AICY Project
Self-Assesment Sign Up
Attention, use the same email address with which you will register on the platform

Gender

11 1
Which of the following test is not a penetration test ?
14 2
Which of the following set of IT tools should you use to test your IT system against FTP server attacks ?
7 3
What is it called when a machine learning model learns patterns in the training data very well but loses the ability to generalize to new, unseen data?
22 4
What types of steganography you can indicate?
27 5
What is a common method used in brute force attacks to compromise passwords?
1 6
In the realm of cybersecurity, hacking refers to the misuse of devices (such as computers, smartphones, tablets) and networks to?
15 7
At a certain technology company, executives want to test what is the vulnerability of the system to attacks launched from an external computer network? Having developed a test scenario, she wants these tests to be carried out periodically without much involvement of the technical staff, and without time-consuming analysis of the technical documentation of the information system supporting the company's operations. Which type of penetration test will be most suitable for this company?
6 8
Which of the following scenarios best exemplifies the application of supervised learning?
3 9
Which of the following principles of Information Security ensures that information is accessible only to those authorized?
20 10
You are dealing with a network issue where a server is experiencing slow response times. You suspect it might be due to excessive traffic on a particular port. Which tcpdump command would be most helpful in confirming this?
10 11
In an e-commerce company, you want to develop a machine learning model to make predictions about whether customers will buy a product or not. In addition to product features, you have various data such as demographic information of customers, past shopping behaviors and interactions on the website. Which of the following algorithms might be best suited for this scenario?
26 12
Which of the following is the primary objective of password security?
28 13
A company is concerned about potential brute force attacks on its internal network. Based on what you know about password security, which of the following actions would best protect the company from this type of attack?
38 14
An AI-powered system in a hospital can diagnose diseases and make clinical decisions by analysing patients' heart rhythms, blood values, and laboratory test results. In this case, which of the subfields of artificial intelligence included in the above comments is considered the most important component of this system?
8 15
An AI-powered system in a hospital can diagnose disease and make clinical decisions by analyzing patients' heart rhythms, blood values, and laboratory test results. In this case, which of the subfields of artificial intelligence included in the notes above is considered the most important component of this system?
49 16
An attacker who performs an ARP poisoning attack on a network both updates the ARP table of the target computer and performs a man-in-the-middle attack. Which of the following situations occurs as a result of this attack?
19 17
An attacker who performs an ARP poisoning attack on a network both updates the ARP table of the target computer and performs a man-in-the-middle attack. Which of the following occurs as a result of this attack?
170 18
Is the use of penetration testing mandatory when securing an IT system?
58 19
A company is concerned about potential brute force attacks on its internal network. Based on what you know about password security, which of the following actions would best protect the company against this type of attack?
24 20
Which of the following scenarios best illustrates a case where symmetric encryption might be more appropriate than asymmetric encryption?
12 21
Which of the following sentences is true for Black Box Tests?
35 22
What is the primary role of an Information Security Specialist in an organisation?
23 23
The purpose of encryption is to ensure data confidentiality. This is especially important in the case of confidential correspondence. Can asymmetric encryption be used to send emails?
18 24
A company's IT team noticed an unusual increase in traffic on their network. The following are some data and observations on network traffic: Traffic Growth: In the last 24 hours, 400% more data traffic was observed on the company's network than usual. Source IP Addresses: Most of the traffic originates from IP addresses coming from abroad. Destination Servers: Most of the traffic is routed to the company's web server. Hourly Distribution: Traffic growth is intensifying, especially outside of working hours. Protocols: The majority of traffic uses HTTP and HTTPS protocols. Which of the following probabilities best describes this situation?
9 25
Which of the following situations is suitable for the use of the K-Means Clustering algorithm?
29 26
An organization has noticed an increase in failed login attempts on multiple user accounts over a short period. After analyzing the network traffic, the security team identifies a pattern where numerous login attempts are made from the same IP address, using different combinations of usernames and passwords. Which of the following would be the most appropriate strategy to mitigate this threat?
16 27
What is Sniffing?
30 28
A company wants to develop a comprehensive security plan to defend against a variety of cyber threats, including password attacks, phishing attempts, and man-in-the-middle (MitM) attacks. Which combination of the following strategies would provide the most effective defense across these different threat types?
4 29
The Information Security Policy is ?
5 30
What is the primary role of an Information Security Specialist in an organization?
2 31
Which of the following statements defines the type of black hat attack?
21 32
What is symmetric encryption?
13 33
Is the use of penetration testing mandatory in securing any IT system?
108 34
A company's IT team noticed an unusual increase in traffic on their network. The following are some data and observations about the network traffic: • Traffic Growth: Over the last 24 hours, there has been a 400% increase in data traffic on the company network compared to normal. • Source IP Addresses: Most of the traffic comes from IP addresses located overseas. • Destination Server: Most of the traffic is directed to the company's web server. • Hourly Distribution: Traffic growth is increasing, especially outside of business hours. • Protocols: Most of the traffic uses HTTP and HTTPS protocols. Which of the following probabilities best describes this situation?
37 35
What is it called when a machine learning model learns patterns in the training data very well, but loses the ability to generalise to new, unseen data?
17 36
A network administrator wants to monitor all traffic on a network using Wireshark. However, it only wants to inspect packets that have the IP address of the destination computer
57 37
What is a commonly used method in brute force attacks to compromise passwords?
25 38
The organization manages clients' financial data. Due to the increase in cyberattacks aimed at intercepting sensitive data transmitted over the network, it is necessary to implement an appropriate approach to enhance the security of transmitted data. Which of the following solutions would significantly increase the level of security?