Search Header Logo

Cyber Security Essentials 4th August 2025

Authored by Udhayakumar Shanmugam

Computers

University

Used 2+ times

Cyber Security Essentials 4th August 2025
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DDoS

is a malicious cyberattack where multiple compromised computer systems, often forming a botnet, flood a targeted server, service, or network with a massive amount of traffic.

a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed

is a type of malicious cyber attack where an attacker tricks a user into performing actions on a website that they are already authenticated on, without the user's knowledge or consent.

is a cyberattack that exploits vulnerabilities in Application Programming Interfaces (APIs) to achieve malicious objectives.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DNS query flood denial of service attacks mainly .....................................sector, that accounts for more than 40% of all sectors

Financial

Healthcare

Telecom

Social media

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..................................................... are groups of criminals who unite to carry out cyber attacks in support of political causes. They typically target entire industries but sometimes attack specific organizations who they feel don't align with their political views or practices.

Ethical Hackers

Hacktivists

Activist

Cyber Ciriminals

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In 2024, ...............................acted as a primary coordination and communication hub for

hacktivist groups, largely due to its anonymity features and lenient moderation.

Twitter

Facebook

Telegram

Signal

Whatsapp

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The surge in AI technologies gave rise to sophisticated ................. bots, which

aggressively scrape data to train AI models—often without explicit permission

“grey”

"bad"

“black”

“White”

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.............................videos are media, typically videos, that are digitally manipulated or created using artificial intelligence to make it appear as if someone is doing or saying something they never did. These videos are often highly realistic, making them difficult to distinguish from genuine footage, and can be used to spread misinformation, create false narratives, or even impersonate individuals.

Proxy

Fake

Deepfake

Morphed

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An API, which stands for ..........................................................................., is a set of rules and protocols that allows different software applications to communicate and interact with each other.

Application Programming Interface

Application Programming Interchange

Application Process Interface

Android Programming Interface

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?