International mobile equipment identify
Internet mobile equipment identify
International mobile equipment identity
None of these
Software
Sensors, Actuator
WIFI Technique
All of the Above
Register
Encoder
Decoder
Flip Flop
Ignorance
Trojan horses
Adware
Crackers
Centralization
Transparency
Closed network
Single point of failure
Software as a Server
Server as a Service
Software as a Service
Server as a Software
Entertainment
Training and simulation
Social networking
Financial analysis
Phishing
Ransomware
Firewall
Malware
Two-Factor Authentication (2FA)
Digital Signature
CAPTCHA
VPN
A type of computer hardware
A type of computer virus
A security protocol
A programming language
Ladger
Wallet
Hash
Praman authority
Match the following security features with their functionalities.
A-2, B-1, C-4, D-3
A-3, B-4, C-1, D-2
A-4, B-3, C-2, D-1
A-1, B-2, C-3, D-4
Security patches
Refresh patches
Security breath fixes
All of the above
Soft computing
Distributed computing
Hybrid computing
Cloud computing
Spell check it
Review it
Verify and validate it
Organise and simplify it
Learning
Training
Designing
Puzzling
A digital currency
A distributed ledger technology
An operating system
Man made
Naturally occur
Machine made
Security
Performance
Storage
All of above
viruses
spyware
worm
adware
computer-assisted design.
computer application design.
computer application and design.
computer-aided design.
Reliability
Longevity
To replace human analysts with automated systems
To generate random data samples
To identify meaningful patterns and insights in large datasets
To ignore data variety and focus only on volume
Hadoop
Intranet
Web Applications
All of the mentioned
Spam
Virus
Spyware
To reduce the size of the dataset
o increase data complexity
To clean, transform, and prepare data for analysis
To randomly sample the dataset
POST
DELETE
TRACE
GET
Match the cybersecurity threats with their descriptions.
1 → A, 2 → D, 3 → B, 4 → C
1 → B, 2 → A, 3 → C, 4 → D
1 → C, 2 → A, 3 → D, 4 → B
1 → E, 2 → F, 3 → B, 4 → A
To encrypt data
To decrypt data
To provide proof of identity and authenticity
To analyze weather data
Match the types of computer viruses with their behaviors.
1 → C, 2 → B, 3 → A, 4 → D
1 → D, 2 → A, 3 → B, 4 → C
1 → E, 2 → B, 3 → A, 4 → F
Machine learning
Robotics
Nanotechnology
Natural language processing
Hardware
Both Hardware and Software
None of These
Amazon Web Services
Oracle Cloud
Google Cloud
Digilocker
Storing data on physical servers
Accessing software programs on local computers
Providing computing resources over the internet on-demand
Using floppy disks for data storage
Antivirus software
Encryption
Intrusion detection system (IDS)
Bullying
Stalking
Identity theft
Password
Keycard
Retina
Fingerprint
A physical barrier used to prevent unauthorized access to a computer network
A software program or hardware device that monitors and controls incoming and outgoing network traffic
A type of malware
A social media platform
Volume
Velocity
Variety
Validity
Analyzing data with a small number of variables
Analyzing data that exceeds the processing capacity of traditional database systems
Analyzing data stored in physical files
Analyzing data using handwritten calculations
It keeps our data safe
Converts data to secret code
It is used in email, debit card, credit card
Match the cryptographic terms with their descriptions.
1 → B, 2 → C, 3 → D, 4 → A
1 → D, 2 → B, 3 → C, 4 → A
1 → C, 2 → A, 3 → B, 4 → D
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Function as a Service (FaaS)
Taste
Smell
Hearing
Touch
Secret–encryption
Private encryption
Symmetric encryption
Asymmetric encryption
अनà¥à¤®à¤¾à¤ªà¤•à¤¤à¤¾
Data security and privacy
Limited storage capacity
Data quality and integrity
To store data
To prevent unauthorized access
To accelerate internet speed
To diagnose network issues
Polymorphism
Virtualization
Abstraction
None of the mentioned
Information Iot
Industrial Iot
Intelligent Iot
Innovative Iot