Security
Performance
Storage
All of above
Increased upfront costs
Limited scalability
Reduced IT infrastructure and management costs
Decreased accessibility
Confidentiality
Integrity
Availability
Hacking
Picture
File
Video
All the above
Cyber attack
Computer security
Cryptography
Digital hacking
Man made
Naturally occur
Machine made
All of the above
Steve Jobs
Bill Gates
John Mashey
John Bredi
2012
2005
2008
2010
Fisher Ada
Alan Turing
John McCarthy
Allen Newell
One Time Password
Once and twice password
On time Password
None of the above
Password
Keycard
Retina
Fingerprint
Taste
Smell
Hearing
Touch
A type of computer hardware
A type of computer virus
A security protocol
A programming language
Match the cybersecurity threats with their descriptions.
1 → A, 2 → D, 3 → B, 4 → C
1 → B, 2 → A, 3 → C, 4 → D
1 → C, 2 → A, 3 → D, 4 → B
1 → E, 2 → F, 3 → B, 4 → A
computer-assisted design.
computer application design.
computer application and design.
computer-aided design.
Web Service
Softwares
All of the mentioned
Internet
A type of physical robot used in manufacturing
A software technology that automates repetitive and rule-based tasks
A manual process for data entry
A type of virtual reality simulation
Ladger
Wallet
Hash
Praman authority
Centralization
Transparency
Closed network
Single point of failure
Firewall
Antivirus software
Encryption
Intrusion detection system (IDS)
viruses
spyware
worm
adware
Bullying
Stalking
Identity theft
Phishing
Creative writing
Complex decision-making
Data entry from spreadsheets to databases
Physical labor in a factory
A type of video game
An artificial intelligence technology
A computer-generated simulation of a three-dimensional environment
A physical reality experience
Match the cryptographic terms with their descriptions.
1 → B, 2 → C, 3 → D, 4 → A
1 → D, 2 → B, 3 → C, 4 → A
1 → C, 2 → A, 3 → B, 4 → D
.c
.py
.exe
.jar
Security patches
Refresh patches
Security breath fixes
Mining
Trading
Investing
Storing
Tangible property
Intangible property
The name of a particular good or service
Ideas contained in varied forms of expression
Write it in another language
Keep the message in attachment
Encrypt the message
Send as a blind copy
Giga byte
Mega byte
Meta byte
Kilo byte
To encrypt data
To decrypt data
To provide proof of identity and authenticity
To analyze weather data
Google Drive
Dropbox
OneDrive
USB Flash Drive
Malicious Intent
Sabotage
Accident Errors
Espionage Agents
Malware
Spyware
Adware
None of these
4,3
3,4
2,4
3,2
Arduino
Tablet
Table
Laptop
System access control
System design
Data access control
None of above
Match Cybersecurity Measures with Their Purpose in Digital Finance
A-1, B-3, C-2, D-4
A-4, B-3, C-1, D-2
A-3, B-4, C-2, D-1
A-4, B-3, C-2, D-1
Virus
Security threat
Worm
A digital currency
A distributed ledger technology
An operating system
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Function as a Service (FaaS)
Java
Python
C++
Visual Basic for Applications (VBA)
Send fake mails
Send Spam
Hack Email
Searching.
Heuristics.
Pattern recognition.
Parallel processing.
Spell check it
Review it
Verify and validate it
Organise and simplify it
Secret–encryption
Private encryption
Symmetric encryption
Asymmetric encryption
Anti virus
Cookies
Cyber safety
Match the following security features with their functionalities.
A-2, B-1, C-4, D-3
A-3, B-4, C-1, D-2
A-1, B-2, C-3, D-4
Machine learning
Robotics
Nanotechnology
Natural language processing