Skip to content

Final Exam: Cybersecurity Architecture :Cybersecurity Architecture (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1

Main drawback of overly complex security measures:

  • ❌ Divide network into segments

  • ❌ Divide into macro/micro

  • Complicate the process for legitimate users, leading to circumvention

  • ❌ Difficult to implement

Explanation:
If security is too difficult to use, users bypass it, weakening security.


2. Question 2

Focus of workforce identity management:

  • Managing employee identities within an organization

  • ❌ Managing asset identities

  • ❌ Managing external partners

  • ❌ Managing customer identities


3. Question 3

Most important factor for a BYOD program:

  • ❌ Remote wipe

  • Consent

  • ❌ Monitoring

  • ❌ Software requirements

Explanation:
You must obtain employee consent before enforcing monitoring or wipe policies.


4. Question 4

Definition of micro-segmentation:

  • ❌ Two large segments

  • ❌ Large zones

  • ❌ Macro/micro parts

  • Creating multiple small zones within a network


5. Question 5

Tools for threat hunting:

  • ❌ Sandbox environments

  • ❌ Traffic analysis tools

  • SIEM and XDR tools

  • ❌ MFA tools


6. Question 6

Solution to manage Incident Responses:

  • ❌ SOC

  • ❌ EDR

  • ❌ SIEM

  • SOAR

Explanation:
SOAR systems automate and orchestrate incident response workflows.


7. Question 7

Why use both source code & dynamic scanners?

  • ❌ Speed

  • ❌ Overlapping vulnerabilities

  • ❌ Affordability

  • They identify different types of vulnerabilities


8. Question 8

What does QSC do?

  • ❌ Structure pattern for unstructured data

  • ❌ Generates keys

  • ❌ Manages existing keys

  • Helps keep data safe from quantum threats


9. Question 9

Indicators of Compromise (IoCs):

  • Warning signals that may indicate a potential or ongoing cyberattack

  • ❌ Structure patterns

  • ❌ Tools used by attackers

  • ❌ Signs system has already been compromised


10. Question 10

Primary purpose of SASE:

  • ❌ Only network edge capabilities

  • ❌ Only security edge capabilities

  • Delivering both security and networking capabilities from the cloud at the network edge

  • ❌ Only cloud capabilities


11. Question 11

Principle preventing single point of control:

  • ❌ KISS

  • Separation of Duties

  • ❌ Least Privilege

  • ❌ Defense in Depth


12. Question 12

Threat to Availability and protection method:

  • ❌ Malware + encryption

  • Hardware failure + fail-safes, backups, disaster recovery plans

  • ❌ Phishing + authentication

  • ❌ Tampering + checksums


13. Question 13

TRUE about cybersecurity architect role:

  • ❌ Use security by obscurity

  • ❌ Join at implementation phase

  • ❌ Define coding practices

  • Understand the system and determine what could go wrong


14. Question 14

Multiple devices flooding a victim system:

  • ❌ SYN flood

  • ❌ DoS

  • Distributed Denial of Service (DDoS)

  • ❌ ICMP flood


15. Question 15

Most crucial component to safeguard:

  • Data

  • ❌ Firewalls

  • ❌ Servers

  • ❌ Source code


16. Question 16

Solution for managing high-privilege accounts:

  • PAM

  • ❌ RBAC

  • ❌ IAM

  • ❌ MFA


17. Question 17

What can chatbots expose during debugging?

  • ❌ Developer details

  • Intellectual property

  • ❌ Infrastructure

  • ❌ Test cases


18. Question 18

Drawbacks of chatbot code generation:

  • Can introduce vulnerabilities in code

  • ❌ Use outdated languages

  • ❌ Require uninterrupted internet

  • ❌ Take long time to generate code


19. Question 19

System to create/manage IR cases:

  • ❌ SIEM

  • ❌ XDR

  • ❌ QSC

  • SOAR


20. Question 20

Control dictating allowed hardware/software:

  • ❌ Encryption controls

  • ❌ Wipe-off policy

  • Security policy

  • ❌ Inventory levels


🧾 Summary Table

Q Correct Answer Key Concept
1 Complexity causes user circumvention Usability vs Security
2 Employee identity management Workforce IAM
3 Consent BYOD
4 Multiple small network zones Micro-segmentation
5 SIEM + XDR Threat hunting tools
6 SOAR Incident Response
7 Different vulnerabilities found Static vs Dynamic scans
8 Protects from quantum threats QSC
9 Attack warning signals IoCs
10 Cloud-delivered security + networking SASE
11 Separation of Duties Reduce control concentration
12 HW failure + DR Availability
13 Understand system & risks Architect role
14 DDoS Distributed flooding
15 Data Core asset
16 PAM Privileged access
17 Intellectual property Debugging risk
18 Vulnerabilities in code Chatbot risk
19 SOAR IR case management
20 Security policy Hardware/software governance