Google Drive
Dropbox
OneDrive
USB Flash Drive
Ignorance
Trojan horses
Adware
Crackers
A type of computer hardware
A type of computer virus
A security protocol
A programming language
Bitcoin
Ethereum
Ripple
An online scam to steal personal information
A method to speed up internet browsing
A technique for improving network security
A way to encrypt data
Match the following security features with their functionalities.
A-2, B-1, C-4, D-3
A-3, B-4, C-1, D-2
A-4, B-3, C-2, D-1
A-1, B-2, C-3, D-4
Virtual vertigo
Simulator sickness
Reality nausea
Cyber dizziness
Something that sounds too good to be true
An email that contains plenty of grammar mistakes
An email sent to a bunch of random people
All of These
is not easily available
for computer-to-computer exchange of business documents in a structured format.
is not popular
defines only a transmission protocol
Hardware Failure
Privacy Invasion
Fraudulent Manipulation of Data
All of the Above
Volume
Velocity
Variety
Validity
Two-Factor Authentication (2FA)
Digital Signature
CAPTCHA
VPN
Brute force of passwords
SIM swap attacks
SQL injection
Cross-site scripting
It keeps our data safe
Converts data to secret code
It is used in email, debit card, credit card
All of the above
Virus
Bacteria
Tram
Spam
Arduino
Tablet
Table
Laptop
Platform as a Server
Product as a Service
Platform as a Service
Program as a Service
Bullying
Stalking
Identity theft
Phishing
Mainframe computers
Traditional relational databases
Cloud computing and distributed computing platforms
Personal computers
Playing a game on Computer.
Making a machine Intelligent.
Programming on Machine with your Own Intelligence.
Putting your intelligence in Machine
viruses
spyware
worm
adware
Secret–encryption
Private encryption
Symmetric encryption
Asymmetric encryption
A cybersecurity attack
A social engineering tactic
A security mechanism that requires users to provide two forms of identification to access an account or system
A physical barrier used to prevent unauthorized access to a computer network
A software program or hardware device that monitors and controls incoming and outgoing network traffic
A type of malware
A social media platform
Microsoft Azure
VMware vCloud Air
OpenStack
Amazon Web Services (AWS)
Searching.
Heuristics.
Pattern recognition.
Parallel processing.
A type of physical robot used in manufacturing
A software technology that automates repetitive and rule-based tasks
A manual process for data entry
A type of virtual reality simulation
Picture
File
Video
All the above
Firewall
Antivirus software
Encryption
Intrusion detection system (IDS)
Trojans
Spyware
All of these
Security
Performance
Storage
All of above
Java
Python
C++
Visual Basic for Applications (VBA)
The process of encoding plaintext into ciphertext
The process of decoding ciphertext into plaintext
The process of analyzing weather data
The process of generating random numbers
Reliability
None of these
Symmetric cryptography
Asymmetric cryptography
Hash cryptography
Quantum cryptography
Software
Sensors, Actuator
WIFI Technique
Socket
Pipe
Port
Machine
Malware
Send fake mails
Send Spam
Hack Email
To replace human analysts with automated systems
To generate random data samples
To identify meaningful patterns and insights in large datasets
To ignore data variety and focus only on volume
Hackers
Worm
A digital currency
A distributed ledger technology
An operating system
Public Cloud
Private Cloud
Hybrid Cloud
अनà¥à¤®à¤¾à¤ªà¤•ता
Data security and privacy
Limited storage capacity
Data quality and integrity
Increased upfront costs
Limited scalability
Reduced IT infrastructure and management costs
Decreased accessibility
Steve Jobs
Bill Gates
John Mashey
John Bredi
Cookies
Information Iot
Industrial Iot
Intelligent Iot
Innovative Iot
Password
Keycard
Retina
Fingerprint