The study of human behavior
The simulation of human intelligence by machines
The process of genetic engineering
The study of celestial bodies
An online scam to steal personal information
A method to speed up internet browsing
A technique for improving network security
A way to encrypt data
Packet Filter
Application Gateways
Proxy Server
Fire Proxy Service
Password
Keycard
Retina
Fingerprint
Amazon Web Services
Oracle Cloud
Google Cloud
Digilocker
Picture
File
Video
All the above
Write it in another language
Keep the message in attachment
Encrypt the message
Send as a blind copy
A cybersecurity attack
A social engineering tactic
A security mechanism that requires users to provide two forms of identification to access an account or system
A programming language
Tangible property
Intangible property
The name of a particular good or service
Ideas contained in varied forms of expression
Match the types of computer viruses with their behaviors.
1 → C, 2 → B, 3 → A, 4 → D
1 → D, 2 → A, 3 → B, 4 → C
1 → E, 2 → B, 3 → A, 4 → F
1 → C, 2 → A, 3 → D, 4 → B
is not easily available
for computer-to-computer exchange of business documents in a structured format.
is not popular
defines only a transmission protocol
Virus
Bacteria
Tram
Spam
A type of cryptocurrency
A digital signature
A group of transactions
A cryptographic hash function
Microsoft Azure
VMware vCloud Air
OpenStack
Amazon Web Services (AWS)
A type of video game
An artificial intelligence technology
A computer-generated simulation of a three-dimensional environment
A physical reality experience
Volume
Velocity
Variety
Validity
Reduced costs
Increased student engagement and interactivity
Limited accessibility
Inefficient learning process
Learning
Training
Designing
Puzzling
Bullying
Stalking
Identity theft
Phishing
Anti virus
Cookies
Firewall
Cyber safety
Something that sounds too good to be true
An email that contains plenty of grammar mistakes
An email sent to a bunch of random people
All of These
Security patches
Refresh patches
Security breath fixes
All of the above
Information Iot
Industrial Iot
Intelligent Iot
Innovative Iot
Norton
K7
Quick heal
All of these
POST
DELETE
TRACE
GET
Socket
Pipe
Port
Machine
To replace human analysts with automated systems
To generate random data samples
To identify meaningful patterns and insights in large datasets
To ignore data variety and focus only on volume
Trojans
Spyware
Java
Python
C++
Visual Basic for Applications (VBA)
viruses
spyware
worm
adware
Downloading illegal software
Accessing hardware on a shared network
Stealing a network’s password
All are treated as Cyber Crime
Hardware Failure
Privacy Invasion
Fraudulent Manipulation of Data
All of the Above
Entertainment
Training and simulation
Social networking
Financial analysis
Software as a Server
Server as a Service
Software as a Service
Server as a Software
To develop machines that can think like humans
To develop algorithms that can improve automatically through experience
To develop machines that can perform physical tasks
To develop faster computer processors
Hadoop
Intranet
Web Applications
All of the mentioned
Security threat
Worm
None of the above
Performance
Reliability
Security
Longevity
Bitcoin
Ethereum
Ripple
Malware
Adware
Playing a game on Computer.
Making a machine Intelligent.
Programming on Machine with your Own Intelligence.
Putting your intelligence in Machine
Match Cybersecurity Measures with Their Purpose in Digital Finance
A-1, B-3, C-2, D-4
A-4, B-3, C-1, D-2
A-3, B-1, C-2, D-4
A-4, B-3, C-2, D-1
Send fake mails
Send Spam
Hack Email
Spell check it
Review it
Verify and validate it
Organise and simplify it
.c
.py
.exe
.jar
To collect as much data as possible
To analyze data quickly without considering accuracy
To derive meaningful insights and make data-driven decisions
Analyzing data with a small number of variables
Analyzing data that exceeds the processing capacity of traditional database systems
Analyzing data stored in physical files
Analyzing data using handwritten calculations
It keeps our data safe
Converts data to secret code
It is used in email, debit card, credit card
Virtual Machine
Neural Networks
Virtual Reality
Blockchain