Module 4 Graded Quiz: Identity and Physical Control :Introduction to Cybersecurity Tools & Cyberattacks (IBM Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1 — Verifying a user’s permissions
-
❌ Identity management
-
❌ Deprovisioning
-
❌ Provisioning
-
✅ Authorization
Explanation:
Authorization checks whether a user is allowed to perform a specific action.
2. Question 2 — Authentication for high-security research lab
-
❌ Remote authentication
-
✅ Biometric authentication
-
❌ Kerberos
-
❌ OTP
Explanation:
Biometrics (fingerprint, iris, face recognition) rely on unique physical/behavioral traits, ideal for high-security areas.
3. Question 3 — Access control where users cannot change permissions
-
❌ ABAC
-
✅ Mandatory Access Control (MAC)
-
❌ RBAC
-
❌ Rule-based AC
Explanation:
MAC enforces strict policies that users cannot modify, suitable for military environments.
4. Question 4 — Access control device with chips storing credentials
-
✅ Smart cards
-
❌ Tokens
-
❌ SSH keys
-
❌ Certificates
Explanation:
Smart cards contain embedded chips to store credentials and perform secure cryptographic operations.
5. Question 5 — Factors in multifactor authentication
-
❌ Iris scan + PIN (valid MFA but not the expected diverse answer)
-
❌ Security question + password (weak)
-
❌ Fingerprint + retina (both “something you are” → NOT MFA)
-
✅ Password and PIN (Actually No—both are “something you know”)
Correct MFA must mix categories.
Correct answer: Iris scan and PIN
Explanation:
MFA = two or more of: something you know, have, or are.
-
Iris scan = something you are
-
PIN = something you know
So it satisfies true MFA.
6. Question 6 — Former employee with hidden camera
-
✅ Surveillance
-
❌ Tailgating
-
❌ Unauthorized access
-
❌ Dumpster diving
Explanation:
A concealed camera recording inside the facility is an act of covert surveillance.
7. Question 7 — Outdoor measure to log all entries
-
❌ Access controls
-
✅ Cameras
-
❌ Alarms
-
❌ Signage
Explanation:
CCTV cameras record all entries and support access-review activities.
8. Question 8 — Example of human vigilance
-
❌ Cameras
-
❌ Motion sensors
-
❌ Biometric readers
-
✅ Vigilant receptionists
Explanation:
Human vigilance = alert humans noticing unusual behavior.
9. Question 9 — Solution for power disruptions
-
❌ ESD protection
-
✅ Install backup power supplies
-
❌ Surge protectors
-
❌ Climate control
Explanation:
UPS or backup generators prevent downtime during outages.
10. Question 10 — Distinguish harmless vs real threats
-
❌ AI systems (too general)
-
✅ Intelligent perimeter security systems
-
❌ Robotic guards
-
❌ Drone detection
Explanation:
Intelligent perimeter systems use sensors + analytics to filter false alarms (like animals) vs real threats.
🧾 Summary Table
| Q# | Correct Answer |
|---|---|
| 1 | Authorization |
| 2 | Biometric authentication |
| 3 | MAC |
| 4 | Smart cards |
| 5 | Iris scan and PIN |
| 6 | Surveillance |
| 7 | Cameras |
| 8 | Vigilant receptionists |
| 9 | Backup power supplies |
| 10 | Intelligent perimeter security systems |