AICY Project
Self-Assesment Sign Up
Attention, use the same email address with which you will register on the platform

Gender

58 1
Een bedrijf maakt zich zorgen over mogelijke brute force-aanvallen op zijn interne netwerk. Op basis van wat u weet over wachtwoordbeveiliging, welke van de volgende acties zou het bedrijf het beste beschermen tegen dit soort aanvallen?
29 2
An organization has noticed an increase in failed login attempts on multiple user accounts over a short period. After analyzing the network traffic, the security team identifies a pattern where numerous login attempts are made from the same IP address, using different combinations of usernames and passwords. Which of the following would be the most appropriate strategy to mitigate this threat?
11 3
Which of the following test is not a penetration test ?
15 4
At a certain technology company, executives want to test what is the vulnerability of the system to attacks launched from an external computer network? Having developed a test scenario, she wants these tests to be carried out periodically without much involvement of the technical staff, and without time-consuming analysis of the technical documentation of the information system supporting the company's operations. Which type of penetration test will be most suitable for this company?
38 5
Een AI-aangedreven systeem in een ziekenhuis kan ziekten diagnosticeren en klinische beslissingen nemen door het hartritme, de bloedwaarden en de resultaten van laboratoriumtests van patiënten te analyseren. In dit geval, welke van de deelgebieden van kunstmatige intelligentie die in de bovenstaande opmerkingen zijn opgenomen, wordt beschouwd als het belangrijkste onderdeel van dit systeem?
12 6
Which of the following sentences is true for Black Box Tests?
6 7
Which of the following scenarios best exemplifies the application of supervised learning?
23 8
The purpose of encryption is to ensure data confidentiality. This is especially important in the case of confidential correspondence. Can asymmetric encryption be used to send emails?
8 9
An AI-powered system in a hospital can diagnose disease and make clinical decisions by analyzing patients' heart rhythms, blood values, and laboratory test results. In this case, which of the subfields of artificial intelligence included in the notes above is considered the most important component of this system?
170 10
Czy stosowanie testów penetracyjnych jest obowiązkowe w przypadku zabezpieczania systemu informatycznego?
37 11
Hoe heet het als een machine learning-model patronen in de trainingsgegevens heel goed leert, maar het vermogen verliest om te generaliseren naar nieuwe, ongeziene gegevens?
22 12
What types of steganography you can indicate?
17 13
A network administrator wants to monitor all traffic on a network using Wireshark. However, it only wants to inspect packets that have the IP address of the destination computer
10 14
In an e-commerce company, you want to develop a machine learning model to make predictions about whether customers will buy a product or not. In addition to product features, you have various data such as demographic information of customers, past shopping behaviors and interactions on the website. Which of the following algorithms might be best suited for this scenario?
3 15
Which of the following principles of Information Security ensures that information is accessible only to those authorized?
35 16
Wat is de primaire rol van een Information Security Specialist in een organisatie?
21 17
What is symmetric encryption?
14 18
Which of the following set of IT tools should you use to test your IT system against FTP server attacks ?
13 19
Is the use of penetration testing mandatory in securing any IT system?
2 20
Which of the following statements defines the type of black hat attack?
4 21
The Information Security Policy is ?
49 22
Een aanvaller die een ARP-vergiftigingsaanval op een netwerk uitvoert, werkt zowel de ARP- tabel van de doelcomputer bij als voert een man-in-the-middle-aanval uit. Welke van de volgende situaties gebeurt als gevolg van deze aanval?
7 23
What is it called when a machine learning model learns patterns in the training data very well but loses the ability to generalize to new, unseen data?
108 24
Il team IT di un'azienda ha notato un aumento insolito del traffico sulla loro rete. I seguenti sono alcuni dati e osservazioni sul traffico di rete: • Crescita del Traffico: Nelle ultime 24 ore è stato osservato un aumento del 400% del traffico dati sulla rete aziendale rispetto alla norma. • Indirizzi IP di origine: La maggior parte del traffico proviene da indirizzi IP provenienti dall'estero. • Server di destinazione: La maggior parte del traffico è indirizzato al server web aziendale. • Distribuzione Oraria: La crescita del traffico è in aumento, soprattutto al di fuori dell'orario lavorativo. • Protocolli: La maggior parte del traffico utilizza i protocolli HTTP e HTTPS. Quale delle seguenti probabilità descrive meglio questa situazione?
9 25
Which of the following situations is suitable for the use of the K-Means Clustering algorithm?
26 26
Which of the following is the primary objective of password security?
16 27
What is Sniffing?
30 28
A company wants to develop a comprehensive security plan to defend against a variety of cyber threats, including password attacks, phishing attempts, and man-in-the-middle (MitM) attacks. Which combination of the following strategies would provide the most effective defense across these different threat types?
57 29
Wat is een veelgebruikte methode bij brute force-aanvallen om wachtwoorden te compromitteren?
27 30
What is a common method used in brute force attacks to compromise passwords?
5 31
What is the primary role of an Information Security Specialist in an organization?
18 32
A company's IT team noticed an unusual increase in traffic on their network. The following are some data and observations on network traffic: Traffic Growth: In the last 24 hours, 400% more data traffic was observed on the company's network than usual. Source IP Addresses: Most of the traffic originates from IP addresses coming from abroad. Destination Servers: Most of the traffic is routed to the company's web server. Hourly Distribution: Traffic growth is intensifying, especially outside of working hours. Protocols: The majority of traffic uses HTTP and HTTPS protocols. Which of the following probabilities best describes this situation?
20 33
You are dealing with a network issue where a server is experiencing slow response times. You suspect it might be due to excessive traffic on a particular port. Which tcpdump command would be most helpful in confirming this?
19 34
An attacker who performs an ARP poisoning attack on a network both updates the ARP table of the target computer and performs a man-in-the-middle attack. Which of the following occurs as a result of this attack?
25 35
The organization manages clients' financial data. Due to the increase in cyberattacks aimed at intercepting sensitive data transmitted over the network, it is necessary to implement an appropriate approach to enhance the security of transmitted data. Which of the following solutions would significantly increase the level of security?
28 36
A company is concerned about potential brute force attacks on its internal network. Based on what you know about password security, which of the following actions would best protect the company from this type of attack?
24 37
Which of the following scenarios best illustrates a case where symmetric encryption might be more appropriate than asymmetric encryption?
1 38
In the realm of cybersecurity, hacking refers to the misuse of devices (such as computers, smartphones, tablets) and networks to?