You are on page 1of 10

Question(

questionText: 'What is AI?',

answerOptions: [

'Artificial Intelligence',

'Augmented Intelligence',

'Advanced Intelligence',

'Automated Intelligence'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText: 'What is a neural network?',

answerOptions: [

'A machine learning model',

'A type of computer network',

'A type of programming language',

'A type of computer hardware'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText: 'What is machine learning?',

answerOptions: [

'A subset of AI that focuses on building models that can learn from data',

'A type of programming language',

'A type of computer hardware',

'A type of computer network'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText: 'What is deep learning?',

answerOptions: [

'A subset of machine learning that uses neural networks with multiple hidden layers',

'A type of programming language',

'A type of computer hardware',

'A type of computer network'


],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText: 'What is reinforcement learning?',

answerOptions: [

'A type of machine learning where an agent learns to make decisions by interacting with an environment',

'A type of programming language',

'A type of computer hardware',

'A type of computer network'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText: 'What is natural language processing (NLP)?',

answerOptions: [

'A type of AI that deals with the interaction between computers and human language',

'A type of computer network',

'A type of programming language',

'A type of computer hardware'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText: 'What is computer vision?',

answerOptions: [

'A type of AI that deals with enabling machines to interpret and understand visual information from the world',

'A type of computer network',

'A type of programming language',

'A type of computer hardware'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText: 'What is the CPU?',

answerOptions: [

'Central Processing Unit',


'Control Processing Unit',

'Core Processing Unit',

'Computer Processing Unit'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText: 'What is RAM?',

answerOptions: [

'Random Access Memory',

'Read Access Memory',

'Rapid Access Memory',

'Real Access Memory'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText: 'What is a GPU?',

answerOptions: [

'Graphics Processing Unit',

'Game Processing Unit',

'Global Processing Unit',

'General Processing Unit'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText: 'What is an SSD?',

answerOptions: [

'Solid State Drive',

'Solid State Disk',

'Serial State Drive',

'Serial State Disk'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(
questionText: 'What is an HDD?',

answerOptions: [

'Hard Disk Drive',

'Hard Drive Disk',

'High Disk Drive',

'Heavy Disk Drive'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText: 'What is Linux?',

answerOptions: [

'An open-source operating system',

'A closed-source operating system',

'A programming language',

'A web browser'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText: 'What is an API?',

answerOptions: [

'Application Programming Interface',

'Application Protocol Interface',

'Application Processing Interface',

'Application Platform Interface'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText: 'What is HTTP?',

answerOptions: [

'Hypertext Transfer Protocol',

'Hypertext Terminal Protocol',

'Hypertext Transmission Protocol',

'Hypertext Testing Protocol'

],

correctAnswerIndex: 0,
imageUrl: null,

),

Question(

questionText: 'What is CSS?',

answerOptions: [

'Cascading Style Sheets',

'Computer Style Sheets',

'Creative Style Sheets',

'Cascading Script Sheets'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText: 'What is HTML?',

answerOptions: [

'Hypertext Markup Language',

'Hypertext Machine Language',

'Hypertext Management Language',

'Hypertext Modeling Language'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText:

'What is a common method used by hackers to gain unauthorized access to a system?',

answerOptions: ['Phishing', 'Firewall', 'Encryption', 'Antivirus'],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText: 'What is the purpose of a firewall?',

answerOptions: [

'To prevent unauthorized access to a network',

'To encrypt data',

'To scan for viruses',

'To authenticate users'

],

correctAnswerIndex: 0,

imageUrl: null,
),

Question(

questionText:

'What is the name of the encryption algorithm used by HTTPS?',

answerOptions: ['RSA', 'AES', 'DES', 'MD5'],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText:

'What is a common type of cyber attack that involves flooding a network with traffic?',

answerOptions: ['DDoS', 'Phishing', 'Malware', 'Spyware'],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText:

'What is the name of the government agency responsible for cybersecurity in the United States?',

answerOptions: ['NSA', 'CIA', 'FBI', 'DHS'],

correctAnswerIndex: 3,

imageUrl: null,

),

Question(

questionText:

