Introduction to Cybersecurity Essentials Quiz Answers

Welcome to your complete guide for Introduction to Cybersecurity Essentials quiz answers! Whether you’re completing practice quizzes to reinforce your understanding or preparing for graded quizzes to assess your knowledge, this guide is here to help.

Covering all course modules, this resource will teach you the basics of cybersecurity, including understanding cyber threats, encryption techniques, network security, and how to protect personal and organizational data from malicious attacks.

Introduction to Cybersecurity Essentials Quiz Answers for All Modules

Introduction to Cybersecurity Essentials Module 01 Quiz Answers

Graded Quiz: Common Security Threats and Risks Quiz Answers

Q1. What does confidentiality of data refer to?

Correct Answer: Rules which restrict access only to those who need to know

Explanation: Confidentiality ensures that data is only accessible to authorized individuals.


Q2. Maria has taken her college entry exam and is waiting to get her results via email. By accident, the university sent Maria’s results to Alexander. What part of the CIA Triad has been broken?

Correct Answer: Confidentiality

Explanation: The accidental sharing of Maria’s results with Alexander violates the confidentiality aspect of the CIA Triad.


Q3. Your company’s Marketing team will be taking a group of people on a tour of your facility. The company has sent an email to all employees requiring them to clean all whiteboards and to make sure their desktops are cleared. What is the company trying to protect against?

Correct Answer: A loss of intellectual property

Explanation: The company is ensuring that sensitive information is not exposed during the tour, protecting intellectual property.


Q4. What does the acronym PII stand for?

Correct Answer: Personally Identifiable Information

Explanation: PII refers to information that can be used to identify a person, such as their name, address, or social security number.


Q5. David noticed an unattended laptop in a coffee shop and decided to steal it. Which of the following types of cybercrime did he commit?

Correct Answer: Hardware theft

Explanation: Stealing physical devices, such as laptops, falls under hardware theft.


Q6. Someone was recently caught sifting through your company’s trash looking for confidential information. Which type of security threat is this?

Correct Answer: Dumpster diving

Explanation: Dumpster diving involves searching through discarded materials, such as trash, to find confidential or valuable information.


Q7. You’ve started to notice that a co-worker sitting next to you always seems to look your way when you’re trying to enter your username and password to log onto the network. What is this co-worker doing?

Correct Answer: Shoulder surfing

Explanation: Shoulder surfing is the act of looking over someone’s shoulder to steal information, such as login credentials.


Q8. You just installed a new search engine on your computer. Afterwards, whenever you search the Internet, several pop-up windows appear on your screen directing you to buy products. What type of malware is installed on your machine?

Correct Answer: Adware

Explanation: Adware is a type of malware that generates unwanted ads, often in the form of pop-up windows.


Q9. Your supervisor is extremely busy today and asks you to log into the HR server using her logon credentials to retrieve some payroll reports. What should you do?

Correct Answer: Politely decline the request and remind her that it is against the company’s security policy to share logon credentials.

Explanation: Sharing logon credentials is against security policies, and you should never use another person’s credentials without proper authorization.


Q10. Which of the following best describes a Trojan Horse?

Correct Answer: A type of malware that tricks you into installing software that looks legitimate.

Explanation: A Trojan Horse malware appears as legitimate software but actually carries out malicious actions.

Introduction to Cybersecurity Essentials Module 02 Quiz Answers

Graded Quiz: Security Best Practices  Quiz Answers

Q1. You are investigating fraudulent activities committed by two employees at your company. You’re asked to provide non-refutable evidence to confirm it. What type of evidence will you provide?

Correct Answer: Non-repudiation

Explanation: Non-repudiation ensures that actions or events cannot be denied, providing reliable evidence in case of disputes.


Q2. Why would you use a VPN?

Correct Answer: To encrypt data on a public network

Explanation: A VPN encrypts data to secure it when transmitted over unsecured networks, like public Wi-Fi.


Q3. Which of the following authentication methods require more than one authentication process for a logon? (Select two.)

Correct Answers:

  • 2FA
  • Multifactor authentication

Explanation: Both 2FA and multifactor authentication require more than one form of authentication to enhance security.


Q4. You received an email from your bank alerting you to suspicious activity on your bank account. They inform you that to keep your account safe, you should change your password immediately. They provide you with a link to change your password. Which type of social engineering attack was used against you?

