Lesson 1.3 Quiz: AI-Driven Threats
Lesson 1.3 Quiz: AI-Driven Threats
5 questions — Answer each question, then check your score below.
(A) Incorrect — password compromise is about account access, not impersonation in a live call.
(C) Incorrect — MFA is about authentication to a system, not to a human in a call.
(D) Incorrect — no software vulnerability is exploited; the attack is purely social engineering.
I. AI can generate spear-phishing emails that include accurate personal details scraped from public social media profiles.
II. AI-driven malware can dynamically alter its own code at runtime to evade signature-based detection.
III. AI-powered attacks always require manual confirmation from the attacker before each individual action is executed.
(A) Incomplete — Statement II is also true.
(C) Incorrect — Statement III is false; AI attacks execute autonomously.
(D) Incorrect — Statement III is false.
(A) Correct — AI can model writing style and replicate it convincingly in spear-phishing.
(B) Correct — adversarial attacks exploit AI model blind spots by crafting specially designed inputs.
(D) Correct — AI-powered scanners dramatically accelerate vulnerability discovery.
(A) Incorrect — worm propagation is about spreading, not signature evasion.
(B) Incorrect — rootkits hide processes but don't dynamically alter their own code to defeat signature updates.
(D) Incorrect — ransomware behavior is about file encryption, not signature polymorphism.
(A) Incorrect — compute requirements are a deployment concern, not the cause of the failure described.
(C) Incorrect — integration challenges are real but not the issue in this scenario.
(D) Incorrect — alert interpretability is a usability issue, not the cause of the detection failure.
Get in Touch
Whether you're a student, parent, or teacher — I'd love to hear from you.
Just want free AP CS resources?
Enter your email below and check the subscribe box — no message needed. Students get daily practice questions and study tips. Teachers get curriculum resources and teaching strategies.
Message Sent!
Thanks for reaching out. I'll get back to you within 24 hours.
tanner@apcsexamprep.com
Courses
AP CSA, CSP, & Cybersecurity
Response Time
Within 24 hours
Prefer email? Reach me directly at tanner@apcsexamprep.com