Security
Reliability
Performance
None of these
Platform as a Server
Product as a Service
Platform as a Service
Program as a Service
Virus
Bacteria
Tram
Spam
Public Cloud
Private Cloud
Hybrid Cloud
All of the above
SIM
GPS
Both A andB
None
A type of computer hardware
A type of computer virus
A security protocol
A programming language
Playing a game on Computer.
Making a machine Intelligent.
Programming on Machine with your Own Intelligence.
Putting your intelligence in Machine
Google
Microsoft
OpenAI
Amazon
phishing
MiTm (Man-in-the-Middle)
Reply attack
All of the Above
Software
Sensors, Actuator
WIFI Technique
Malware
Spyware
Adware
Analyzing data with a small number of variables
Analyzing data that exceeds the processing capacity of traditional database systems
Analyzing data stored in physical files
Analyzing data using handwritten calculations
A type of physical robot used in manufacturing
A software technology that automates repetitive and rule-based tasks
A manual process for data entry
A type of virtual reality simulation
Spell check it
Review it
Verify and validate it
Organise and simplify it
Giga byte
Mega byte
Meta byte
Kilo byte
Amazon Web Services
Oracle Cloud
Google Cloud
Digilocker
Malicious Intent
Sabotage
Accident Errors
Espionage Agents
International mobile equipment identify
Internet mobile equipment identify
International mobile equipment identity
Google Drive
Dropbox
OneDrive
USB Flash Drive
Match the following security features with their functionalities.
A-2, B-1, C-4, D-3
A-3, B-4, C-1, D-2
A-4, B-3, C-2, D-1
A-1, B-2, C-3, D-4
Centralization
Transparency
Closed network
Single point of failure
Norton
K7
Quick heal
All of these
Match the Cybersecurity Terms with Their Descriptions
1 → D, 2 → C, 3 → E, 4 → F
1 → A, 2 → B, 3 → D, 4 → E
1 → F, 2 → E, 3 → A, 4 → B
1 → B, 2 → D, 3 → F, 4 → C
Socket
Pipe
Port
Machine
Something that sounds too good to be true
An email that contains plenty of grammar mistakes
An email sent to a bunch of random people
All of These
National Association of Software and Serving Computer
National Association of Software and Server Computer
National Association of Software and Service Companies
Soft computing
Distributed computing
Hybrid computing
Cloud computing
Ladger
Wallet
Hash
Praman authority
Fisher Ada
Alan Turing
John McCarthy
Allen Newell
Storage
All of above
Machine learning
Robotics
Nanotechnology
Natural language processing
Anti virus
Cookies
Firewall
Cyber safety
Increased upfront costs
Limited scalability
Reduced IT infrastructure and management costs
Decreased accessibility
Microsoft Azure
VMware vCloud Air
OpenStack
Amazon Web Services (AWS)
Downloading illegal software
Accessing hardware on a shared network
Stealing a network’s password
All are treated as Cyber Crime
Hardware Failure
Privacy Invasion
Fraudulent Manipulation of Data
Man made
Naturally occur
Machine made
Send fake mails
Send Spam
Hack Email
To store data
To prevent unauthorized access
To accelerate internet speed
To diagnose network issues
Match the types of computer viruses with their behaviors.
1 → C, 2 → B, 3 → A, 4 → D
1 → D, 2 → A, 3 → B, 4 → C
1 → E, 2 → B, 3 → A, 4 → F
1 → C, 2 → A, 3 → D, 4 → B
Virtual Machine
Neural Networks
Virtual Reality
Blockchain
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Function as a Service (FaaS)
Confidentiality
Integrity
Availability
Hacking
Security threat
Worm
None of the above
Match the cryptographic terms with their descriptions.
1 → B, 2 → C, 3 → D, 4 → A
1 → D, 2 → B, 3 → C, 4 → A
1 → C, 2 → A, 3 → B, 4 → D
1 → A, 2 → D, 3 → B, 4 → C
Software as a Server
Server as a Service
Software as a Service
Server as a Software
Match Cybersecurity Measures with Their Purpose in Digital Finance
A-1, B-3, C-2, D-4
A-4, B-3, C-1, D-2
A-3, B-1, C-2, D-4
Polling
Job Scheduling
Protection
File Management
Attacks on confidentiality
Attacks on integrity
Attacks on property
System access control
System design
Data access control
None of above