It keeps our data safe
Converts data to secret code
It is used in email, debit card, credit card
All of the above
Phishing
Ransomware
Firewall
Malware
Security
Reliability
Performance
None of these
POST
DELETE
TRACE
GET
System as a Service
Software as a Solution
Software as a Service
Solution as a System
Hardware
Software
Both Hardware and Software
None of These
Google Drive
Dropbox
OneDrive
USB Flash Drive
A type of computer hardware
A type of computer virus
A security protocol
A programming language
Information Iot
Industrial Iot
Intelligent Iot
Innovative Iot
Microsoft Azure
VMware vCloud Air
OpenStack
Amazon Web Services (AWS)
Longevity
Secret–encryption
Private encryption
Symmetric encryption
Asymmetric encryption
One Time Password
Once and twice password
On time Password
None of the above
Encryption
Antivirus software
Socket
Pipe
Port
Machine
Entertainment
Training and simulation
Social networking
Financial analysis
To store data
To prevent unauthorized access
To accelerate internet speed
To diagnose network issues
Cyber attack
Computer security
Cryptography
Digital hacking
A cybersecurity attack
A social engineering tactic
A security mechanism that requires users to provide two forms of identification to access an account or system
2012
2005
2008
2010
Machine learning
Robotics
Nanotechnology
Natural language processing
SIM
GPS
Both A andB
None
Fraudulently acquiring sensitive information.
An encryption technique
An anti-spam technique
A password building technique
Password
Keycard
Retina
Fingerprint
Match the following security features with their functionalities.
A-2, B-1, C-4, D-3
A-3, B-4, C-1, D-2
A-4, B-3, C-2, D-1
A-1, B-2, C-3, D-4
viruses
spyware
worm
adware
Man made
Naturally occur
Machine made
The study of human behavior
The simulation of human intelligence by machines
The process of genetic engineering
The study of celestial bodies
Storing data on physical servers
Accessing software programs on local computers
Providing computing resources over the internet on-demand
Using floppy disks for data storage
Security patches
Refresh patches
Security breath fixes
To develop machines that can think like humans
To develop algorithms that can improve automatically through experience
To develop machines that can perform physical tasks
To develop faster computer processors
A physical barrier used to prevent unauthorized access to a computer network
A software program or hardware device that monitors and controls incoming and outgoing network traffic
A type of malware
A social media platform
Steve Jobs
Bill Gates
John Mashey
John Bredi
Picture
File
Video
All the above
Learning
Training
Designing
Puzzling
Spam
Cookies
Adware
Intrusion detection system (IDS)
Match the Cybersecurity Terms with Their Descriptions
1 → D, 2 → C, 3 → E, 4 → F
1 → A, 2 → B, 3 → D, 4 → E
1 → F, 2 → E, 3 → A, 4 → B
1 → B, 2 → D, 3 → F, 4 → C
A type of cryptocurrency
A digital signature
A group of transactions
A cryptographic hash function
.c
.py
.exe
.jar
Fisher Ada
Alan Turing
John McCarthy
Allen Newell
Searching.
Heuristics.
Pattern recognition.
Parallel processing.
Two-Factor Authentication (2FA)
Digital Signature
CAPTCHA
VPN
Bitcoin
Ethereum
Ripple
Java
Python
C++
Visual Basic for Applications (VBA)
Virus
Spyware
computer-assisted design.
computer application design.
computer application and design.
computer-aided design.
Antivirus
Hacking
Increased upfront costs
Limited scalability
Reduced IT infrastructure and management costs
Decreased accessibility
Symmetric cryptography
Asymmetric cryptography
Hash cryptography
Quantum cryptography