Socket
Pipe
Port
Machine
Anti virus
Cookies
Firewall
Cyber safety
Security patches
Refresh patches
Security breath fixes
All of the above
Something that sounds too good to be true
An email that contains plenty of grammar mistakes
An email sent to a bunch of random people
All of These
Microsoft Azure
VMware vCloud Air
OpenStack
Amazon Web Services (AWS)
Virus
Bacteria
Tram
Spam
Cyber attack
Computer security
Cryptography
Digital hacking
POST
DELETE
TRACE
GET
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Function as a Service (FaaS)
National Association of Software and Serving Computer
National Association of Software and Server Computer
National Association of Software and Service Companies
None of these
Taste
Smell
Hearing
Touch
Match Cybersecurity Measures with Their Purpose in Digital Finance
A-1, B-3, C-2, D-4
A-4, B-3, C-1, D-2
A-3, B-1, C-2, D-4
A-4, B-3, C-2, D-1
Security
Reliability
Performance
is not easily available
for computer-to-computer exchange of business documents in a structured format.
is not popular
defines only a transmission protocol
Software
Sensors, Actuator
WIFI Technique
All of the Above
Password
Keycard
Retina
Fingerprint
The study of human behavior
The simulation of human intelligence by machines
The process of genetic engineering
The study of celestial bodies
Mining
Trading
Investing
Storing
Brute force of passwords
SIM swap attacks
SQL injection
Cross-site scripting
Hardware
Both Hardware and Software
None of These
Man made
Naturally occur
Machine made
Giga byte
Mega byte
Meta byte
Kilo byte
Write it in another language
Keep the message in attachment
Encrypt the message
Send as a blind copy
An online scam to steal personal information
A method to speed up internet browsing
A technique for improving network security
A way to encrypt data
viruses
spyware
worm
adware
Searching.
Heuristics.
Pattern recognition.
Parallel processing.
Information Iot
Industrial Iot
Intelligent Iot
Innovative Iot
Platform as a Server
Product as a Service
Platform as a Service
Program as a Service
Malware
Spyware
Entertainment
Training and simulation
Social networking
Financial analysis
Arduino
Tablet
Table
Laptop
Hardware Failure
Privacy Invasion
Fraudulent Manipulation of Data
Register
Encoder
Decoder
Flip Flop
Web Service
Softwares
All of the mentioned
Internet
Ladger
Wallet
Hash
Praman authority
Volume
Velocity
Variety
Validity
A physical barrier used to prevent unauthorized access to a computer network
A software program or hardware device that monitors and controls incoming and outgoing network traffic
A type of malware
A social media platform
Attacks on confidentiality
Attacks on integrity
Attacks on property
Hadoop
Intranet
Web Applications
2012
2005
2008
2010
Increased upfront costs
Limited scalability
Reduced IT infrastructure and management costs
Decreased accessibility
Match the following security features with their functionalities.
A-2, B-1, C-4, D-3
A-3, B-4, C-1, D-2
A-1, B-2, C-3, D-4
A type of computer hardware
A type of computer virus
A security protocol
A programming language
Antivirus
Hacking
Tangible property
Intangible property
The name of a particular good or service
Ideas contained in varied forms of expression
SIM
GPS
Both A andB
None
To replace human analysts with automated systems
To generate random data samples
To identify meaningful patterns and insights in large datasets
To ignore data variety and focus only on volume
Phishing
Ransomware
Polymorphism
Virtualization
Abstraction
None of the mentioned
Machine learning
Robotics
Nanotechnology
Natural language processing