viruses
spyware
worm
adware
Antivirus
Firewall
Compiler
Browser
To replace human analysts with automated systems
To generate random data samples
To identify meaningful patterns and insights in large datasets
To ignore data variety and focus only on volume
To encrypt data
To decrypt data
To provide proof of identity and authenticity
To analyze weather data
Man made
Naturally occur
Machine made
All of the above
Hard Disk
Pen Drive
Google Drive
RAM
अनà¥à¤®à¤¾à¤ªà¤•ता
Data security and privacy
Limited storage capacity
Data quality and integrity
Hadoop
Intranet
Web Applications
All of the mentioned
Spell check it
Review it
Verify and validate it
Organise and simplify it
phishing
MiTm (Man-in-the-Middle)
Reply attack
All of the Above
Volume
Velocity
Variety
Validity
National Association of Software and Serving Computer
National Association of Software and Server Computer
National Association of Software and Service Companies
None of these
Google
Microsoft
OpenAI
Amazon
Tangible property
Intangible property
The name of a particular good or service
Ideas contained in varied forms of expression
Mining
Trading
Investing
Storing
is not easily available
for computer-to-computer exchange of business documents in a structured format.
is not popular
defines only a transmission protocol
System as a Service
Software as a Solution
Software as a Service
Solution as a System
computer-assisted design.
computer application design.
computer application and design.
computer-aided design.
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Function as a Service (FaaS)
Polymorphism
Virtualization
Abstraction
None of the mentioned
Downloading illegal software
Accessing hardware on a shared network
Stealing a network’s password
All are treated as Cyber Crime
Socket
Pipe
Port
Machine
Anti virus
Cookies
Cyber safety
A type of computer hardware
A type of computer virus
A security protocol
A programming language
Amazon Web Services
Oracle Cloud
Google Cloud
Digilocker
Searching.
Heuristics.
Pattern recognition.
Parallel processing.
Ladger
Wallet
Hash
Praman authority
Java
Python
C++
Visual Basic for Applications (VBA)
Hardware
Software
Both Hardware and Software
None of These
Hardware Failure
Privacy Invasion
Fraudulent Manipulation of Data
Two-Factor Authentication (2FA)
Digital Signature
CAPTCHA
VPN
Spam
Malware
Adware
Fisher Ada
Alan Turing
John McCarthy
Allen Newell
Virtual Machine
Neural Networks
Virtual Reality
Blockchain
Match Cybersecurity Measures with Their Purpose in Digital Finance
A-1, B-3, C-2, D-4
A-4, B-3, C-1, D-2
A-3, B-1, C-2, D-4
A-4, B-3, C-2, D-1
A type of video game
An artificial intelligence technology
A computer-generated simulation of a three-dimensional environment
A physical reality experience
Performance
Reliability
Security
None of the above
Storing data on physical servers
Accessing software programs on local computers
Providing computing resources over the internet on-demand
Using floppy disks for data storage
Write it in another language
Keep the message in attachment
Encrypt the message
Send as a blind copy
System access control
System design
Data access control
None of above
The process of encoding plaintext into ciphertext
The process of decoding ciphertext into plaintext
The process of analyzing weather data
The process of generating random numbers
To reduce the size of the dataset
o increase data complexity
To clean, transform, and prepare data for analysis
To randomly sample the dataset
Packet Filter
Application Gateways
Proxy Server
Fire Proxy Service
Match the cybersecurity threats with their descriptions.
1 → A, 2 → D, 3 → B, 4 → C
1 → B, 2 → A, 3 → C, 4 → D
1 → C, 2 → A, 3 → D, 4 → B
1 → E, 2 → F, 3 → B, 4 → A
Phishing
Ransomware
Bitcoin
Ethereum
Ripple
Trojans
Virus
Spyware
All of these
Steve Jobs
Bill Gates
John Mashey
John Bredi
Ignorance
Trojan horses
Crackers