Cyber Aptitude Test Posted by 3.0 University Date November 6, 2024 Comments 0 comment Welcome to your Cyber Aptitude Test Name Email Phone An AI-driven security system blocks suspicious connections automatically. Which concept is this based on? Content Filtering Network Flooding Dynamic Firewalls Autonomous Threat Detection None A telecom fraud involves fake app installations. Which step can users take to ensure downloaded apps are legitimate? Always download apps from official app stores Disable phone lock for easy access Check the app’s name only Rely on links from messages None A high-level government official’s family receives a call asking for account information under the pretense of ‘updating details.’ What should their response be to avoid falling for a scam? Provide details to avoid service interruption Ignore all such requests unless initiated by the user Ask the caller to email the request Use an online form for verification None A ransomware variant installs a rootkit to evade detection. Which characteristic best describes a rootkit’s purpose? Concealing itself within system processes Encrypting files for ransom Overloading a server with requests Bypassing firewalls None A hacker intercepts login sessions on unsecured public Wi-Fi to steal credentials. Which type of attack is this? Session Hijacking IP Spoofing Denial of Service Spoofing None An online shopping platform experienced a data breach through SQL Injection. Which primary security flaw likely allowed the breach? Inadequate firewall protection Poor network segmentation Weak password policies Lack of input validation None In detecting online fraud, which AI-powered approach could best identify unusual patterns in account activity, flagging it for review? Behavioral Analytics Content Filtering Proxy Detection Firewall Rules None Which technique best describes a scenario where attackers research their target’s public information on social media to create a believable phishing email? DDoS Attack SQL Injection Pretexting DNS Poisoning None A tech graduate leads a cybercrime ring targeting job seekers by impersonating government officials and asking for personal details. What vulnerability are they exploiting? Social Engineering SQL Injection Buffer Overflow IDS Evasion None A fraud case involved creating multiple fake accounts using bots on a social media platform. Which cybersecurity technique can most effectively reduce automated bot attacks? Input Validation Port Scanning CAPTCHA implementation Strong password policies None You suspect unauthorized access to a bank’s network. Which reconnaissance technique would most likely be used to determine open ports in this scenario? Social Engineering Wireshark Analysis Nmap Scanning SQL Injection None A retired official was recently scammed by fraudsters posing as law enforcement, asking for money to “clear his name.” What tactic is being used here? Baiting Phishing Pretexting Scareware None A cyber attacker uses a “brute-force” approach to access a protected system. Which defensive measure is best suited to counteract this? Intrusion Detection System Strong Password Policy with Account Lockout SQL Injection Defense Disable Firewalls None AI is often used to predict and prevent phishing attacks. Which feature of AI enables it to differentiate between legitimate and fake emails effectively? Biometric Analysis Pattern Recognition URL Shortening Data Compression None An AI tool used in cybersecurity flags patterns but struggles with new attacks. What’s the best approach to keep it effective? Turn it off during peak hours Regularly update it with new threat data Depend solely on AI monitoring Use it only on old threats None A bank is vulnerable to SQL injection due to poorly structured input validation. Which is the best way to reduce the risk of this vulnerability? Encrypt all data Increase password strength Implement two-factor authentication Use parameterized queries in the database None Which of the following is a proactive approach for analyzing cyber threats based on past incidents, like the ones reported in recent fraud cases? Threat Intelligence SQL Injection IoT Hacking Vulnerability Analysis None In a recent case, fraudsters posed as telecom representatives, urging victims to download remote-access apps to “improve connectivity.” What’s the key lesson for preventing similar scams? Install the latest antivirus Use multi-factor authentication Never grant app permissions without verification Regularly change Wi-Fi passwords None Fraudsters use a fake website that resembles a legitimate travel booking platform to trap users. What initial security check can users perform to verify website authenticity? Check for an HTTPS URL and site certificates Enter details as a test Contact customer support to verify Use the website’s contact form None A retired individual is targeted by ransomware demanding payment to regain access to files. What’s a preventive measure to protect data against ransomware? Use easily memorable passwords Avoid public Wi-Fi Regularly back up data in a secure location Disable two-factor authentication None 1 out of 4 Share: 3.0 University Previous post Certified Ethical Hacker v13 Scholarship Test November 6, 2024 Next post Cyber Aptitude Test CEHv13 November 8, 2024 You may also like How to Build Your First Project in the Metaverse? May 8, 2025 How to Get Ethical Hacking Internships as a Student? May 7, 2025 Why Companies Need Ethical Hackers More Than Ever? May 6, 2025