Skip to content

Final Project Graded Quiz: Recommendations to Improve Network Security :Cybersecurity Architecture (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1

Primary issue with Jackson Corporation’s firewall setup:

  • ❌ Only filters external traffic

  • ❌ Only filters internal traffic

  • ❌ Does not filter any traffic

  • The firewall indiscriminately filters both external and internal traffic

Explanation:
The firewall treats all traffic the same, preventing proper internal vs external security controls.


2. Question 2

Best solution to address the security gap:

  • Introducing a dual firewall structure

  • ❌ Replacing the firewall with a stronger one

  • ❌ Enhancing with software

  • ❌ Removing the firewall

Explanation:
Dual firewalls allow separate filtering for external and internal traffic, improving security segmentation.


3. Question 3

Why is Jackson’s web server vulnerable? (Select two)

  • Because the server is located inside the organization’s primary network

  • ❌ Protected by multiple firewalls

  • ❌ Located outside the main network

  • Because the server is protected only by a basic firewall

Explanation:
Keeping the server inside the internal network exposes the internal system to outside threats.


4. Question 4

Primary benefit of implementing a DMZ:

  • ❌ Makes server faster

  • Isolates web server from internal network, improving security

  • ❌ Allows more users

  • ❌ Reduces cost

Explanation:
A DMZ creates a buffer zone between the internet and internal systems.


5. Question 5

What is missing from their infrastructure?

  • ❌ Interconnectivity

  • ❌ Operational efficiency

  • Centralized monitoring, logging, and analyzing security events

  • ❌ Wireless networks

Explanation:
They lack a consolidated security view — a SIEM.


6. Question 6

Primary benefit of SIEM:

  • ❌ Reduces detection speed

  • Provides a centralized view of network security

  • ❌ Allows device interconnection

  • ❌ Reduces efficiency

Explanation:
SIEM collects, correlates, and analyzes logs in one place.


7. Question 7

Primary limitation of current monitoring:

  • Inability to provide real-time alerts on security threats

  • ❌ Cannot check network health

  • ❌ Cannot monitor traffic

  • ❌ Cannot detect downtime

Explanation:
They can monitor basic metrics but cannot detect threats live.


8. Question 8

How IDS enhances security:

  • ❌ Provides basic performance metrics

  • Monitors network for incidents and logs them

  • ❌ Limits network traffic

  • ❌ Reduces downtime

Explanation:
IDS detects suspicious activity and helps identify attacks early.


9. Question 9

Why is a VPN necessary?

  • Secure remote access to company network

  • ❌ Increase internet speed

  • ❌ Extra cloud storage

  • ❌ Free internet

Explanation:
VPN encrypts traffic for remote workers.


10. Question 10

Risks of accessing corporate resources over public networks:

  • Data can be intercepted and compromised

  • ❌ Internet speed issues

  • ❌ Website might crash

  • ❌ Open access to internet

Explanation:
Public networks are easy for attackers to monitor or intercept.


11. Question 11

Drawbacks of waterfall model? (Select two)

  • Not adaptable to changes

  • ❌ Developers focus on functionality over security (not inherently true)

  • ❌ Chatbots focus on security (irrelevant)

  • Does not allow regular code reviews

Explanation:
Waterfall is rigid and lacks iterative checking like Agile models.


12. Question 12

Benefit of adopting secure coding practices:

  • ❌ Speeds up development

  • ❌ Eliminates code reviews

  • ❌ Reduces cost

  • Integrates security into every development stage

Explanation:
Secure coding bakes security into design, implementation, testing, and deployment.


🧾 Summary Table

Q Correct Answer Key Concept
1 Filters all traffic indiscriminately Firewall misconfiguration
2 Dual firewall structure Segmentation
3 Inside network + basic firewall Web server vulnerability
4 Isolates server DMZ
5 Central monitoring missing SIEM need
6 Centralized security view SIEM
7 No real-time threat alerts Monitoring gap
8 IDS monitors/logs incidents Intrusion detection
9 Secure remote access VPN
10 Data interception risk Public network danger
11 No adaptability + no reviews Waterfall problems
12 Security integrated in SDLC Secure coding