Skip to content

Graded Quiz: Safe Browsing Practices :Introduction to Cybersecurity Essentials (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1 — Why do hackers target companies?

  • ❌ Learn MFA

  • ❌ Check unsafe browsing habits

  • To steal sensitive data such as IP, trade secrets, and sell them on the dark web

  • ❌ Learn about non-approved apps

Explanation:
The primary motive is financial gain through stolen valuable data.


2. Question 2 — Best protection on unsecured Wi-Fi

  • ❌ Root/jailbreak device

  • Use a VPN

  • ❌ Password-protected public Wi-Fi

  • ❌ Bluetooth

Explanation:
A VPN encrypts traffic, protecting against eavesdropping.


3. Question 3 — Strong password

  • ❌ IluvMyCat

  • ❌ BlackJack1963

  • X5j13$#eCM19

  • ❌ ToBeorNotToBe

Explanation:
Strong passwords contain randomness, numbers, special characters, and no dictionary words.


4. Question 4 — Stranger asked for email → you get spam

  • ❌ Impersonation

  • ❌ Identity stolen

  • Phishing/social engineering to obtain your email for spamming

  • ❌ Email hacked

Explanation:
The attacker collected your email and added it to spam lists.


5. Question 5 — True statement about cookies

  • ❌ Cookies contain viruses

  • ❌ Cookies do not track activity

  • ❌ Cookies slow down hard drive

  • I can get a cookie from a website I’ve never been to

Explanation:
Third-party cookies load from ads or embedded content, even if you never visited that site directly.


6. Question 6 — Valid characteristic of a CA certificate

  • Issued from a trusted Certificate Authority

  • ❌ Self-signed

  • ❌ Not required for HTTPS

  • ❌ Should be hashed with MD5

Explanation:
Trusted CAs issue valid certificates; MD5 is insecure.


7. Question 7 — What is SSL used for?

  • ❌ Stop expiration warnings

  • Prevent interception and tampering of data

  • ❌ Prevent drive-by malware

  • ❌ Prevent SQL injection

Explanation:
SSL/TLS encrypts data in transit.


8. Question 8 — Browser redirects

  • ❌ Identity stolen

  • ❌ Hacker controlling device

  • ❌ Computer part of botnet

  • Computer infected with malware causing redirects

Explanation:
Browser-hijacking malware changes your traffic paths.


9. Question 9 — Risk of rooting/jailbreaking

  • ❌ All data deleted

  • ❌ Not charged for apps

  • ❌ Device bricked (possible but not most common security risk)

  • Data exposed to hackers

Explanation:
Rooting removes built-in protections, exposing system data.


10. Question 10 — Genuine Certificate Authority root store

  • Microsoft

  • ❌ Adobe

  • ❌ Apple App Store

  • ❌ Google Play Store

Explanation:
Microsoft maintains a root certificate store trusted by Windows.


🧾 Summary Table

Q# Correct Answer
1 Steal sensitive data for dark web
2 VPN
3 X5j13$#eCM19
4 Phishing/social engineering
5 Can get a cookie from a website never visited
6 Issued by trusted CA
7 Prevent data interception/tampering
8 Malware redirecting browser
9 Data exposed to hackers
10 Microsoft