unstructured data
-
❌ Generates keys
-
❌ Manages existing keys
-
✅ Helps keep data safe from quantum threats
9. Question 9
Indicators of Compromise (IoCs):
-
✅ Warning signals that may indicate a potential or ongoing cyberattack
-
❌ Structure patterns
-
❌ Tools used by attackers
-
❌ Signs system has already been compromised
10. Question 10
Primary purpose of SASE:
-
❌ Only network edge capabilities
-
❌ Only security edge capabilities
-
✅ Delivering both security and networking capabilities from the cloud at the network edge
-
❌ Only cloud capabilities
11. Question 11
Principle preventing single point of control:
-
❌ KISS
-
✅ Separation of Duties
-
❌ Least Privilege
-
❌ Defense in Depth
12. Question 12
Threat to Availability and protection method:
-
❌ Malware + encryption
-
✅ Hardware failure + fail-safes, backups, disaster recovery plans
-
❌ Phishing + authentication
-
❌ Tampering + checksums
13. Question 13
TRUE about cybersecurity architect role:
-
❌ Use security by obscurity
-
❌ Join at implementation phase
-
❌ Define coding practices
-
✅ Understand the system and determine what could go wrong
14. Question 14
Multiple devices flooding a victim system:
-
❌ SYN flood
-
❌ DoS
-
✅ Distributed Denial of Service (DDoS)
-
❌ ICMP flood
15. Question 15
Most crucial component to safeguard:
-
✅ Data
-
❌ Firewalls
-
❌ Servers
-
❌ Source code
16. Question 16
Solution for managing high-privilege accounts:
-
✅ PAM
-
❌ RBAC
-
❌ IAM
-
❌ MFA
17. Question 17
What can chatbots expose during debugging?
-
❌ Developer details
-
✅ Intellectual property
-
❌ Infrastructure
-
❌ Test cases
18. Question 18
Drawbacks of chatbot code generation:
-
✅ Can introduce vulnerabilities in code
-
❌ Use outdated languages
-
❌ Require uninterrupted internet
-
❌ Take long time to generate code
19. Question 19
System to create/manage IR cases:
-
❌ SIEM
-
❌ XDR
-
❌ QSC
-
✅ SOAR
20. Question 20
Control dictating allowed hardware/software:
-
❌ Encryption controls
-
❌ Wipe-off policy
-
✅ Security policy
-
❌ Inventory levels
🧾 Summary Table
| Q | Correct Answer | Key Concept |
|---|---|---|
| 1 | Complexity causes user circumvention | Usability vs Security |
| 2 | Employee identity management | Workforce IAM |
| 3 | Consent | BYOD |
| 4 | Multiple small network zones | Micro-segmentation |
| 5 | SIEM + XDR | Threat hunting tools |
| 6 | SOAR | Incident Response |
| 7 | Different vulnerabilities found | Static vs Dynamic scans |
| 8 | Protects from quantum threats | QSC |
| 9 | Attack warning signals | IoCs |
| 10 | Cloud-delivered security + networking | SASE |
| 11 | Separation of Duties | Reduce control concentration |
| 12 | HW failure + DR | Availability |
| 13 | Understand system & risks | Architect role |
| 14 | DDoS | Distributed flooding |
| 15 | Data | Core asset |
| 16 | PAM | Privileged access |
| 17 | Intellectual property | Debugging risk |
| 18 | Vulnerabilities in code | Chatbot risk |
| 19 | SOAR | IR case management |
| 20 | Security policy | Hardware/software governance |