Skip to content

Penetration Testing, Threat Hunting, and Cryptography (IBM Cybersecurity Analyst Professional Certificate)

Course Assignments

Graded Quiz: Penetration Testing: Planning and Discovery Phases :Penetration Testing, Threat Hunting, and Cryptography (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1 PCI-DSS compliance requires: ❌ Regular phishing tests ✅ Regular external and internal penetration testing ❌ Using cloud data storage ❌ MFA for all users (required only for certain roles, not “all users”) Explanation:PCI-DSS mandates annual external and internal penetration tests as part of maintaining cardholder data security. 2. Question 2 Best test… <a href="https://codeshala.io/platform/coursera/course/penetration-testing-threat-hunting-and-cryptography-ibm-cybersecurity-analyst-professional-certificate/assignment/graded-quiz-penetration-testing-planning-and-discovery-phases-penetration-testing-threat-hunting-and-cryptography-ibm-cybersecurity-analyst-professional-certificate-answers-2025/" rel="bookmark"><span class="screen-reader-text">Graded Quiz: Penetration Testing: Planning and Discovery Phases :Penetration Testing, Threat Hunting, and Cryptography (IBM Cybersecurity Analyst Professional Certificate) Answers 2025</span></a>

Graded Quiz: Penetration Testing: Attack Phase :Penetration Testing, Threat Hunting, and Cryptography (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1 PCI-DSS compliance requires: ❌ Regular phishing tests ✅ Regular external and internal penetration testing ❌ Using cloud data storage ❌ MFA for all users Explanation: PCI-DSS mandates annual internal + external pen testing to secure cardholder data. 2. Question 2 Best test to find vulnerabilities inside the mobile app: ❌ Network Pen… <a href="https://codeshala.io/platform/coursera/course/penetration-testing-threat-hunting-and-cryptography-ibm-cybersecurity-analyst-professional-certificate/assignment/graded-quiz-penetration-testing-attack-phase-penetration-testing-threat-hunting-and-cryptography-ibm-cybersecurity-analyst-professional-certificate-answers-2025/" rel="bookmark"><span class="screen-reader-text">Graded Quiz: Penetration Testing: Attack Phase :Penetration Testing, Threat Hunting, and Cryptography (IBM Cybersecurity Analyst Professional Certificate) Answers 2025</span></a>

Graded Quiz: Penetration Testing: Reporting Phase :Penetration Testing, Threat Hunting, and Cryptography (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1 Which testing should be performed while the application is running? ❌ IAST ✅ Dynamic Application Security Testing (DAST) ❌ SAST ❌ Mobile Application Testing Explanation:DAST tests applications in runtime, simulating external attacks. 2. Question 2 What should an organization implement to strengthen authentication? ❌ Removing session tokens after login ❌ Allowing password… <a href="https://codeshala.io/platform/coursera/course/penetration-testing-threat-hunting-and-cryptography-ibm-cybersecurity-analyst-professional-certificate/assignment/graded-quiz-penetration-testing-reporting-phase-penetration-testing-threat-hunting-and-cryptography-ibm-cybersecurity-analyst-professional-certificate-answers-2025/" rel="bookmark"><span class="screen-reader-text">Graded Quiz: Penetration Testing: Reporting Phase :Penetration Testing, Threat Hunting, and Cryptography (IBM Cybersecurity Analyst Professional Certificate) Answers 2025</span></a>

Graded Quiz: Threat Hunting and Threat Intelligence :Penetration Testing, Threat Hunting, and Cryptography (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1 — What distinguishes unstructured hunting? ❌ Unstructured hunting is limited to physical security ❌ Unstructured hunting uses IoCs ❌ Unstructured hunting uses preset detection rules ✅ Unstructured hunting relies on published threat intelligence reports Explanation:Unstructured hunting = starting from external threat intelligence and hunting based on known adversary behaviors—not defined rules or… <a href="https://codeshala.io/platform/coursera/course/penetration-testing-threat-hunting-and-cryptography-ibm-cybersecurity-analyst-professional-certificate/assignment/graded-quiz-threat-hunting-and-threat-intelligence-penetration-testing-threat-hunting-and-cryptography-ibm-cybersecurity-analyst-professional-certificate-answers-2025/" rel="bookmark"><span class="screen-reader-text">Graded Quiz: Threat Hunting and Threat Intelligence :Penetration Testing, Threat Hunting, and Cryptography (IBM Cybersecurity Analyst Professional Certificate) Answers 2025</span></a>

Graded Quiz: Cryptography: Principles and Techniques :Penetration Testing, Threat Hunting, and Cryptography (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1 — Symmetric Encryption Characteristic ✅ Uses the same key for both encryption and decryption ❌ Slower than asymmetric ❌ Requires certificate ❌ Uses two keys Explanation:Symmetric encryption always uses one shared key. 2. Question 2 — Why asymmetric is secure for key distribution ❌ Single key ✅ Uses separate public and private… <a href="https://codeshala.io/platform/coursera/course/penetration-testing-threat-hunting-and-cryptography-ibm-cybersecurity-analyst-professional-certificate/assignment/graded-quiz-cryptography-principles-and-techniques-penetration-testing-threat-hunting-and-cryptography-ibm-cybersecurity-analyst-professional-certificate-answers-2025/" rel="bookmark"><span class="screen-reader-text">Graded Quiz: Cryptography: Principles and Techniques :Penetration Testing, Threat Hunting, and Cryptography (IBM Cybersecurity Analyst Professional Certificate) Answers 2025</span></a>