Which core technology allows AI to learn from data?
a. Hardcoding
b. Machine Learning
c. Copy-pasting
d. File sharing
b. Machine Learning
What is a common AI threat?
a. User convenience
b. Data manipulation
c. Increased productivity
d. Enhanced security
b.Data manipulation
Which task can AI perform automatically in cybersecurity?
a. Take lunch orders
b. Scan for suspicious activity
c. Design company logos
d. Update social media posts
b. Scan for suspicious activity
True or false: Cloud data is always secure.
a. True
b. False
b. False
Which is a cloud risk?
a. Cost savings
b. Accessibility
c. Increased storage
d. Data breaches
d. Data breaches
Which of the following is a key feature of AI in cybersecurity?
a. Auto-logout
b. Pattern recognition
c. USB scanning
d. File compression
b. Pattern recognition
What can AI do to data privacy?
a. Ignore it
b. Protect it
c. Compromise it
d. Enhance it
c. Compromise it
How does AI improve phishing detection?
a. Ignores suspicious emails
b. Analyzes email patterns and flags anomalies
c. Deletes all emails
d. Blocks email access entirely
b. Analyzes email patterns and flags anomalies
What is a cloud benefit?
a. Scalability
b. Physical storage
c. High maintenance
d. Limited access
a. Scalability
What is a common cloud threat?
a. Increased bandwidth
b. Phishing attacks
c. Data redundancy
d. User training
b.Phishing attacks
What does “training” mean in AI?
a. Teaching employees
b. Installing updates
c. Feeding data to the system to improve performance
d. Running antivirus
c. Feeding data to the system to improve performance
How can AI be misused?
a. Securing networks
b. Creating malware
c. Improving software
d. Enhancing user experience
b. Creating malware
What is one main benefit of using AI in cybersecurity?
a. Slower threat detection
b. Faster threat detection
c. Increased human workload
d. Random alerts
b. Faster threat detection
What is a cloud access control?
a. User permissions
b. Backup frequency
c. Network speed
d. Data storage
a. User permissions
What is a risk of syncing devices to cloud accounts?
a. Better battery life
b. Increased exposure to unauthorized access
c. Smoother Wi-Fi
d. Auto-brightness issues
b. Increased exposure to unauthorized access
What type of data does AI analyze to detect anomalies?
a. User behavior and system activity logs
b. Color settings
c. Contact lists
d. Wallpapers
a. User behavior and system activity logs
Which AI threat targets personal data?
a. Cloud computing
b. Identity theft
c. User feedback
d. Data analysis
b. Identity theft
What role does AI play in detecting malware?
a. Waits for user reports
b. Requires daily manual updates
c. Identifies new threats through behavior analysis
d. Only works with known viruses
c. Identifies new threats through behavior analysis
What does encryption do?
a. Increases costs
b. Protects data
c. Limits sharing
d. Slows down access
b. Protects data
What happens if cloud backups are not encrypted?
a. Files become too large
b. Sensitive data can be exposed
c. They save power
d. Backups won’t work
b. Sensitive data can be exposed
What does an AI algorithm do when it finds a pattern?
a. Ignores it
b. Logs out the user
c. Flags or classifies it for action
d. Shuts down the system
c. Flags or classifies it for action
Which AI threat involves impersonation?
a. Phishing emails
b. Cloud storage
c. Deepfakes
d. Data encryption
c. Deepfakes
How does AI contribute to threat intelligence?
a. By archiving old threats
b. By analyzing global data and predicting attacks
c. By deleting suspicious logs
d. By disabling threat alerts
b. By analyzing global data and predicting attacks
How can you secure cloud data?
a. Regular audits
b. Using weak passwords
c. Sharing credentials
d. Ignoring updates
a. Regular audits
What can attackers exploit in a poorly secured cloud service?
a. Strong passwords
b. Weak access controls and public links
c. Two-factor authentication
d. Software updates
b. Weak access controls and public links