Dubai - Geography
Cyber Security - Basics
Dubai - Culture & Traditions
Cyber Security - Advance
100

Dubai is located on the coastline of which body of water?

The Persian Gulf

100

What term describes a system that controls network traffic based on security rules?

Firewall

100

What is the traditional Arabic coffee served in small cups called?

Gahwa

100

What type of attack floods a server to make it unavailable?

Denial of Service (DoS) attack

200

The Dubai Creek, a significant geographical feature, divides Dubai into which two main sections?

Deira and Bur Dubai

200

What single word describes the act of tricking someone into revealing personal information?

Phishing

200

What is the name of the traditional wooden boats used for fishing and pearl diving, still seen in Dubai Creek?

Dhows

200

What is social engineering in cyber attacks?

Human manipulation for data/access.

300

The artificial islands known as "The Palm Jumeirah" are shaped like what?

A palm tree

300

What single word describes the process of converting data into a secret code?

Encryption

300

What is the name of the festival that marks the end of Ramadan?

Eid al-Fitr

300

What is a botnet?

Network of infected computers.

400

The Dubai Mall, one of the world's largest shopping malls, is located adjacent to which famous landmark?

Burj Khalifa

400

Name the three components of the CIA Triad

  • Confidentiality
  • Integrity
  • Availability
400

What is the name of the sweet pastry made with layers of filo dough, nuts, and syrup?

Baklava

400

What term describes the act of stealing usernames and passwords to gain unauthorized access to accounts?

Credential theft

500

Which iconic hotel in Dubai is known for its distinctive sail-shaped design?

The Burj Al Arab

500

What two-word phrase describes a vulnerability unknown to the software vendor?

Zero-day

500

What is the name of the traditional Emirati dance often performed at celebrations?

Al Ayala

500

What name is given to malicious code hidden within seemingly harmless files or programs?

Trojan Horse