Cyber Aptitude Test Final Posted by 3.0 University Date November 13, 2024 Comments 0 comment Welcome to Cyber Aptitude Test Note: Please fill out the form below to begin the test. Name Email Phone Your Profession (Student or Working Professional) What is two-factor authentication? A security method requiring two forms of verification Using two computers for one account Using two separate Wi-Fi networks Writing your password twice None A retired official was recently scammed by fraudsters posing as law enforcement, asking for money to “clear his name.” What tactic is being used here? Pretexting Baiting Phishing Scareware None An AI tool used in cybersecurity flags patterns but struggles with new attacks. What’s the best approach to keep it effective? Use it only on old threats Depend solely on AI monitoring Regularly update it with new threat data Turn it off during peak hours None What is phishing? A type of bug A gaming term Tricking people into sharing sensitive information by pretending to be a trustworthy source Searching online for information None What is cybersecurity? Buying antivirus software Backing up data regularly Learning to code Protecting computers and networks from theft and damage None What is malware? A setting to improve display quality Harmful software designed to damage or gain unauthorized access A type of computer hardware Software that helps improve computer speed None AI is often used to predict and prevent phishing attacks. Which feature of AI enables it to differentiate between legitimate and fake emails effectively? URL Shortening Data Compression Biometric Analysis Pattern Recognition None A tech graduate leads a cybercrime ring targeting job seekers by impersonating government officials and asking for personal details. What vulnerability are they exploiting? IDS Evasion Buffer Overflow Social Engineering SQL Injection None Which of these devices could be a target for hackers? Just old computers Any device connected to the internet, like phones, tablets, and smart TVs Only desktop computers Only government-owned devices None A telecom fraud involves fake app installations. Which step can users take to ensure downloaded apps are legitimate? Disable phone lock for easy access Check the app’s name only Always download apps from official app stores Rely on links from messages None A hacker intercepts login sessions on unsecured public Wi-Fi to steal credentials. Which type of attack is this? Session Hijacking Denial of Service IP Spoofing Spoofing None What is encryption? A way to make text look stylish A process that converts data into a code to prevent unauthorized access A type of password generator A Wi-Fi signal booster None In a recent case, fraudsters posed as telecom representatives, urging victims to download remote-access apps to “improve connectivity.” What’s the key lesson for preventing similar scams? Never grant app permissions without verification Regularly change Wi-Fi passwords Install the latest antivirus Use multi-factor authentication None Fraudsters use a fake website that resembles a legitimate travel booking platform to trap users. What initial security check can users perform to verify website authenticity? Check for an HTTPS URL and site certificates Use the website’s contact form Enter details as a test Contact customer support to verify None Why is it important to keep your software updated? Updates often fix security issues and bugs It makes your computer look cooler It changes the design It uses less memory None Which of the following is a proactive approach for analyzing cyber threats based on past incidents, like the ones reported in recent fraud cases? Threat Intelligence Vulnerability Analysis SQL Injection IoT Hacking None Which of the following is a good password practice? Sharing passwords with friends Writing down passwords on paper Using 'password123' Using a combination of letters, numbers, and symbols None An online shopping platform experienced a data breach through SQL Injection. Which primary security flaw likely allowed the breach? Inadequate firewall protection Lack of input validation Weak password policies Poor network segmentation None What is a firewall? A type of data storage device A wall that protects buildings from fire A network security system that monitors and controls incoming and outgoing traffic A file-sharing app None If your computer is behaving strangely and slowing down, what might be the cause? A dusty keyboard Too many icons on your desktop A virus or malware infection A poor internet connection None 1 out of 2 Share: 3.0 University Previous post Cyber Aptitude Test CEHv13 November 13, 2024 You may also like How to Build Your First Project in the Metaverse? May 8, 2025 How to Get Ethical Hacking Internships as a Student? May 7, 2025 Why Companies Need Ethical Hackers More Than Ever? May 6, 2025