AICY Project
Self-Assesment Sign Up
Attention, use the same email address with which you will register on the platform

Gender

27 1
What is a common method used in brute force attacks to compromise passwords?
1 2
In the realm of cybersecurity, hacking refers to the misuse of devices (such as computers, smartphones, tablets) and networks to?
17 3
A network administrator wants to monitor all traffic on a network using Wireshark. However, it only wants to inspect packets that have the IP address of the destination computer
170 4
Is the use of penetration testing mandatory when securing an IT system?
35 5
What is the primary role of an Information Security Specialist in an organisation?
26 6
Which of the following is the primary objective of password security?
23 7
The purpose of encryption is to ensure data confidentiality. This is especially important in the case of confidential correspondence. Can asymmetric encryption be used to send emails?
16 8
What is Sniffing?
20 9
You are dealing with a network issue where a server is experiencing slow response times. You suspect it might be due to excessive traffic on a particular port. Which tcpdump command would be most helpful in confirming this?
5 10
What is the primary role of an Information Security Specialist in an organization?
37 11
What is it called when a machine learning model learns patterns in the training data very well, but loses the ability to generalise to new, unseen data?
4 12
The Information Security Policy is ?
13 13
Is the use of penetration testing mandatory in securing any IT system?
57 14
What is a commonly used method in brute force attacks to compromise passwords?
10 15
In an e-commerce company, you want to develop a machine learning model to make predictions about whether customers will buy a product or not. In addition to product features, you have various data such as demographic information of customers, past shopping behaviors and interactions on the website. Which of the following algorithms might be best suited for this scenario?
28 16
A company is concerned about potential brute force attacks on its internal network. Based on what you know about password security, which of the following actions would best protect the company from this type of attack?
25 17
The organization manages clients' financial data. Due to the increase in cyberattacks aimed at intercepting sensitive data transmitted over the network, it is necessary to implement an appropriate approach to enhance the security of transmitted data. Which of the following solutions would significantly increase the level of security?
7 18
What is it called when a machine learning model learns patterns in the training data very well but loses the ability to generalize to new, unseen data?
2 19
Which of the following statements defines the type of black hat attack?
38 20
An AI-powered system in a hospital can diagnose diseases and make clinical decisions by analysing patients' heart rhythms, blood values, and laboratory test results. In this case, which of the subfields of artificial intelligence included in the above comments is considered the most important component of this system?
24 21
Which of the following scenarios best illustrates a case where symmetric encryption might be more appropriate than asymmetric encryption?
19 22
An attacker who performs an ARP poisoning attack on a network both updates the ARP table of the target computer and performs a man-in-the-middle attack. Which of the following occurs as a result of this attack?
108 23
A company's IT team noticed an unusual increase in traffic on their network. The following are some data and observations about the network traffic: • Traffic Growth: Over the last 24 hours, there has been a 400% increase in data traffic on the company network compared to normal. • Source IP Addresses: Most of the traffic comes from IP addresses located overseas. • Destination Server: Most of the traffic is directed to the company's web server. • Hourly Distribution: Traffic growth is increasing, especially outside of business hours. • Protocols: Most of the traffic uses HTTP and HTTPS protocols. Which of the following probabilities best describes this situation?
6 24
Which of the following scenarios best exemplifies the application of supervised learning?
22 25
What types of steganography you can indicate?
8 26
An AI-powered system in a hospital can diagnose disease and make clinical decisions by analyzing patients' heart rhythms, blood values, and laboratory test results. In this case, which of the subfields of artificial intelligence included in the notes above is considered the most important component of this system?
30 27
A company wants to develop a comprehensive security plan to defend against a variety of cyber threats, including password attacks, phishing attempts, and man-in-the-middle (MitM) attacks. Which combination of the following strategies would provide the most effective defense across these different threat types?
18 28
A company's IT team noticed an unusual increase in traffic on their network. The following are some data and observations on network traffic: Traffic Growth: In the last 24 hours, 400% more data traffic was observed on the company's network than usual. Source IP Addresses: Most of the traffic originates from IP addresses coming from abroad. Destination Servers: Most of the traffic is routed to the company's web server. Hourly Distribution: Traffic growth is intensifying, especially outside of working hours. Protocols: The majority of traffic uses HTTP and HTTPS protocols. Which of the following probabilities best describes this situation?
12 29
Which of the following sentences is true for Black Box Tests?
58 30
A company is concerned about potential brute force attacks on its internal network. Based on what you know about password security, which of the following actions would best protect the company against this type of attack?
3 31
Which of the following principles of Information Security ensures that information is accessible only to those authorized?
49 32
An attacker who performs an ARP poisoning attack on a network both updates the ARP table of the target computer and performs a man-in-the-middle attack. Which of the following situations occurs as a result of this attack?
21 33
What is symmetric encryption?
14 34
Which of the following set of IT tools should you use to test your IT system against FTP server attacks ?
11 35
Which of the following test is not a penetration test ?
29 36
An organization has noticed an increase in failed login attempts on multiple user accounts over a short period. After analyzing the network traffic, the security team identifies a pattern where numerous login attempts are made from the same IP address, using different combinations of usernames and passwords. Which of the following would be the most appropriate strategy to mitigate this threat?
15 37
At a certain technology company, executives want to test what is the vulnerability of the system to attacks launched from an external computer network? Having developed a test scenario, she wants these tests to be carried out periodically without much involvement of the technical staff, and without time-consuming analysis of the technical documentation of the information system supporting the company's operations. Which type of penetration test will be most suitable for this company?
9 38
Which of the following situations is suitable for the use of the K-Means Clustering algorithm?