Cyber Aptitude Test Posted by 3.0 University Date November 6, 2024 Comments 0 comment Welcome to your Cyber Aptitude Test Name Email Phone In detecting online fraud, which AI-powered approach could best identify unusual patterns in account activity, flagging it for review? Behavioral Analytics Proxy Detection Content Filtering Firewall Rules None A fraud case involved creating multiple fake accounts using bots on a social media platform. Which cybersecurity technique can most effectively reduce automated bot attacks? Strong password policies CAPTCHA implementation Input Validation Port Scanning None A retired individual is targeted by ransomware demanding payment to regain access to files. What’s a preventive measure to protect data against ransomware? Disable two-factor authentication Avoid public Wi-Fi Use easily memorable passwords Regularly back up data in a secure location None Fraudsters use a fake website that resembles a legitimate travel booking platform to trap users. What initial security check can users perform to verify website authenticity? Enter details as a test Use the website’s contact form Contact customer support to verify Check for an HTTPS URL and site certificates None An AI-driven security system blocks suspicious connections automatically. Which concept is this based on? Content Filtering Network Flooding Autonomous Threat Detection Dynamic Firewalls None A cyber attacker uses a “brute-force” approach to access a protected system. Which defensive measure is best suited to counteract this? Disable Firewalls Strong Password Policy with Account Lockout Intrusion Detection System SQL Injection Defense None An AI tool used in cybersecurity flags patterns but struggles with new attacks. What’s the best approach to keep it effective? Turn it off during peak hours Regularly update it with new threat data Use it only on old threats Depend solely on AI monitoring None In a recent case, fraudsters posed as telecom representatives, urging victims to download remote-access apps to “improve connectivity.” What’s the key lesson for preventing similar scams? Install the latest antivirus Never grant app permissions without verification Use multi-factor authentication Regularly change Wi-Fi passwords None Which of the following is a proactive approach for analyzing cyber threats based on past incidents, like the ones reported in recent fraud cases? SQL Injection IoT Hacking Threat Intelligence Vulnerability Analysis None A bank is vulnerable to SQL injection due to poorly structured input validation. Which is the best way to reduce the risk of this vulnerability? Use parameterized queries in the database Increase password strength Encrypt all data Implement two-factor authentication None AI is often used to predict and prevent phishing attacks. Which feature of AI enables it to differentiate between legitimate and fake emails effectively? Biometric Analysis URL Shortening Data Compression Pattern Recognition None Which technique best describes a scenario where attackers research their target’s public information on social media to create a believable phishing email? DNS Poisoning SQL Injection DDoS Attack Pretexting None You suspect unauthorized access to a bank’s network. Which reconnaissance technique would most likely be used to determine open ports in this scenario? Social Engineering Nmap Scanning SQL Injection Wireshark Analysis None A high-level government official’s family receives a call asking for account information under the pretense of ‘updating details.’ What should their response be to avoid falling for a scam? Use an online form for verification Ignore all such requests unless initiated by the user Ask the caller to email the request Provide details to avoid service interruption None A ransomware variant installs a rootkit to evade detection. Which characteristic best describes a rootkit’s purpose? Concealing itself within system processes Bypassing firewalls Encrypting files for ransom Overloading a server with requests None A retired official was recently scammed by fraudsters posing as law enforcement, asking for money to “clear his name.” What tactic is being used here? Scareware Baiting Pretexting Phishing None A hacker intercepts login sessions on unsecured public Wi-Fi to steal credentials. Which type of attack is this? IP Spoofing Session Hijacking Denial of Service Spoofing None A tech graduate leads a cybercrime ring targeting job seekers by impersonating government officials and asking for personal details. What vulnerability are they exploiting? Buffer Overflow SQL Injection IDS Evasion Social Engineering None A telecom fraud involves fake app installations. Which step can users take to ensure downloaded apps are legitimate? Always download apps from official app stores Disable phone lock for easy access Check the app’s name only Rely on links from messages None An online shopping platform experienced a data breach through SQL Injection. Which primary security flaw likely allowed the breach? Lack of input validation Poor network segmentation Weak password policies Inadequate firewall protection None 1 out of 4 Share: 3.0 University Previous post Certified Ethical Hacker v13 Scholarship Test November 6, 2024 Next post Cyber Aptitude Test CEHv13 November 8, 2024 You may also like How to Build Your First Project in the Metaverse? May 8, 2025 How to Get Ethical Hacking Internships as a Student? May 7, 2025 Why Companies Need Ethical Hackers More Than Ever? May 6, 2025