Module 2 Graded Quiz: Cybersecurity Threats :Introduction to Cybersecurity Tools & Cyberattacks (IBM Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1 — Government-sponsored attacker
-
❌ Insider threat
-
✅ Nation-state actor
-
❌ Organized crime
-
❌ Script kiddie
Explanation:
Nation-states conduct cyberattacks to target critical infrastructure, espionage, or political influence.
2. Question 2 — Competitor finds printed confidential designs
-
❌ Oblivious insider
-
❌ Malicious insider
-
✅ Negligent insider
-
❌ Professional insider
Explanation:
The employee did not intend harm but acted carelessly, exposing sensitive information.
3. Question 3 — Why be aware of AI hallucinations?
-
❌ Prevent deepfakes
-
❌ Prevent malicious code
-
❌ Prevent spam
-
✅ To ensure the assistant answers customer queries accurately
Explanation:
Hallucinations cause AI to generate false or misleading information, affecting product recommendations and customer trust.
4. Question 4 — Protect system from malware
-
❌ Use others’ systems
-
❌ Never download files at all
-
❌ Use systems with GPUs
-
✅ Learn about botnets
Explanation:
Understanding malware (worms, botnets, Trojans) helps you avoid infection and practice safe behavior.
5. Question 5 — Legitimate-looking application that is malicious
-
❌ Bot
-
❌ Keylogger
-
✅ Trojan
-
❌ Worm
Explanation:
Trojans disguise themselves as safe programs to trick users into installing them.
6. Question 6 — Detect new/unknown malware
-
❌ Caution with email
-
❌ OS updates
-
❌ Strong passwords
-
✅ Heuristic analysis
Explanation:
Heuristics detect malware based on behavior patterns, even if it has never been seen before.
7. Question 7 — Purpose of Quad9
-
❌ Warns about spear phishing
-
✅ Safeguards users against malware & phishing threats
-
❌ Enhances critical thinking
-
❌ Adds MFA
Explanation:
Quad9 is a secure DNS service that blocks malicious domains.
8. Question 8 — Tool to secure Linux servers
-
❌ Keyloggers
-
❌ Backdoors
-
❌ Spyware
-
✅ Rootkit hunter
Explanation:
Rootkit Hunter scans Linux systems for rootkits, malware, backdoors, and vulnerabilities.
9. Question 9 — Delivery boy enters by following employee
-
❌ Whaling
-
✅ Tailgating
-
❌ Shoulder surfing
-
❌ Dumpster diving
Explanation:
Tailgating occurs when an unauthorized person gains access by following someone else through a secure door.
10. Question 10 — Suspicious text message with link
-
✅ Smishing
-
❌ Spoofing
-
❌ SEO poisoning
-
❌ Vishing
Explanation:
Smishing = SMS-based phishing.
🧾 Summary Table
| Q# | Correct Answer |
|---|---|
| 1 | Nation-state actor |
| 2 | Negligent insider |
| 3 | Ensures AI answers accurately |
| 4 | Learn about botnets |
| 5 | Trojan |
| 6 | Heuristic analysis |
| 7 | Safeguards users from malware (Quad9) |
| 8 | Rootkit hunter |
| 9 | Tailgating |
| 10 | Smishing |