Correct Answer: Phishing

Explanation: Phishing involves fraudulent communication, usually from a trusted entity, to trick individuals into revealing sensitive information.


Q5. Recently, your company experienced a data breach. An investigation confirms that the source was a company executive who was using his mobile phone in a public area. Which of the following might have prevented this breach?

Correct Answer: Disabling Bluetooth

Explanation: Disabling Bluetooth would have prevented unauthorized access to the device while in a public area, reducing the risk of data theft.


Q6. Using asymmetric encryption is best suited for which one of the following scenarios?

Correct Answer: Protecting data in transit against eavesdropping and data tampering.

Explanation: Asymmetric encryption, using public and private keys, is ideal for securing data during transmission.


Q7. Which of the following practices can help you manage your email and reduce spam?

Correct Answer:

  • Only subscribe to legitimate email distributions lists.

Explanation: Subscribing to legitimate sources helps reduce the chances of receiving unwanted spam emails.


Q8. You are assigned a task to secure data on the development machines in the lab. None are connected to any external networks. What can you do to prevent data theft?

Correct Answer: Use drive encryption.

Explanation: Drive encryption secures the data on the machine, making it inaccessible even if the device is physically stolen.


Q9. After you have applied an operating system update to your laptop, your sound card is no longer functional. You’ve determined that the sound card driver is no longer compatible and needs an update. Where is the best place to obtain a new driver?

Correct Answer: From the original equipment manufacturer (OEM)

Explanation: Obtaining drivers directly from the OEM ensures compatibility and security for your hardware.


Q10. Common passwords and phrases are safe for passwords as long as they:

Correct Answer: Commonly used passwords are never safe.

Explanation: Common passwords are easily guessable, making them insecure. Strong, unique passwords are essential for security.

Introduction to Cybersecurity Essentials Module 03 Quiz Answers

Graded Quiz: Safe Browsing Practices Quiz Answers

Q1. Which of the following best describes the primary reason that hackers target companies?

Correct Answer: To try to steal sensitive data such as intellectual property, trade secrets and other valuable data to sell on the dark web.

Explanation: Hackers target companies to steal valuable data that can be sold or used for malicious purposes.


Q2. Which technology can help reduce security threats when using an unsecure Wi-Fi network?

Correct Answer: Using a virtual private network (VPN)

Explanation: A VPN encrypts your internet traffic, making it more secure when using an unsecure Wi-Fi network.


Q3. Which of the following is a strong password?

Correct Answer: X5j13$#eCM19

Explanation: A strong password includes a combination of uppercase, lowercase, numbers, and special characters, making it harder to guess or crack.


Q4. You’ve been messaging online with a stranger for a few weeks, and he asked you for your email address. He’s been friendly and seems trustworthy, so you give it to him. He then cut off all contact with you and now your Inbox is filling up with thousands of emails from companies, and people you don’t know. What happened?

Correct Answer: The stranger used a phishing attack and social engineering against you to obtain your email address to use for sending spam.

Explanation: The stranger used manipulation to get your email address and likely sold or used it to send spam.


Q5. Which of the following statements about cookies is true?

Correct Answer: Cookies can fill up my hard drive and make my computer run slower.

Explanation: While cookies are typically harmless, they can accumulate over time and take up storage space, potentially slowing down your system.


Q6. Which of the following characteristics should apply to a CA security certificate?

Correct Answer: A security certificate should be issued from a trusted Certificate of Authority.

Explanation: A trusted Certificate of Authority (CA) is essential for verifying the authenticity of a website and ensuring a secure connection.


Q7. What is SSL (Secure Socket Layer) used for?

Correct Answer: Preventing the interception and tampering of data

Explanation: SSL encrypts data during transmission to protect it from being intercepted or altered by unauthorized parties.


Q8. After logging into your computer today, you’ve noticed that every time you try to visit a website, your browser keeps redirecting you to other sites. What is the cause?

Correct Answer: Your computer has been infected with malware that is causing the redirects.

Explanation: Redirects to unwanted websites are often caused by malware that hijacks your browser settings.


Q9. Which of the following is a risk to rooting or jailbreaking a mobile device?

Correct Answer: Data is exposed to hackers.

Explanation: Rooting or jailbreaking a device removes built-in security features, making it more vulnerable to attacks and data theft.


Q10. Which of the following is a genuine Certificate of Authority (root certificate store)?