'What is the process of identifying vulnerabilities in a system or application called?',

answerOptions: [

'Penetration testing',

'Vulnerability scanning',

'Threat modeling',

'Risk assessment'

],

correctAnswerIndex: 1,

imageUrl: null,

),

Question(

questionText:

'What is the name of the protocol used for secure remote access to a network?',

answerOptions: ['SSH', 'FTP', 'HTTP', 'SMTP'],

correctAnswerIndex: 0,

imageUrl: null,

),
Question(

questionText:

'What is a common method used by attackers to steal sensitive information?',

answerOptions: ['Phishing', 'Firewall', 'Encryption', 'Antivirus'],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText:

'What is the name of the system used for authenticating users in many web applications?',

answerOptions: ['OAuth', 'SAML', 'OpenID', 'LDAP'],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText:

'What is the name of the protocol used for sending email messages?',

answerOptions: ['SMTP', 'FTP', 'HTTP', 'SSH'],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText:

'What is the name of the cryptographic hash function used for storing passwords?',

answerOptions: ['MD5', 'SHA-1', 'SHA-256', 'AES'],

correctAnswerIndex: 2,

imageUrl: null,

),

Question(

questionText:

'What is the process of encrypting data to prevent unauthorized access called?',

answerOptions: [

'Encryption',

'Decryption',

'Authentication',

'Authorization'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(
questionText:

'What is the term used to describe a hacker who breaks into computer systems for malicious purposes?',

answerOptions: ['White hat', 'Black hat', 'Grey hat', 'Blue hat'],

correctAnswerIndex: 1,

imageUrl: null,

),

Question(

questionText:

'What is the name of the infamous hacker who was responsible for creating the first computer virus?',

answerOptions: [

'Kevin Mitnick',

'Robert Tappan Morris',

'Vladimir Levin',

'David L. Smith'

],

correctAnswerIndex: 1,

imageUrl: null,

),

Question(

questionText:

'What is the name of the encryption method that is commonly used to protect online transactions and communications?',

answerOptions: ['RSA', 'MD5', 'SHA-1', 'AES'],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText:

'What is the name of the largest darknet market that was shut down by law enforcement in 2017?',

answerOptions: ['Silk Road', 'AlphaBay', 'Dream Market', 'Hansa Market'],

correctAnswerIndex: 1,

imageUrl: null,

),

Question(

questionText:

'What is the name of the group of hackers who were responsible for the 2016 US election interference?',

answerOptions: ['LulzSec', 'Anonymous', 'Fancy Bear', 'APT28'],

correctAnswerIndex: 2,

imageUrl: null,

),

Question(

questionText:
'What is the name of the hacker who was responsible for the Target data breach in 2013?',

answerOptions: [

'Gary McKinnon',

'Jonathan James',

'Albert Gonzalez',

'Max Ray Butler'

],

correctAnswerIndex: 2,

imageUrl: null,

),

Question(

questionText:

'What is the term used to describe a type of malware that is disguised as legitimate software?',

answerOptions: ['Adware', 'Spyware', 'Trojan', 'Worm'],

correctAnswerIndex: 2,

imageUrl: null,

),

Question(

questionText:

'What is the name of the hacking tool that was developed by the NSA and leaked by the Shadow Brokers group?',

answerOptions: ['EternalBlue', 'Stuxnet', 'Zeus', 'Mirai'],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText:

'What is the name of the hacker who is known for breaking into the computer systems of several US government agencies
in the 1990s?',

answerOptions: [

'Adrian Lamo',

'Kevin Poulsen',

'Robert Hansen',

'Kevin Mitnick'

],

correctAnswerIndex: 3,

imageUrl: null,

),

Question(

questionText:

'What is the name of the group of hackers who were responsible for the 2014 Sony Pictures hack?',

answerOptions: [

'Guardians of Peace',
'Lizard Squad',

'The Shadow Brokers',

'Chaos Computer Club'

],

correctAnswerIndex: 0,

imageUrl: null,

),

Question(

questionText:

'What is the term used to describe a type of attack that involves overwhelming a computer system with traffic in order to
make it unavailable?',

answerOptions: [

'Phishing',

'DDoS',

'Man-in-the-middle',

'Buffer overflow'

],

correctAnswerIndex: 1,

imageUrl: null,

),

];

You might also like