Skip to content

Graded Quiz: Analyzing AI-Related Breaches and Ransomware Case Studies :Cybersecurity Case Studies and Capstone Project (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1 — AI application for defending against financial fraud

  • ❌ Spam & phishing prevention

  • Fraud Detection

  • ❌ Threat detection & response

  • ❌ Reconnaissance

Explanation:
AI-based fraud detection identifies unusual financial activities and prevents fraudulent transactions.


2. Question 2 — AI tool that could have spotted anomalies pre-breach

  • ❌ Reconnaissance

  • Automated Network Monitoring

  • ❌ Password cracking

  • ❌ Malware development

Explanation:
AI-powered network monitoring detects anomalies such as unusual traffic patterns or suspicious access.


3. Question 3 — Tool to prioritize critical vulnerabilities

  • ❌ Phishing attacks

  • ❌ Behavioral analytics

  • ❌ Reconnaissance

  • Vulnerability Management

Explanation:
AI in vulnerability management ranks vulnerabilities by severity and exploit likelihood.


4. Question 4 — How to verify a suspicious video conference request

  • ❌ Forward to colleague

  • ❌ Accept it immediately

  • ❌ Assume legitimacy

  • Use independent channels (e.g., call the official directly)

Explanation:
Always verify through a separate trusted channel to avoid deepfake or impersonation scams.


5. Question 5 — Primary technique used to scrape data via API

  • ❌ AI-driven password phishing

  • AI-driven scraping

  • ❌ AI-driven encryption

  • ❌ AI-driven code injection

Explanation:
Attackers use AI automation to bypass rate limits, extract user data, and mimic legitimate traffic.


6. Question 6 — How ransomware is advancing

  • ❌ Faster internet

  • ❌ Only large corporations targeted

  • ❌ Becoming less common

  • Using more sophisticated encryption methods

Explanation:
Modern ransomware uses strong encryption, double extortion, and automation.


7. Question 7 — What to do in a ransomware attack

  • ❌ Pay ransom

  • Disconnect device & report incident

  • ❌ Ignore it

  • ❌ Post on social media

Explanation:
Disconnecting containment prevents spread; authorities and IR teams must handle the situation.


8. Question 8 — Why regular security audits matter

  • ❌ Identify software updates

  • Ensure compliance with regulations

  • ❌ Enhance customer relationships

  • ❌ Prevent physical theft

Explanation:
Audits verify adherence to legal and industry standards (GDPR, HIPAA, PCI-DSS).


9. Question 9 — Why employee awareness is crucial

  • To teach best practices and avoid phishing

  • ❌ Block unauthorized websites

  • ❌ Reduce cybersecurity costs

  • ❌ Increase satisfaction

Explanation:
Human error is the biggest attack vector—training reduces risk dramatically.


10. Question 10 — Purpose of testing incident response plans

  • ❌ Negotiate ransom

  • Ensure swift, coordinated response during an attack

  • ❌ Restore data without backups

  • ❌ Track origins

Explanation:
Testing ensures teams know roles, steps, and procedures for minimizing ransomware impact.


🧾 Summary Table

Q Correct Answer Key Concept
1 Fraud Detection AI in financial security
2 Automated Network Monitoring Pre-breach anomaly detection
3 Vulnerability Management Prioritizing high-risk issues
4 Verify via independent channels Avoid impersonation
5 AI-driven scraping API exploitation
6 Advanced encryption Ransomware evolution
7 Disconnect & report Proper ransomware response
8 Compliance via audits Regulatory adherence
9 Employee awareness Human-centered security
10 Coordinated IR response Ransomware preparedness