Professional Documents
Culture Documents
Question
Question
answerOptions: [
'Artificial Intelligence',
'Augmented Intelligence',
'Advanced Intelligence',
'Automated Intelligence'
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
answerOptions: [
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
answerOptions: [
'A subset of AI that focuses on building models that can learn from data',
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
answerOptions: [
'A subset of machine learning that uses neural networks with multiple hidden layers',
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
answerOptions: [
'A type of machine learning where an agent learns to make decisions by interacting with an environment',
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
answerOptions: [
'A type of AI that deals with the interaction between computers and human language',
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
answerOptions: [
'A type of AI that deals with enabling machines to interpret and understand visual information from the world',
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
answerOptions: [
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
answerOptions: [
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
answerOptions: [
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
answerOptions: [
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
questionText: 'What is an HDD?',
answerOptions: [
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
answerOptions: [
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
answerOptions: [
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
answerOptions: [
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
answerOptions: [
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
answerOptions: [
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
questionText:
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
answerOptions: [
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
questionText:
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
questionText:
'What is a common type of cyber attack that involves flooding a network with traffic?',
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
questionText:
'What is the name of the government agency responsible for cybersecurity in the United States?',
correctAnswerIndex: 3,
imageUrl: null,
),
Question(
questionText:
answerOptions: [
'Penetration testing',
'Vulnerability scanning',
'Threat modeling',
'Risk assessment'
],
correctAnswerIndex: 1,
imageUrl: null,
),
Question(
questionText:
'What is the name of the protocol used for secure remote access to a network?',
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
questionText:
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
questionText:
'What is the name of the system used for authenticating users in many web applications?',
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
questionText:
'What is the name of the protocol used for sending email messages?',
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
questionText:
'What is the name of the cryptographic hash function used for storing passwords?',
correctAnswerIndex: 2,
imageUrl: null,
),
Question(
questionText:
answerOptions: [
'Encryption',
'Decryption',
'Authentication',
'Authorization'
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
questionText:
'What is the term used to describe a hacker who breaks into computer systems for malicious purposes?',
correctAnswerIndex: 1,
imageUrl: null,
),
Question(
questionText:
'What is the name of the infamous hacker who was responsible for creating the first computer virus?',
answerOptions: [
'Kevin Mitnick',
'Vladimir Levin',
'David L. Smith'
],
correctAnswerIndex: 1,
imageUrl: null,
),
Question(
questionText:
'What is the name of the encryption method that is commonly used to protect online transactions and communications?',
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
questionText:
'What is the name of the largest darknet market that was shut down by law enforcement in 2017?',
correctAnswerIndex: 1,
imageUrl: null,
),
Question(
questionText:
'What is the name of the group of hackers who were responsible for the 2016 US election interference?',
correctAnswerIndex: 2,
imageUrl: null,
),
Question(
questionText:
'What is the name of the hacker who was responsible for the Target data breach in 2013?',
answerOptions: [
'Gary McKinnon',
'Jonathan James',
'Albert Gonzalez',
],
correctAnswerIndex: 2,
imageUrl: null,
),
Question(
questionText:
'What is the term used to describe a type of malware that is disguised as legitimate software?',
correctAnswerIndex: 2,
imageUrl: null,
),
Question(
questionText:
'What is the name of the hacking tool that was developed by the NSA and leaked by the Shadow Brokers group?',
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
questionText:
'What is the name of the hacker who is known for breaking into the computer systems of several US government agencies
in the 1990s?',
answerOptions: [
'Adrian Lamo',
'Kevin Poulsen',
'Robert Hansen',
'Kevin Mitnick'
],
correctAnswerIndex: 3,
imageUrl: null,
),
Question(
questionText:
'What is the name of the group of hackers who were responsible for the 2014 Sony Pictures hack?',
answerOptions: [
'Guardians of Peace',
'Lizard Squad',
],
correctAnswerIndex: 0,
imageUrl: null,
),
Question(
questionText:
'What is the term used to describe a type of attack that involves overwhelming a computer system with traffic in order to
make it unavailable?',
answerOptions: [
'Phishing',
'DDoS',
'Man-in-the-middle',
'Buffer overflow'
],
correctAnswerIndex: 1,
imageUrl: null,
),
];