Graded Quiz: Analyzing Case Study Layouts and Phishing Case Studies :Cybersecurity Case Studies and Capstone Project (IBM Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1 — What do scammers want when asking users to open a payment link?
-
✅ Credit card data
-
❌ Personal interests
-
❌ Financial opportunities
-
❌ Browser history
Explanation:
Payment–related phishing links aim to steal credit card information and banking details.
2. Question 2 — What raises suspicion of phishing?
-
❌ Customized greeting and logos
-
❌ High-quality graphics
-
✅ Personal spelling errors
-
❌ Legitimate service alerts
Explanation:
Phishing emails often contain spelling/grammar issues, a major red flag.
3. Question 3 — Why understand phishing scams?
-
❌ Entertain recipients
-
❌ Advertise products
-
❌ Steal personal info
-
✅ Improve email security
Explanation:
Understanding phishing helps individuals protect themselves and secure communications.
4. Question 4 — How users are redirected in pharming attacks?
-
✅ DNS manipulation or malware
-
❌ Email scams
-
❌ Fake calls
-
❌ Account hacking
Explanation:
Pharming alters DNS settings or installs malware to redirect users to fake sites.
5. Question 5 — What is phishing?
-
❌ Physical access attack
-
❌ Hardware hack
-
❌ Legal patent process
-
✅ Fraudulent attempt to steal sensitive information using deception
Explanation:
Phishing tricks users into giving login credentials, banking info, etc.
6. Question 6 — Key characteristic of social engineering in phishing
-
❌ Exploiting software
-
❌ Complex algorithms
-
❌ Physical tampering
-
✅ Manipulating people into revealing information
Explanation:
Phishing relies on human psychology, not technical exploits.
7. Question 7 — Why trace the money trail?
-
❌ Improve reputation
-
✅ Identifies where the funds went and who is involved
-
❌ Guarantees full recovery
-
❌ Prevents all future threats
Explanation:
Following the money uncovers scammers, cash mules, and accounts involved.
8. Question 8 — Why are people deceived into becoming cash mules?
-
❌ Part of syndicate
-
❌ Think they help law enforcement
-
❌ They get huge sums instantly
-
✅ They see it as an easy job with minimal requirements
Explanation:
Cash mule recruitment often promises easy money for little effort.
9. Question 9 — Critical step to prevent vishing
-
❌ Change phone number
-
✅ Keep personal info private & verify caller identity
-
❌ Strong Wi-Fi password
-
❌ Antivirus software
Explanation:
Vishing relies on impersonation, so confirming identity is essential.
10. Question 10 — Why vishing has high financial impact?
-
❌ Targets wealthy people only
-
❌ Uses complex software
-
❌ Relies on physical mail
-
❌ Small payments over time
-
Correct Answer: Not listed in choices
However, the closest correct option based on standard cybersecurity knowledge:
They often target individuals with substantial assets. → This is the most reasonable of the provided answers.
So:
-
✅ They often target individuals with substantial assets.
-
❌ Others
Explanation:
Vishing scammers often target people who are more likely to pay large sums quickly, such as seniors or high-net-worth individuals.
🧾 Summary Table
| Q | Correct Answer | Key Concept |
|---|---|---|
| 1 | Credit card data | Payment fraud |
| 2 | Spelling errors | Phishing indicator |
| 3 | Improve email security | Awareness |
| 4 | DNS manipulation / malware | Pharming |
| 5 | Fraudulent info-stealing attempt | Phishing |
| 6 | Manipulating people | Social engineering |
| 7 | Identify fund flow | Money trail |
| 8 | Easy job illusion | Cash mule recruitment |
| 9 | Verify caller identity | Anti-vishing |
| 10 | Targets high-asset individuals | Financial impact |