Graded Quiz: Analyzing AI-Related Breaches and Ransomware Case Studies :Cybersecurity Case Studies and Capstone Project (IBM Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1 — AI application for defending against financial fraud
-
❌ Spam & phishing prevention
-
✅ Fraud Detection
-
❌ Threat detection & response
-
❌ Reconnaissance
Explanation:
AI-based fraud detection identifies unusual financial activities and prevents fraudulent transactions.
2. Question 2 — AI tool that could have spotted anomalies pre-breach
-
❌ Reconnaissance
-
✅ Automated Network Monitoring
-
❌ Password cracking
-
❌ Malware development
Explanation:
AI-powered network monitoring detects anomalies such as unusual traffic patterns or suspicious access.
3. Question 3 — Tool to prioritize critical vulnerabilities
-
❌ Phishing attacks
-
❌ Behavioral analytics
-
❌ Reconnaissance
-
✅ Vulnerability Management
Explanation:
AI in vulnerability management ranks vulnerabilities by severity and exploit likelihood.
4. Question 4 — How to verify a suspicious video conference request
-
❌ Forward to colleague
-
❌ Accept it immediately
-
❌ Assume legitimacy
-
✅ Use independent channels (e.g., call the official directly)
Explanation:
Always verify through a separate trusted channel to avoid deepfake or impersonation scams.
5. Question 5 — Primary technique used to scrape data via API
-
❌ AI-driven password phishing
-
✅ AI-driven scraping
-
❌ AI-driven encryption
-
❌ AI-driven code injection
Explanation:
Attackers use AI automation to bypass rate limits, extract user data, and mimic legitimate traffic.
6. Question 6 — How ransomware is advancing
-
❌ Faster internet
-
❌ Only large corporations targeted
-
❌ Becoming less common
-
✅ Using more sophisticated encryption methods
Explanation:
Modern ransomware uses strong encryption, double extortion, and automation.
7. Question 7 — What to do in a ransomware attack
-
❌ Pay ransom
-
✅ Disconnect device & report incident
-
❌ Ignore it
-
❌ Post on social media
Explanation:
Disconnecting containment prevents spread; authorities and IR teams must handle the situation.
8. Question 8 — Why regular security audits matter
-
❌ Identify software updates
-
✅ Ensure compliance with regulations
-
❌ Enhance customer relationships
-
❌ Prevent physical theft
Explanation:
Audits verify adherence to legal and industry standards (GDPR, HIPAA, PCI-DSS).
9. Question 9 — Why employee awareness is crucial
-
✅ To teach best practices and avoid phishing
-
❌ Block unauthorized websites
-
❌ Reduce cybersecurity costs
-
❌ Increase satisfaction
Explanation:
Human error is the biggest attack vector—training reduces risk dramatically.
10. Question 10 — Purpose of testing incident response plans
-
❌ Negotiate ransom
-
✅ Ensure swift, coordinated response during an attack
-
❌ Restore data without backups
-
❌ Track origins
Explanation:
Testing ensures teams know roles, steps, and procedures for minimizing ransomware impact.
🧾 Summary Table
| Q | Correct Answer | Key Concept |
|---|---|---|
| 1 | Fraud Detection | AI in financial security |
| 2 | Automated Network Monitoring | Pre-breach anomaly detection |
| 3 | Vulnerability Management | Prioritizing high-risk issues |
| 4 | Verify via independent channels | Avoid impersonation |
| 5 | AI-driven scraping | API exploitation |
| 6 | Advanced encryption | Ransomware evolution |
| 7 | Disconnect & report | Proper ransomware response |
| 8 | Compliance via audits | Regulatory adherence |
| 9 | Employee awareness | Human-centered security |
| 10 | Coordinated IR response | Ransomware preparedness |