Final Project Graded Quiz: Recommendations to Improve Network Security :Cybersecurity Architecture (IBM Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1
Primary issue with Jackson Corporation’s firewall setup:
-
❌ Only filters external traffic
-
❌ Only filters internal traffic
-
❌ Does not filter any traffic
-
✅ The firewall indiscriminately filters both external and internal traffic
Explanation:
The firewall treats all traffic the same, preventing proper internal vs external security controls.
2. Question 2
Best solution to address the security gap:
-
✅ Introducing a dual firewall structure
-
❌ Replacing the firewall with a stronger one
-
❌ Enhancing with software
-
❌ Removing the firewall
Explanation:
Dual firewalls allow separate filtering for external and internal traffic, improving security segmentation.
3. Question 3
Why is Jackson’s web server vulnerable? (Select two)
-
✅ Because the server is located inside the organization’s primary network
-
❌ Protected by multiple firewalls
-
❌ Located outside the main network
-
✅ Because the server is protected only by a basic firewall
Explanation:
Keeping the server inside the internal network exposes the internal system to outside threats.
4. Question 4
Primary benefit of implementing a DMZ:
-
❌ Makes server faster
-
✅ Isolates web server from internal network, improving security
-
❌ Allows more users
-
❌ Reduces cost
Explanation:
A DMZ creates a buffer zone between the internet and internal systems.
5. Question 5
What is missing from their infrastructure?
-
❌ Interconnectivity
-
❌ Operational efficiency
-
✅ Centralized monitoring, logging, and analyzing security events
-
❌ Wireless networks
Explanation:
They lack a consolidated security view — a SIEM.
6. Question 6
Primary benefit of SIEM:
-
❌ Reduces detection speed
-
✅ Provides a centralized view of network security
-
❌ Allows device interconnection
-
❌ Reduces efficiency
Explanation:
SIEM collects, correlates, and analyzes logs in one place.
7. Question 7
Primary limitation of current monitoring:
-
✅ Inability to provide real-time alerts on security threats
-
❌ Cannot check network health
-
❌ Cannot monitor traffic
-
❌ Cannot detect downtime
Explanation:
They can monitor basic metrics but cannot detect threats live.
8. Question 8
How IDS enhances security:
-
❌ Provides basic performance metrics
-
✅ Monitors network for incidents and logs them
-
❌ Limits network traffic
-
❌ Reduces downtime
Explanation:
IDS detects suspicious activity and helps identify attacks early.
9. Question 9
Why is a VPN necessary?
-
✅ Secure remote access to company network
-
❌ Increase internet speed
-
❌ Extra cloud storage
-
❌ Free internet
Explanation:
VPN encrypts traffic for remote workers.
10. Question 10
Risks of accessing corporate resources over public networks:
-
✅ Data can be intercepted and compromised
-
❌ Internet speed issues
-
❌ Website might crash
-
❌ Open access to internet
Explanation:
Public networks are easy for attackers to monitor or intercept.
11. Question 11
Drawbacks of waterfall model? (Select two)
-
✅ Not adaptable to changes
-
❌ Developers focus on functionality over security (not inherently true)
-
❌ Chatbots focus on security (irrelevant)
-
✅ Does not allow regular code reviews
Explanation:
Waterfall is rigid and lacks iterative checking like Agile models.
12. Question 12
Benefit of adopting secure coding practices:
-
❌ Speeds up development
-
❌ Eliminates code reviews
-
❌ Reduces cost
-
✅ Integrates security into every development stage
Explanation:
Secure coding bakes security into design, implementation, testing, and deployment.
🧾 Summary Table
| Q | Correct Answer | Key Concept |
|---|---|---|
| 1 | Filters all traffic indiscriminately | Firewall misconfiguration |
| 2 | Dual firewall structure | Segmentation |
| 3 | Inside network + basic firewall | Web server vulnerability |
| 4 | Isolates server | DMZ |
| 5 | Central monitoring missing | SIEM need |
| 6 | Centralized security view | SIEM |
| 7 | No real-time threat alerts | Monitoring gap |
| 8 | IDS monitors/logs incidents | Intrusion detection |
| 9 | Secure remote access | VPN |
| 10 | Data interception risk | Public network danger |
| 11 | No adaptability + no reviews | Waterfall problems |
| 12 | Security integrated in SDLC | Secure coding |