
SIRT 24042023
Authored by shishirkumar s
Specialty
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 20 pts
What is the name of malware which is made using AI?
Black Mamba
Cyber Cobra
Venom
Rattle Snake
2.
MULTIPLE CHOICE QUESTION
1 min • 20 pts
NICS stands for....
Nature-inspired Cyber Security
Natural Implementation of Cyber Security
National Institute for Career Service
National Informatics Center Service
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The concept, according to which any cyberattacks, threats, and criminals will be worthless is known as ................
Cyber Immunity
Cyber Deception
Cyber Worthless
Cyber Honeypots
4.
MULTIPLE CHOICE QUESTION
1 min • 4 pts
A series of steps that trace stages of a cyberattack from the early reconnaissance stages to the exfiltration of data is combinedly known as .............
Cyber Kill Chain
Cyber Traps
Cyber Reconnaissance
Cyber Ninja
5.
MULTIPLE SELECT QUESTION
1 min • 20 pts
Following (multiple) concepts from nature can be implemented in Cyber Security..
Camouflaging by Chameleon
Illumination Attraction by Fireflies
Attack by Frog Fish
Defense by Monkeys
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?