Module 3 Graded Quiz: Cybersecurity Controls :Introduction to Cybersecurity Tools & Cyberattacks (IBM Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1 — Main objective of APT attackers
-
❌ Prioritize target segments
-
❌ Troubleshoot network issues
-
✅ Move laterally within a network undetected and escalate privileges
-
❌ Uncover network structure
Explanation:
APTs focus on long-term, stealthy access to steal data by moving laterally.
2. Question 2 — Purpose of packet sniffing
-
❌ Inject harmful code
-
❌ Disrupt network
-
❌ Protect networks
-
✅ Analyze data packets and diagnose network issues
Explanation:
Packet sniffers capture and analyze network traffic.
3. Question 3 — Pop-ups & redirects on employees’ machines
-
❌ Egress filtering
-
❌ DDoS
-
❌ MITM
-
✅ Botnet infiltration
Explanation:
Bots often cause hijacked browser behavior such as redirects and pop-ups.
4. Question 4 — Unusual text appearing in form fields
-
❌ XSS
-
❌ Integrity violation
-
❌ SQL injection
-
✅ Authorization loss?
Actually correct: -
❌ Authorization loss
-
❌ SQL injection
-
❌ Integrity violation
-
✅ Cross-site scripting (XSS) attack
Explanation:
Unexpected characters appearing in a text field often indicate reflected or stored XSS injection.
5. Question 5 — Employees using personal email for work
-
✅ Deterrent controls
-
❌ Corrective controls
-
❌ Physical controls
-
❌ Detective controls
Explanation:
Deterrent controls (policies, warnings, mandatory training, penalties) discourage undesirable behavior.
6. Question 6 — Why encryption ensures confidentiality
-
✅ Converts information into code obscuring original content
-
❌ First line defense against malware
-
❌ Fixes bugs
-
❌ Inspects packets
7. Question 7 — Why combine SIEM + SOAR
-
❌ Just streamline operations
-
❌ Prioritize alerts
-
❌ Increase complexity
-
✅ Automate the identification of sophisticated threats
Explanation:
SIEM correlates logs; SOAR automates response → together they improve threat detection & reaction.
8. Question 8 — Why input validation matters
-
❌ Reduces processing time
-
❌ Handles errors
-
❌ Debugging
-
✅ Prevents attackers from injecting malicious code into the application
9. Question 9 — Technique that inspects code without running it
-
❌ OpenVAS
-
✅ Static application security testing (SAST)
-
❌ IAST
-
❌ DAST
10. Question 10 — Digital forensics role in IR detection & analysis
-
❌ Initiate legal proceedings
-
❌ Post-incident review
-
❌ Document actions
-
✅ Collect and analyze digital evidence
🧾 Summary Table
| Q# | Correct Answer |
|---|---|
| 1 | Move laterally undetected |
| 2 | Analyze data packets |
| 3 | Botnet infiltration |
| 4 | Cross-site scripting (XSS) |
| 5 | Deterrent controls |
| 6 | Encryption obscures original content |
| 7 | Automate identification of sophisticated threats |
| 8 | Prevent malicious code injection |
| 9 | SAST |
| 10 | Collect & analyze digital evidence |