Skip to content

Graded Quiz: Analyzing Case Study Layouts and Phishing Case Studies :Cybersecurity Case Studies and Capstone Project (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1 — What do scammers want when asking users to open a payment link?

  • Credit card data

  • ❌ Personal interests

  • ❌ Financial opportunities

  • ❌ Browser history

Explanation:
Payment–related phishing links aim to steal credit card information and banking details.


2. Question 2 — What raises suspicion of phishing?

  • ❌ Customized greeting and logos

  • ❌ High-quality graphics

  • Personal spelling errors

  • ❌ Legitimate service alerts

Explanation:
Phishing emails often contain spelling/grammar issues, a major red flag.


3. Question 3 — Why understand phishing scams?

  • ❌ Entertain recipients

  • ❌ Advertise products

  • ❌ Steal personal info

  • Improve email security

Explanation:
Understanding phishing helps individuals protect themselves and secure communications.


4. Question 4 — How users are redirected in pharming attacks?

  • DNS manipulation or malware

  • ❌ Email scams

  • ❌ Fake calls

  • ❌ Account hacking

Explanation:
Pharming alters DNS settings or installs malware to redirect users to fake sites.


5. Question 5 — What is phishing?

  • ❌ Physical access attack

  • ❌ Hardware hack

  • ❌ Legal patent process

  • Fraudulent attempt to steal sensitive information using deception

Explanation:
Phishing tricks users into giving login credentials, banking info, etc.


6. Question 6 — Key characteristic of social engineering in phishing

  • ❌ Exploiting software

  • ❌ Complex algorithms

  • ❌ Physical tampering

  • Manipulating people into revealing information

Explanation:
Phishing relies on human psychology, not technical exploits.


7. Question 7 — Why trace the money trail?

  • ❌ Improve reputation

  • Identifies where the funds went and who is involved

  • ❌ Guarantees full recovery

  • ❌ Prevents all future threats

Explanation:
Following the money uncovers scammers, cash mules, and accounts involved.


8. Question 8 — Why are people deceived into becoming cash mules?

  • ❌ Part of syndicate

  • ❌ Think they help law enforcement

  • ❌ They get huge sums instantly

  • They see it as an easy job with minimal requirements

Explanation:
Cash mule recruitment often promises easy money for little effort.


9. Question 9 — Critical step to prevent vishing

  • ❌ Change phone number

  • Keep personal info private & verify caller identity

  • ❌ Strong Wi-Fi password

  • ❌ Antivirus software

Explanation:
Vishing relies on impersonation, so confirming identity is essential.


10. Question 10 — Why vishing has high financial impact?

  • ❌ Targets wealthy people only

  • ❌ Uses complex software

  • ❌ Relies on physical mail

  • ❌ Small payments over time

  • Correct Answer: Not listed in choices

However, the closest correct option based on standard cybersecurity knowledge:

They often target individuals with substantial assets. → This is the most reasonable of the provided answers.

So:

  • They often target individuals with substantial assets.

  • ❌ Others

Explanation:
Vishing scammers often target people who are more likely to pay large sums quickly, such as seniors or high-net-worth individuals.


🧾 Summary Table

Q Correct Answer Key Concept
1 Credit card data Payment fraud
2 Spelling errors Phishing indicator
3 Improve email security Awareness
4 DNS manipulation / malware Pharming
5 Fraudulent info-stealing attempt Phishing
6 Manipulating people Social engineering
7 Identify fund flow Money trail
8 Easy job illusion Cash mule recruitment
9 Verify caller identity Anti-vishing
10 Targets high-asset individuals Financial impact