Cyber attack
Computer security
Cryptography
Digital hacking
National Association of Software and Serving Computer
National Association of Software and Server Computer
National Association of Software and Service Companies
None of these
A physical barrier used to prevent unauthorized access to a computer network
A software program or hardware device that monitors and controls incoming and outgoing network traffic
A type of malware
A social media platform
Machine learning
Robotics
Nanotechnology
Natural language processing
Packet Filter
Application Gateways
Proxy Server
Fire Proxy Service
Man made
Naturally occur
Machine made
All of the above
Arduino
Tablet
Table
Laptop
A type of video game
An artificial intelligence technology
A computer-generated simulation of a three-dimensional environment
A physical reality experience
Java
Python
C++
Visual Basic for Applications (VBA)
Denial of Service (DoS) Attacks
Access Violations
Both a and b
Write it in another language
Keep the message in attachment
Encrypt the message
Send as a blind copy
Firewall
Antivirus software
Encryption
Intrusion detection system (IDS)
Something that sounds too good to be true
An email that contains plenty of grammar mistakes
An email sent to a bunch of random people
All of These
A type of computer hardware
A type of computer virus
A security protocol
A programming language
Creative writing
Complex decision-making
Data entry from spreadsheets to databases
Physical labor in a factory
अनà¥à¤®à¤¾à¤ªà¤•ता
Data security and privacy
Limited storage capacity
Data quality and integrity
Searching.
Heuristics.
Pattern recognition.
Parallel processing.
Phishing
Picture
File
Video
All the above
POST
DELETE
TRACE
GET
Attacks on confidentiality
Attacks on integrity
Attacks on property
is not easily available
for computer-to-computer exchange of business documents in a structured format.
is not popular
defines only a transmission protocol
Match the types of computer viruses with their behaviors.
1 → C, 2 → B, 3 → A, 4 → D
1 → D, 2 → A, 3 → B, 4 → C
1 → E, 2 → B, 3 → A, 4 → F
1 → C, 2 → A, 3 → D, 4 → B
Trojans
Virus
Spyware
All of these
Playing a game on Computer.
Making a machine Intelligent.
Programming on Machine with your Own Intelligence.
Putting your intelligence in Machine
Mining
Trading
Investing
Storing
Analyzing data with a small number of variables
Analyzing data that exceeds the processing capacity of traditional database systems
Analyzing data stored in physical files
Analyzing data using handwritten calculations
Virtual Machine
Neural Networks
Virtual Reality
Blockchain
Send fake mails
Send Spam
Hack Email
Performance
Reliability
Security
None of the above
Virtual Personal Network
Virtual Private Network
Variable Public Network
Virtual Protocol Network
Giga byte
Mega byte
Meta byte
Kilo byte
Match Cybersecurity Measures with Their Purpose in Digital Finance
A-1, B-3, C-2, D-4
A-4, B-3, C-1, D-2
A-3, B-1, C-2, D-4
A-4, B-3, C-2, D-1
To collect as much data as possible
To analyze data quickly without considering accuracy
To derive meaningful insights and make data-driven decisions
To ignore data variety and focus only on volume
Learning
Training
Designing
Puzzling
Socket
Pipe
Port
Machine
Bitcoin
Ethereum
Ripple
The process of encoding plaintext into ciphertext
The process of decoding ciphertext into plaintext
The process of analyzing weather data
The process of generating random numbers
System as a Service
Software as a Solution
Software as a Service
Solution as a System
Soft computing
Distributed computing
Hybrid computing
Cloud computing
Amazon Web Services
Oracle Cloud
Google Cloud
Digilocker
Taste
Smell
Hearing
Touch
Entertainment
Training and simulation
Social networking
Financial analysis
Symmetric cryptography
Asymmetric cryptography
Hash cryptography
Quantum cryptography
Hackers
Spam
Worm
Hard Disk
Pen Drive
Google Drive
RAM
Software as a Server
Server as a Service
Server as a Software
Fraudulently acquiring sensitive information.
An encryption technique
An anti-spam technique
A password building technique
Polymorphism
Virtualization
Abstraction
None of the mentioned