Search Header Logo

SIRT 24042023

Authored by shishirkumar s

Specialty

University

Used 2+ times

SIRT 24042023
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

What is the name of malware which is made using AI?

Black Mamba

Cyber Cobra

Venom

Rattle Snake

2.

MULTIPLE CHOICE QUESTION

1 min • 20 pts

NICS stands for....

Nature-inspired Cyber Security

Natural Implementation of Cyber Security

National Institute for Career Service

National Informatics Center Service

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The concept, according to which any cyberattacks, threats, and criminals will be worthless is known as ................

Cyber Immunity

Cyber Deception

Cyber Worthless

Cyber Honeypots

4.

MULTIPLE CHOICE QUESTION

1 min • 4 pts

A series of steps that trace stages of a cyberattack from the early reconnaissance stages to the exfiltration of data is combinedly known as .............

Cyber Kill Chain

Cyber Traps

Cyber Reconnaissance

Cyber Ninja

5.

MULTIPLE SELECT QUESTION

1 min • 20 pts

Following (multiple) concepts from nature can be implemented in Cyber Security..

Camouflaging by Chameleon

Illumination Attraction by Fireflies

Attack by Frog Fish

Defense by Monkeys

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?