Home > Articles

This chapter is from the book

Multiple-Choice Questions with Detailed Explanations

1. What differentiates AGI from narrow AI in the context of autonomous cyberattacks?

  1. AGI operates only within specific task domains.

  2. AGI can autonomously adapt, generalize, and execute complex operations.

  3. AGI lacks the ability to identify zero-day vulnerabilities.

  4. AGI is limited to machine learning frameworks such as supervised learning.

Correct Answer: B. AGI is distinguished by its capacity to generalize knowledge and adapt to new tasks autonomously, which allow it to plan and execute sophisticated operations. Unlike narrow AI, which is confined to specific tasks, AGI could potentially identify zero-day vulnerabilities and optimize attack strategies in real time.

2. How might AGI exploit vulnerabilities in IoT networks?

  1. By deactivating all IoT devices simultaneously

  2. By using reinforcement learning to optimize DDoS attacks

  3. By replacing traditional encryption with outdated methods

  4. By avoiding IoT systems altogether

Correct Answer: B. AGI could use reinforcement learning to orchestrate distributed denial-of-service (DDoS) attacks on IoT networks, dynamically adjusting its strategies to maximize disruption. Its ability to process vast amounts of data and autonomously identify weak point makes it particularly effective against interconnected IoT systems.

3. Which of the following is a unique threat posed by AGI?

  1. Exploiting previously known vulnerabilities in outdated software

  2. Generating synthetic identities to undermine trust models

  3. Requiring large datasets for initial training

  4. Limited the ability to manipulate trust in digital ecosystems

Correct Answer: B. AGI can generate synthetic identities with unprecedented precision to undermine digital trust models. Unlike traditional AI systems, AGI does not depend on predefined data for specific tasks but can autonomously learn and adapt, posing a unique challenge to digital ecosystems.

4. Why is AGI particularly threatening to machine learning–based security systems?

  1. AGI cannot exploit adversarial vulnerabilities.

  2. AGI manipulates data using adversarial techniques, bypassing detection.

  3. AGI requires constant human supervision to execute attacks.

  4. AGI lacks the capability to poison datasets.

Correct Answer: B. AGI poses a critical threat to machine learning systems by applying adversarial techniques, such as data poisoning or generating adversarial inputs, to exploit inherent vulnerabilities. This makes detection and mitigation significantly more challenging.

5. What key feature distinguishes BlackMamba malware from traditional malware?

  1. Use of static code and predefined attack strategies

  2. Reliance on human operators for decision making

  3. Dynamic polymorphic code generation using generative models

  4. Limited adaptability to new environments

Correct Answer: C. BlackMamba uses generative AI to produce polymorphic code dynamically, which enables it to bypass signature-based detection systems. Its capacity to autonomously adapt and evolve during execution differentiates it from traditional malware.

6. How does BlackMamba evade detection by intrusion detection systems (IDS)?

  1. By disabling the IDS manually

  2. By generating adversarial inputs to fool machine learning models

  3. By avoiding network traffic altogether

  4. By relying solely on hardware-based attacks

Correct Answer: B. BlackMamba uses adversarial inputs, subtle modifications to data that evade detection by IDS. This capability highlights the vulnerabilities of AI-driven security tools to advanced adversarial techniques.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.