Entertainment
Training and simulation
Social networking
Financial analysis
.c
.py
.exe
.jar
Norton
K7
Quick heal
All of these
Polling
Job Scheduling
Protection
File Management
Match Cybersecurity Measures with Their Purpose in Digital Finance
A-1, B-3, C-2, D-4
A-4, B-3, C-1, D-2
A-3, B-1, C-2, D-4
A-4, B-3, C-2, D-1
Bullying
Stalking
Identity theft
Phishing
National Association of Software and Serving Computer
National Association of Software and Server Computer
National Association of Software and Service Companies
None of these
Performance
Reliability
Security
Longevity
Something that sounds too good to be true
An email that contains plenty of grammar mistakes
An email sent to a bunch of random people
All of These
Spam
Cookies
Malware
Adware
Trojans
Virus
Spyware
None of the above
POST
DELETE
TRACE
GET
A physical barrier used to prevent unauthorized access to a computer network
A software program or hardware device that monitors and controls incoming and outgoing network traffic
A type of malware
A social media platform
Steve Jobs
Bill Gates
John Mashey
John Bredi
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Function as a Service (FaaS)
Two-Factor Authentication (2FA)
Digital Signature
CAPTCHA
VPN
Firewall
Encryption
Antivirus software
Bitcoin
Ethereum
Ripple
Brute force of passwords
SIM swap attacks
SQL injection
Cross-site scripting
Volume
Velocity
Variety
Validity
Virtual Personal Network
Virtual Private Network
Variable Public Network
Virtual Protocol Network
Fisher Ada
Alan Turing
John McCarthy
Allen Newell
Taste
Smell
Hearing
Touch
Virtual Machine
Neural Networks
Virtual Reality
Blockchain
To develop machines that can think like humans
To develop algorithms that can improve automatically through experience
To develop machines that can perform physical tasks
To develop faster computer processors
To encrypt data
To decrypt data
To provide proof of identity and authenticity
To analyze weather data
To collect as much data as possible
To analyze data quickly without considering accuracy
To derive meaningful insights and make data-driven decisions
To ignore data variety and focus only on volume
Register
Encoder
Decoder
Flip Flop
Storage
All of above
is not easily available
for computer-to-computer exchange of business documents in a structured format.
is not popular
defines only a transmission protocol
Write it in another language
Keep the message in attachment
Encrypt the message
Send as a blind copy
A type of cryptocurrency
A digital signature
A group of transactions
A cryptographic hash function
Google Drive
Dropbox
OneDrive
USB Flash Drive
The process of encoding plaintext into ciphertext
The process of decoding ciphertext into plaintext
The process of analyzing weather data
The process of generating random numbers
Cyber attack
Computer security
Cryptography
Digital hacking
A cybersecurity attack
A social engineering tactic
A security mechanism that requires users to provide two forms of identification to access an account or system
A programming language
Hadoop
Intranet
Web Applications
All of the mentioned
System access control
System design
Data access control
None of above
Security threat
Worm
A type of video game
An artificial intelligence technology
A computer-generated simulation of a three-dimensional environment
A physical reality experience
Microsoft Azure
VMware vCloud Air
OpenStack
Amazon Web Services (AWS)
Reduced costs
Increased student engagement and interactivity
Limited accessibility
Inefficient learning process
Spell check it
Review it
Verify and validate it
Organise and simplify it
Picture
File
Video
All the above
2012
2005
2008
2010
Antivirus
Hacking
Intrusion detection system (IDS)
Anti virus
Cyber safety