Which of the following is NOT one of Johan's research interests?

Masterclass

Quiz
•
Computers
•
Professional Development
•
Hard
Johan Alibasa
Used 1+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Software security
HCI
Applications of AI
Cryptography
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the main idea behind Bruce Schneier's quote shown in the presentation?
Technology alone can effectively address most security concerns
Security threats will eventually be eliminated by better technology
Solving security problems requires more than just technical tools
Most security problems cannot be solved by any available method
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is one of the primary goals of APNIC’s grant initiatives, such as those offered through the Information Society Innovation Fund (ISIF Asia)?
To develop commercial internet service providers in developed countries
To promote exclusive access to internet infrastructure in private sectors
To fund projects that expand internet access in underserved areas
To regulate internet content across Asia-Pacific countries
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following scenarios best illustrates a breach of integrity in the CIA triad of cybersecurity?
An unauthorized user accesses confidential medical records
A hacker modifies financial data in a company’s database
A denial-of-service attack makes a website unavailable to users
A secure login system prevents users from accessing their accounts
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following scenarios best illustrates a real-world cybersecurity threat from the current landscape?
An attacker encrypts company files and demands payment to restore access
A user forgets their password and resets it using a secure link
A company performs regular software updates to prevent system issues
An employee installs antivirus software on a personal device
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is NOT a common limitation of traditional cybersecurity defense methods?
Manual analysis and delayed response to threats
Human fatigue due to alert overload
Reactive strategies that act after an attack occurs
Real-time threat detection powered by automation
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following best describes the relationship between AI, Machine Learning (ML), and Deep Learning (DL)?
ML is a broader concept that includes both AI and DL
AI, ML, and DL are unrelated fields in computer science
AI includes ML, and ML includes DL as a subset
DL is a separate approach that replaces AI and ML entirely
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Generative AI Quiz

Quiz
•
Professional Development
11 questions
AI Vocabulary

Quiz
•
Professional Development
10 questions
Microprocessor 8086 Architecture -Module I

Quiz
•
Professional Development
13 questions
CyberSecurity

Quiz
•
Professional Development
10 questions
Digital Etiquette Quiz

Quiz
•
Professional Development
10 questions
IT ENGLISH: Research Project Topics - People in IT

Quiz
•
Professional Development
20 questions
6.0 Security - CompTIA IT Fundamentals (ITF+) Security Quiz #1

Quiz
•
Professional Development
20 questions
Artificial Intelligence

Quiz
•
8th Grade - Professio...
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade