Spot the Lies:
Why are deepfakes called ‘deepfakes’?
Cybersecurity Trivia Quiz
Quiz
•
Other
•
12th Grade
•
Hard
Staff Hong
Used 34+ times
FREE Resource
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Spot the Lies:
Why are deepfakes called ‘deepfakes’?
A. People can’t tell the difference between what is real and what is fake.
B. The term ‘deep’ comes from the underlying technology of ‘deep learning’ which is a form of artificial intelligence.
C. Machine learning manipulates or generates visual and audio content with the intention to deceive.
D. All of the above
Answer explanation
The word deepfake comes from a combination of the words ‘deep learning’ and ‘fake’ referring to how a person in an existing image or video is replaced with another person’s likeness using machine learning and artificial intelligence to make it as realistic as possible.
Deepfake technology is a threat to cybersecurity as it can be used to create scams, false claims, and hoaxes that undermine and destabilise organisations.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Spot the lies:
Disinformation can spread easily through fake accounts, which can be created by bots and / or humans. How many fake accounts do you think was taken down by Facebook in the year 2021?
A. More than 6 billion fake accounts
B. Slightly less than 5 billion fake accounts
C. About 2 billion fake accounts
D. Less than 1 billion fake accounts
Answer explanation
In 2021 alone, more than 6 billion fake accounts were found by Facebook! That is practically the same number of people in the entire world. This reminds us about the importance of being wary of strangers and information that we receive on social media.
Fake accounts are a cybersecurity concern as the misinformation they provide can divide and destabilise societies.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Spot the Lies:
An organisation employing people to make deliberately offensive or provocative online posts in order to cause conflict or manipulate public opinion is known as ________.
Answer explanation
Fun fact: A study into troll farms have showed that 30 different governments worldwide have paid keyboard armies to spread propaganda and attack critics, which could divide societies and destabilise a country.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Spot the Lies:
In Singapore, fake news is combated by a regulation called POFMA. What does POFMA stand for?
Answer explanation
Created in 2019, POFMA allows the government to ask parties who have placed false information online to make corrections to falsehoods, indicate that an information previously communicated was false or to remove the false information completely. This increases Singapore’s cybersecurity as it helps to prevent disinformation from spreading.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Foreign Invaders
What is the most basic form of defense against a cyber attack to stop unusual network connections?
Anti-Virus
Firewalls
Encryption
Passwords
Answer explanation
A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organisation's previously established security policies.
A firewall is an important component of cybersecurity and ensures that hackers or malware cannot immediately access any digital device that is connected to the internet.
At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Foreign Invaders
Which of the following is an example of Internet Protocol (IP) spoofing?
SQL injections
Cross-Site scripting
ARP poisoning
Man-in-the-middle attack
Answer explanation
A man in the middle (MITM) attack is a general term when a perpetrator positions himself in a conversation between a user and an application – either to eavesdrop or to impersonate one of the parties.
This attack is useful for stealing personal information, such as login credentials, account details and credit card numbers. This compromises cybersecurity as the data stolen can be used to perpetrate further attempts of fraud or even steal classified information.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Foreign Invaders
A botnet is_______.
A collection of computers that have been infected with blocks of code to perform malicious tasks
A computer virus that propagates itself from computer to computer via e-mail
A zombie controlled through a command-and-control server
An application program that attacks computer networks
Answer explanation
A botnet (derived from 'robot network') is a large group of malware-infected internet-connected devices and computers controlled by a single operator (a single infected device is called a botnet drone).
20 questions
Workshop : Pelatihan Basic Cyber Security
Quiz
•
12th Grade
14 questions
Holiday This or That
Quiz
•
9th - 12th Grade
12 questions
Accountic Basic NOCTI Sample Questions (Set 1)
Quiz
•
9th Grade - University
20 questions
Eva. 1BIM 4to PRIM
Quiz
•
4th Grade - University
12 questions
M2 Social Engineering, Camb Nats
Quiz
•
9th - 12th Grade
12 questions
Cyber Society Laws Vocab
Quiz
•
9th - 12th Grade
20 questions
MYOB
Quiz
•
11th - 12th Grade
20 questions
MYOB Corner
Quiz
•
12th Grade
15 questions
Character Analysis
Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing
Quiz
•
9th - 12th Grade
10 questions
American Flag
Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension
Quiz
•
5th Grade
30 questions
Linear Inequalities
Quiz
•
9th - 12th Grade
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25
Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers
Quiz
•
6th - 8th Grade
17 questions
Chapter 12 - Doing the Right Thing
Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities
Quiz
•
9th - 12th Grade
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
20 questions
Taxes
Quiz
•
9th - 12th Grade
17 questions
Parts of Speech
Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression
Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing
Quiz
•
9th - 12th Grade
10 questions
Identifying equations
Quiz
•
KG - University