Graded Quiz: Analyzing PoS and Insider Breach Case Studies :Cybersecurity Case Studies and Capstone Project (IBM Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1 — Data type used to track stock levels
-
❌ Customer data
-
✅ Inventory data
-
❌ Transaction data
-
❌ Loyalty program data
Explanation:
Inventory data tracks stock levels, reorder points, and product quantities.
2. Question 2 — Data involving discounts & special offers
-
❌ Transaction data
-
❌ Security credentials
-
✅ Promotional data
-
❌ Employee data
Explanation:
Promotions, discounts, and coupons fall under promotional data.
3. Question 3 — Common tactic for installing skimmers
-
❌ Announce intentions
-
❌ Remote hacking
-
✅ Distracting employees to install skimmers undetected
-
❌ Offering money
Explanation:
Fraudsters typically distract staff so they can secretly install skimming devices.
4. Question 4 — Preventing POS skimming
-
❌ Ignore PCI DSS
-
✅ Regular checks + securing POS terminals
-
❌ Allow open access
-
❌ Rely on intuition
Explanation:
Businesses must inspect terminals and enforce strict physical security.
5. Question 5 — Home Depot security shortcoming
-
❌ Overuse of biometrics
-
✅ Lack of proper vulnerability management
-
❌ Outdated antivirus
-
❌ Excessive employee access
Explanation:
Home Depot failed to patch known vulnerabilities, enabling attackers to exploit the system.
6. Question 6 — Crime involving trade secrets
-
❌ Violence
-
✅ Intellectual property theft
-
❌ Espionage
-
❌ Financial crimes
Explanation:
Trade secrets and proprietary formulas fall under IP theft.
7. Question 7 — Stage where attacker gathers resources
-
❌ Escape
-
❌ Exploration
-
❌ Grievance / Ideation
-
✅ Preparation
Explanation:
During Preparation, individuals acquire tools, access, and resources.
8. Question 8 — Experimentation stage description
-
✅ Malicious insider tests and refines their plan
-
❌ Grievances become personal
-
❌ Attack execution
-
❌ Escape plan
Explanation:
Experimentation involves trial runs and fine-tuning malicious actions.
9. Question 9 — Zero-trust architecture
-
❌ Traditional perimeter trust
-
❌ Equal access rights
-
✅ Grants access only after authentication & verification
-
❌ Open system
Explanation:
Zero Trust = “Never trust, always verify.”
10. Question 10 — Importance of continuous monitoring
-
❌ Minimizes IT costs
-
❌ Reduces training
-
✅ Allows quick detection and response to threats
-
❌ Ensures legacy system usage
Explanation:
Monitoring is vital for real-time threat detection and incident response.
🧾 Summary Table
| Q | Correct Answer | Key Concept |
|---|---|---|
| 1 | Inventory data | Stock tracking |
| 2 | Promotional data | Discounts/offers |
| 3 | Distract employees | Skimming tactics |
| 4 | Regular checks & secure POS | Anti-skimming |
| 5 | Lack of vuln management | Home Depot breach |
| 6 | Intellectual property theft | Trade secret crime |
| 7 | Preparation | Resource gathering |
| 8 | Testing plan | Experimentation |
| 9 | Authenticate & verify | Zero-trust |
| 10 | Quick threat response | Continuous monitoring |