Cyber Aptitude Test CEHv13 Posted by 3.0 University Date November 8, 2024 Comments 0 comment Welcome to your Cyber Aptitude Test CEHv13 Name Email Phone Which of the following is an advantage of AI in cybersecurity? Manual detection of malware Manual threat monitoring Automated incident response Slower data analysis None What role does AI play in phishing detection? Blocks all incoming emails Encrypts phishing websites Identifies and flags potential phishing attempts using pattern recognition Automates sending phishing emails None What is the role of a firewall in cybersecurity? Blocking unauthorized access to a network Encrypting data Detecting phishing attacks Removing malware from systems None What can happen if you use the same password for multiple accounts? Your accounts are more secure All accounts could be accessed if one password is leaked It makes logging in faster It’s easier to remember None Why should you avoid sharing personal information on social media? It lowers your data usage Hackers could use it to guess passwords or scam you It takes up too much space It makes your account slower None Which cybersecurity principle ensures that data is available to authorized users when needed? Confidentiality Availability Authentication Integrity None In AI-based cybersecurity, what is anomaly detection used for? Detecting unusual patterns indicating potential threats Identifying normal user behavior Automating data encryption Reducing response time None What is the primary purpose of encryption in cybersecurity? Detecting malware Protecting data confidentiality Preventing data loss Ensuring data accuracy None What is the main objective of cybersecurity? Protecting personal devices Increasing internet speed Improving user experience Ensuring the confidentiality, integrity, and availability of data None What is the primary purpose of threat intelligence in cybersecurity? To encrypt sensitive data To manually detect phishing attacks To gather information about potential cyber threats to anticipate and prevent attacks To block unauthorized access to a network None Which of the following is a benefit of using AI in cybersecurity? Manual incident response Faster detection of anomalies Manual threat detection Decreasing internet speed None Which of the following technologies is commonly used in AI to detect cyber threats? Internet of Things Blockchain VPN Machine Learning None What should you do if you receive a message from your bank asking for your password? Delete the message without reading Call your bank to verify the message Share it immediately Forward it to friends None What does SSL stand for in cybersecurity? Secure Socket Layer Security System Log Standard Security Level Secure Software Language None If your computer is behaving strangely and slowing down, what might be the cause? A dusty keyboard A poor internet connection Too many icons on your desktop A virus or malware infection None Which term describes the practice of protecting networks from cyberattacks? Information security Cloud security Network security Application security None In cybersecurity, what is the purpose of penetration testing (pen-testing)? To monitor network traffic To prevent malware infections To simulate cyberattacks and find vulnerabilities To encrypt user data None Which cybersecurity attack involves overwhelming a target system with excessive requests? Spyware SQL Injection DDoS Ransomware None Why should you avoid clicking on suspicious links? They are usually boring They can make your computer run faster They might lead to websites that could infect your computer They offer free games None How does AI assist in predicting future cyber threats? By analyzing past data and patterns By manually reviewing logs By blocking all network traffic By slowing down the system None 1 out of 4 Share: 3.0 University Previous post Cyber Aptitude Test November 8, 2024 Next post Cyber Aptitude Test Final November 13, 2024 You may also like How to Build Your First Project in the Metaverse? May 8, 2025 How to Get Ethical Hacking Internships as a Student? May 7, 2025 Why Companies Need Ethical Hackers More Than Ever? May 6, 2025