Reduced costs
Increased student engagement and interactivity
Limited accessibility
Inefficient learning process
To encrypt data
To decrypt data
To provide proof of identity and authenticity
To analyze weather data
Entertainment
Training and simulation
Social networking
Financial analysis
To store data
To prevent unauthorized access
To accelerate internet speed
To diagnose network issues
Match the cybersecurity threats with their descriptions.
1 → A, 2 → D, 3 → B, 4 → C
1 → B, 2 → A, 3 → C, 4 → D
1 → C, 2 → A, 3 → D, 4 → B
1 → E, 2 → F, 3 → B, 4 → A
2012
2005
2008
2010
Malicious Intent
Sabotage
Accident Errors
Espionage Agents
Microsoft Azure
VMware vCloud Air
OpenStack
Amazon Web Services (AWS)
Polling
Job Scheduling
Protection
File Management
Fraudulently acquiring sensitive information.
An encryption technique
An anti-spam technique
A password building technique
Symmetric cryptography
Asymmetric cryptography
Hash cryptography
Quantum cryptography
Machine learning
Robotics
Nanotechnology
Natural language processing
Polymorphism
Virtualization
Abstraction
None of the mentioned
A physical barrier used to prevent unauthorized access to a computer network
A software program or hardware device that monitors and controls incoming and outgoing network traffic
A type of malware
A social media platform
Match the following security features with their functionalities.
A-2, B-1, C-4, D-3
A-3, B-4, C-1, D-2
A-4, B-3, C-2, D-1
A-1, B-2, C-3, D-4
Ignorance
Trojan horses
Adware
Crackers
.c
.py
.exe
.jar
Match Cybersecurity Measures with Their Purpose in Digital Finance
A-1, B-3, C-2, D-4
A-4, B-3, C-1, D-2
A-3, B-4, C-2, D-1
Match the Cybersecurity Terms with Their Descriptions
1 → D, 2 → C, 3 → E, 4 → F
1 → A, 2 → B, 3 → D, 4 → E
1 → F, 2 → E, 3 → A, 4 → B
1 → B, 2 → D, 3 → F, 4 → C
Storing data on physical servers
Accessing software programs on local computers
Providing computing resources over the internet on-demand
Using floppy disks for data storage
Cyber attack
Computer security
Cryptography
Digital hacking
POST
DELETE
TRACE
GET
A type of physical robot used in manufacturing
A software technology that automates repetitive and rule-based tasks
A manual process for data entry
A type of virtual reality simulation
A type of video game
An artificial intelligence technology
A computer-generated simulation of a three-dimensional environment
A physical reality experience
Virus
Security threat
Worm
None of the above
Spam
Cookies
Malware
Google Drive
Dropbox
OneDrive
USB Flash Drive
A type of cryptocurrency
A digital signature
A group of transactions
A cryptographic hash function
Soft computing
Distributed computing
Hybrid computing
Cloud computing
An online scam to steal personal information
A method to speed up internet browsing
A technique for improving network security
A way to encrypt data
Hadoop
Intranet
Web Applications
All of the mentioned
Centralization
Transparency
Closed network
Single point of failure
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Function as a Service (FaaS)
Match the cryptographic terms with their descriptions.
1 → B, 2 → C, 3 → D, 4 → A
1 → D, 2 → B, 3 → C, 4 → A
1 → C, 2 → A, 3 → B, 4 → D
Confidentiality
Integrity
Availability
Hacking
Virtual Personal Network
Virtual Private Network
Variable Public Network
Virtual Protocol Network
Spell check it
Review it
Verify and validate it
Organise and simplify it
To reduce the size of the dataset
o increase data complexity
To clean, transform, and prepare data for analysis
To randomly sample the dataset
Software
Sensors, Actuator
WIFI Technique
All of the Above
Register
Encoder
Decoder
Flip Flop
Man made
Naturally occur
Machine made
All of the above
Secret–encryption
Private encryption
Symmetric encryption
Asymmetric encryption
Giga byte
Mega byte
Meta byte
Kilo byte
Hardware Failure
Privacy Invasion
Fraudulent Manipulation of Data
Send fake mails
Send Spam
Hack Email
Mainframe computers
Traditional relational databases
Cloud computing and distributed computing platforms
Personal computers
Bacteria
Tram
Software as a Server
Server as a Service
Software as a Service
Server as a Software
Hackers
4,3
3,4
2,4
3,2