Correct Answer: Microsoft

Explanation: Microsoft is a trusted Certificate Authority that issues root certificates for secure communications.

Introduction to Cybersecurity Essentials Module 04 Quiz Answers

Graded Final Quiz Answers

Q1. Which of the following attacks would a hacker use to potentially target the theft of intellectual property?

Correct Answer: Man-in-the-Middle attack

Explanation: A Man-in-the-Middle (MitM) attack intercepts communication between two parties to eavesdrop or manipulate the data being transferred, potentially stealing sensitive intellectual property.


Q2. An attacker was easily able to log in to your company’s security camera by performing a basic Internet search. He found a setup guide for that particular camera brand and model. Which of the following BEST describes the configurations the attacker exploited?

Correct Answer: Default settings

Explanation: Attackers often exploit devices that are still using default settings like passwords or configurations, which are often publicly available or easy to guess.


Q3. Which of the following is one of the categories used in multifactor authentication?

Correct Answer: Something you have

Explanation: Multifactor authentication uses different categories such as something you know (password), something you have (security token), or something you are (biometrics).


Q4. What does SSL stand for?

Correct Answer: Secure socket layer

Explanation: SSL (Secure Socket Layer) is a protocol for securing internet connections by encrypting data to prevent unauthorized access.


Q5. Which of the following are elements of the CIA Triad?

Correct Answer: Confidentiality, Integrity, and Availability

Explanation: The CIA Triad represents the core principles of information security: ensuring confidentiality, maintaining data integrity, and ensuring the availability of data.


Q6. In the context of security and information privacy, what does IP stand for?

Correct Answer: Intellectual Property

Explanation: IP in this context typically refers to Intellectual Property, which includes creations of the mind such as inventions, literary and artistic works, and designs.


Q7. Which of the following is a way that a web browser is vulnerable to a breach?

Correct Answer: A browser plug-in can be exploited.

Explanation: Vulnerabilities in browser plug-ins (or extensions) can be exploited to gain unauthorized access to a user’s system.


Q8. Digital signatures provide which of the following?

Correct Answer: Authentication, data integrity, a form of non-repudiation

Explanation: Digital signatures provide a way to verify the authenticity of data, ensure it has not been altered, and serve as a form of non-repudiation, ensuring the signer cannot deny the signature.


Q9. What is personally identifiable information, or PII?

Correct Answer: Any data that alone, or in combination with other information, can identify an individual

Explanation: PII refers to any information that can be used to identify a person, such as their name, social security number, or email address.


Q10. What is the purpose of Trojan malware?

Correct Answer: To masquerade as non-malicious software while exploiting a system’s weaknesses

Explanation: Trojan malware pretends to be legitimate software but contains harmful code that exploits system vulnerabilities.


Q11. Which of the following best describes a zombie cookie?

Correct Answer: They don’t follow normal protocols and are difficult to remove.

Explanation: Zombie cookies are a type of tracking cookie that is hard to delete and can reappear even after being removed.


Q12. What happens to your data when it’s encrypted?

Correct Answer: It is scrambled to retain privacy from third parties.

Explanation: Encryption transforms data into a scrambled format, making it unreadable to unauthorized users and ensuring privacy.


Q13. There are two types of firewalls. What are they?

Correct Answer: Hardware-based and software-based

Explanation: Firewalls can be either hardware-based (dedicated physical devices) or software-based (programs installed on computers or network devices).


Q14. Which of the following webpage addresses indicate that the browsing session is secured by SSL?

Correct Answer: The web address begins with https://

Explanation: The “https://” prefix indicates that the website uses SSL encryption for a secure connection.


Q15. When is data at its least vulnerable?

Correct Answer: When it’s at rest

Explanation: Data is least vulnerable when it is at rest, i.e., not actively being transmitted or processed, as it is not exposed to network threats.

Sources: Introduction to Cybersecurity Essentials

Get All Course Quiz Answers of IBM Technical Support Professional Certificate

Introduction to Hardware and Operating Systems Quiz Answers

Introduction to Software, Programming, and Databases Quiz Answers

Introduction to Networking and Storage Quiz Answers

Introduction to Cybersecurity Essentials Quiz Answers

Introduction to Cloud Computing Coursera Quiz answers

Share your love

Newsletter Updates

Enter your email address below and subscribe to our newsletter

Leave a Reply

Your email address will not be published. Required fields are marked *