Skip to content

Final Exam :Introduction to Cybersecurity Essentials (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Attack used to steal intellectual property

  • ❌ Impersonation

  • ❌ Replay attack

  • Dumpster diving

  • ❌ Man-in-the-Middle

Explanation:
Dumpster diving can reveal confidential documents, IP, prototypes, or sensitive business plans.


2. Best physical security measure to prevent laptop theft

  • ❌ USB lock

  • ❌ Fire suppression system

  • ❌ Biometric access control

  • Cable lock

Explanation:
A cable lock physically secures the device to a desk.


3. Category used in multifactor authentication

  • Something you have

  • ❌ Something you like

  • ❌ Someone you know

  • ❌ Something you can do


4. SSL stands for

  • ❌ Secure space layer

  • Secure socket layer

  • ❌ Special security license

  • ❌ Straight socket loop


5. Elements of the CIA Triad

  • ❌ Control, Integrity, Accessibility

  • ❌ Confidentiality, Interest, Accessibility

  • Confidentiality, Integrity, Availability

  • ❌ Control, Integrity, Authentication


6. IP in security/privacy stands for

  • Intellectual Property

  • ❌ Internet Privacy

  • ❌ Integrity Protocol

  • ❌ Information Privacy


7. Browser vulnerability

  • ❌ Virus through monitor

  • ❌ Leaving infected browser open

  • A browser plug-in can be exploited

  • ❌ Browsers can’t be exploited


8. Best method to secure data over public Wi-Fi

  • ❌ Database encryption

  • VPN encryption

  • ❌ Disk-level encryption

  • ❌ File-level encryption


9. What is PII?

  • ❌ Any stored data

  • Any data that can identify an individual

  • ❌ Celebrity info

  • ❌ Any employee info


10. Purpose of Trojan malware

  • ❌ Spy on browsing & keystrokes (spyware)

  • Masquerades as benign software but exploits system

  • ❌ Replicate & spread (worm)

  • ❌ Flood a target (DDoS botnet)


11. Zombie cookie defined

  • ❌ Emulates user via VM

  • ❌ Steals identity

  • Doesn’t follow normal deletion protocols & is difficult to remove

  • ❌ Altered into virus-like state


12. What happens when data is encrypted?

  • ❌ Sent to third party

  • ❌ Compressed repeatedly

  • Scrambled so third parties cannot read it

  • ❌ Compressed/archived


13. Two types of firewalls

  • ❌ Internet and home

  • ❌ Digital and electronic

  • Hardware-based and software-based

  • ❌ Remote and local


14. Address indicating SSL-secured session

  • ❌ http://

  • ❌ http.ssl://

  • https://

  • ❌ ssl.http://


15. When is data least vulnerable?

  • ❌ On USB transfer

  • ❌ In transit

  • ❌ Being written

  • At rest

Explanation:
At rest, it is easier to protect with encryption and access controls.


🧾 Summary Table

Q# Correct Answer
1 Dumpster diving
2 Cable lock
3 Something you have
4 Secure socket layer
5 Confidentiality, Integrity, Availability
6 Intellectual Property
7 Browser plug-in exploitation
8 VPN encryption
9 Data identifying an individual
10 Trojan disguises as legitimate software
11 Difficult-to-remove cookie
12 Data is scrambled for privacy
13 Hardware & software firewalls
14 https://
15 At rest