Final Exam :Introduction to Cybersecurity Essentials (IBM Cybersecurity Analyst Professional Certificate) Answers 2025
1. Attack used to steal intellectual property
-
❌ Impersonation
-
❌ Replay attack
-
✅ Dumpster diving
-
❌ Man-in-the-Middle
Explanation:
Dumpster diving can reveal confidential documents, IP, prototypes, or sensitive business plans.
2. Best physical security measure to prevent laptop theft
-
❌ USB lock
-
❌ Fire suppression system
-
❌ Biometric access control
-
✅ Cable lock
Explanation:
A cable lock physically secures the device to a desk.
3. Category used in multifactor authentication
-
✅ Something you have
-
❌ Something you like
-
❌ Someone you know
-
❌ Something you can do
4. SSL stands for
-
❌ Secure space layer
-
✅ Secure socket layer
-
❌ Special security license
-
❌ Straight socket loop
5. Elements of the CIA Triad
-
❌ Control, Integrity, Accessibility
-
❌ Confidentiality, Interest, Accessibility
-
✅ Confidentiality, Integrity, Availability
-
❌ Control, Integrity, Authentication
6. IP in security/privacy stands for
-
✅ Intellectual Property
-
❌ Internet Privacy
-
❌ Integrity Protocol
-
❌ Information Privacy
7. Browser vulnerability
-
❌ Virus through monitor
-
❌ Leaving infected browser open
-
✅ A browser plug-in can be exploited
-
❌ Browsers can’t be exploited
8. Best method to secure data over public Wi-Fi
-
❌ Database encryption
-
✅ VPN encryption
-
❌ Disk-level encryption
-
❌ File-level encryption
9. What is PII?
-
❌ Any stored data
-
✅ Any data that can identify an individual
-
❌ Celebrity info
-
❌ Any employee info
10. Purpose of Trojan malware
-
❌ Spy on browsing & keystrokes (spyware)
-
✅ Masquerades as benign software but exploits system
-
❌ Replicate & spread (worm)
-
❌ Flood a target (DDoS botnet)
11. Zombie cookie defined
-
❌ Emulates user via VM
-
❌ Steals identity
-
✅ Doesn’t follow normal deletion protocols & is difficult to remove
-
❌ Altered into virus-like state
12. What happens when data is encrypted?
-
❌ Sent to third party
-
❌ Compressed repeatedly
-
✅ Scrambled so third parties cannot read it
-
❌ Compressed/archived
13. Two types of firewalls
-
❌ Internet and home
-
❌ Digital and electronic
-
✅ Hardware-based and software-based
-
❌ Remote and local
14. Address indicating SSL-secured session
-
❌ http://
-
❌ http.ssl://
-
✅ https://
-
❌ ssl.http://
15. When is data least vulnerable?
-
❌ On USB transfer
-
❌ In transit
-
❌ Being written
-
✅ At rest
Explanation:
At rest, it is easier to protect with encryption and access controls.
🧾 Summary Table
| Q# | Correct Answer |
|---|---|
| 1 | Dumpster diving |
| 2 | Cable lock |
| 3 | Something you have |
| 4 | Secure socket layer |
| 5 | Confidentiality, Integrity, Availability |
| 6 | Intellectual Property |
| 7 | Browser plug-in exploitation |
| 8 | VPN encryption |
| 9 | Data identifying an individual |
| 10 | Trojan disguises as legitimate software |
| 11 | Difficult-to-remove cookie |
| 12 | Data is scrambled for privacy |
| 13 | Hardware & software firewalls |
| 14 | https:// |
| 15 | At rest |