Cyber Aptitude Test Final Posted by 3.0 University Date November 13, 2024 Comments 0 comment Welcome to Cyber Aptitude Test Note: Please fill out the form below to begin the test. Name Email Phone Your Profession (Student or Working Professional) Which of the following is a proactive approach for analyzing cyber threats based on past incidents, like the ones reported in recent fraud cases? Threat Intelligence IoT Hacking Vulnerability Analysis SQL Injection None A hacker intercepts login sessions on unsecured public Wi-Fi to steal credentials. Which type of attack is this? Denial of Service Spoofing Session Hijacking IP Spoofing None What is phishing? Tricking people into sharing sensitive information by pretending to be a trustworthy source A type of bug Searching online for information A gaming term None What is encryption? A way to make text look stylish A Wi-Fi signal booster A type of password generator A process that converts data into a code to prevent unauthorized access None What is a firewall? A network security system that monitors and controls incoming and outgoing traffic A type of data storage device A file-sharing app A wall that protects buildings from fire None Why is it important to keep your software updated? It uses less memory It makes your computer look cooler It changes the design Updates often fix security issues and bugs None In a recent case, fraudsters posed as telecom representatives, urging victims to download remote-access apps to “improve connectivity.” What’s the key lesson for preventing similar scams? Use multi-factor authentication Install the latest antivirus Regularly change Wi-Fi passwords Never grant app permissions without verification None What is cybersecurity? Protecting computers and networks from theft and damage Buying antivirus software Learning to code Backing up data regularly None Fraudsters use a fake website that resembles a legitimate travel booking platform to trap users. What initial security check can users perform to verify website authenticity? Check for an HTTPS URL and site certificates Enter details as a test Use the website’s contact form Contact customer support to verify None What is two-factor authentication? A security method requiring two forms of verification Using two computers for one account Using two separate Wi-Fi networks Writing your password twice None A retired official was recently scammed by fraudsters posing as law enforcement, asking for money to “clear his name.” What tactic is being used here? Scareware Phishing Baiting Pretexting None If your computer is behaving strangely and slowing down, what might be the cause? A poor internet connection A virus or malware infection Too many icons on your desktop A dusty keyboard None An AI tool used in cybersecurity flags patterns but struggles with new attacks. What’s the best approach to keep it effective? Turn it off during peak hours Depend solely on AI monitoring Use it only on old threats Regularly update it with new threat data None A telecom fraud involves fake app installations. Which step can users take to ensure downloaded apps are legitimate? Disable phone lock for easy access Check the app’s name only Rely on links from messages Always download apps from official app stores None AI is often used to predict and prevent phishing attacks. Which feature of AI enables it to differentiate between legitimate and fake emails effectively? Biometric Analysis Data Compression Pattern Recognition URL Shortening None An online shopping platform experienced a data breach through SQL Injection. Which primary security flaw likely allowed the breach? Lack of input validation Weak password policies Poor network segmentation Inadequate firewall protection None Which of the following is a good password practice? Using 'password123' Using a combination of letters, numbers, and symbols Writing down passwords on paper Sharing passwords with friends None Which of these devices could be a target for hackers? Only government-owned devices Only desktop computers Any device connected to the internet, like phones, tablets, and smart TVs Just old computers None A tech graduate leads a cybercrime ring targeting job seekers by impersonating government officials and asking for personal details. What vulnerability are they exploiting? IDS Evasion SQL Injection Buffer Overflow Social Engineering None What is malware? Software that helps improve computer speed A type of computer hardware A setting to improve display quality Harmful software designed to damage or gain unauthorized access None 1 out of 2 Share: 3.0 University Previous post Cyber Aptitude Test CEHv13 November 13, 2024 You may also like How to Build Your First Project in the Metaverse? May 8, 2025 How to Get Ethical Hacking Internships as a Student? May 7, 2025 Why Companies Need Ethical Hackers More Than Ever? May 6, 2025