Skip to content

Graded Quiz: Analyzing PoS and Insider Breach Case Studies :Cybersecurity Case Studies and Capstone Project (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1 — Data type used to track stock levels

  • ❌ Customer data

  • Inventory data

  • ❌ Transaction data

  • ❌ Loyalty program data

Explanation:
Inventory data tracks stock levels, reorder points, and product quantities.


2. Question 2 — Data involving discounts & special offers

  • ❌ Transaction data

  • ❌ Security credentials

  • Promotional data

  • ❌ Employee data

Explanation:
Promotions, discounts, and coupons fall under promotional data.


3. Question 3 — Common tactic for installing skimmers

  • ❌ Announce intentions

  • ❌ Remote hacking

  • Distracting employees to install skimmers undetected

  • ❌ Offering money

Explanation:
Fraudsters typically distract staff so they can secretly install skimming devices.


4. Question 4 — Preventing POS skimming

  • ❌ Ignore PCI DSS

  • Regular checks + securing POS terminals

  • ❌ Allow open access

  • ❌ Rely on intuition

Explanation:
Businesses must inspect terminals and enforce strict physical security.


5. Question 5 — Home Depot security shortcoming

  • ❌ Overuse of biometrics

  • Lack of proper vulnerability management

  • ❌ Outdated antivirus

  • ❌ Excessive employee access

Explanation:
Home Depot failed to patch known vulnerabilities, enabling attackers to exploit the system.


6. Question 6 — Crime involving trade secrets

  • ❌ Violence

  • Intellectual property theft

  • ❌ Espionage

  • ❌ Financial crimes

Explanation:
Trade secrets and proprietary formulas fall under IP theft.


7. Question 7 — Stage where attacker gathers resources

  • ❌ Escape

  • ❌ Exploration

  • ❌ Grievance / Ideation

  • Preparation

Explanation:
During Preparation, individuals acquire tools, access, and resources.


8. Question 8 — Experimentation stage description

  • Malicious insider tests and refines their plan

  • ❌ Grievances become personal

  • ❌ Attack execution

  • ❌ Escape plan

Explanation:
Experimentation involves trial runs and fine-tuning malicious actions.


9. Question 9 — Zero-trust architecture

  • ❌ Traditional perimeter trust

  • ❌ Equal access rights

  • Grants access only after authentication & verification

  • ❌ Open system

Explanation:
Zero Trust = “Never trust, always verify.”


10. Question 10 — Importance of continuous monitoring

  • ❌ Minimizes IT costs

  • ❌ Reduces training

  • Allows quick detection and response to threats

  • ❌ Ensures legacy system usage

Explanation:
Monitoring is vital for real-time threat detection and incident response.


🧾 Summary Table

Q Correct Answer Key Concept
1 Inventory data Stock tracking
2 Promotional data Discounts/offers
3 Distract employees Skimming tactics
4 Regular checks & secure POS Anti-skimming
5 Lack of vuln management Home Depot breach
6 Intellectual property theft Trade secret crime
7 Preparation Resource gathering
8 Testing plan Experimentation
9 Authenticate & verify Zero-trust
10 Quick threat response Continuous monitoring