General AI
AI Risks
AI Benefits
General Cloud
Cloud Risks
100

Which core technology allows AI to learn from data?
a. Hardcoding
b. Machine Learning
c. Copy-pasting
d. File sharing

b. Machine Learning

100

What is a common AI threat?
a. User convenience
b. Data manipulation
c. Increased productivity
d. Enhanced security


b.Data manipulation

100

Which task can AI perform automatically in cybersecurity?
a. Take lunch orders
b. Scan for suspicious activity
c. Design company logos
d. Update social media posts

b. Scan for suspicious activity

100

True or false: Cloud data is always secure.

a. True

b. False

b. False

100

Which is a cloud risk?

a. Cost savings

b. Accessibility

c. Increased storage

d. Data breaches

d. Data breaches

200

Which of the following is a key feature of AI in cybersecurity?
a. Auto-logout
b. Pattern recognition
c. USB scanning
d. File compression

b. Pattern recognition

200

What can AI do to data privacy?
a. Ignore it
b. Protect it
c. Compromise it
d. Enhance it

c. Compromise it

200

How does AI improve phishing detection?
a. Ignores suspicious emails
b. Analyzes email patterns and flags anomalies
c. Deletes all emails
d. Blocks email access entirely

b. Analyzes email patterns and flags anomalies

200

What is a cloud benefit?

a. Scalability

b. Physical storage

c. High maintenance

d. Limited access

a. Scalability

200

What is a common cloud threat?

a. Increased bandwidth

b. Phishing attacks

c. Data redundancy

d. User training

b.Phishing attacks

300

What does “training” mean in AI?
a. Teaching employees
b. Installing updates
c. Feeding data to the system to improve performance
d. Running antivirus

c. Feeding data to the system to improve performance

300

How can AI be misused?
a. Securing networks
b. Creating malware
c. Improving software
d. Enhancing user experience

b. Creating malware


300

What is one main benefit of using AI in cybersecurity?
a. Slower threat detection
b. Faster threat detection
c. Increased human workload
d. Random alerts

b. Faster threat detection

300

What is a cloud access control?

a. User permissions

b. Backup frequency

c. Network speed

d. Data storage

a. User permissions

300

What is a risk of syncing devices to cloud accounts?
a. Better battery life
b. Increased exposure to unauthorized access
c. Smoother Wi-Fi
d. Auto-brightness issues


b. Increased exposure to unauthorized access

400

What type of data does AI analyze to detect anomalies?
a. User behavior and system activity logs
b. Color settings
c. Contact lists
d. Wallpapers

a. User behavior and system activity logs

400

Which AI threat targets personal data?
a. Cloud computing
b. Identity theft
c. User feedback
d. Data analysis

b. Identity theft


400

What role does AI play in detecting malware?
a. Waits for user reports
b. Requires daily manual updates
c. Identifies new threats through behavior analysis
d. Only works with known viruses

c. Identifies new threats through behavior analysis

400

What does encryption do?

a. Increases costs

b. Protects data

c. Limits sharing

d. Slows down access

b. Protects data

400

What happens if cloud backups are not encrypted?
a. Files become too large
b. Sensitive data can be exposed
c. They save power
d. Backups won’t work

b. Sensitive data can be exposed

500

What does an AI algorithm do when it finds a pattern?
a. Ignores it
b. Logs out the user
c. Flags or classifies it for action
d. Shuts down the system

c. Flags or classifies it for action

500

Which AI threat involves impersonation?
a. Phishing emails
b. Cloud storage
c. Deepfakes
d. Data encryption

c. Deepfakes

500

How does AI contribute to threat intelligence?
a. By archiving old threats
b. By analyzing global data and predicting attacks
c. By deleting suspicious logs
d. By disabling threat alerts

b. By analyzing global data and predicting attacks

500

How can you secure cloud data?

a. Regular audits

b. Using weak passwords

c. Sharing credentials

d. Ignoring updates  

a. Regular audits

500

What can attackers exploit in a poorly secured cloud service?
a. Strong passwords
b. Weak access controls and public links
c. Two-factor authentication
d. Software updates

b. Weak access controls and public links

M
e
n
u