Packet Filter
Application Gateways
Proxy Server
Fire Proxy Service
To replace human analysts with automated systems
To generate random data samples
To identify meaningful patterns and insights in large datasets
To ignore data variety and focus only on volume
Virtual Machine
Neural Networks
Virtual Reality
Blockchain
Confidentiality
Integrity
Availability
Hacking
Software
Sensors, Actuator
WIFI Technique
All of the Above
Send fake mails
Send Spam
Hack Email
All of the above
Socket
Pipe
Port
Machine
अनà¥à¤®à¤¾à¤ªà¤•ता
Data security and privacy
Limited storage capacity
Data quality and integrity
Virus
Antivirus
Malware
A type of video game
An artificial intelligence technology
A computer-generated simulation of a three-dimensional environment
A physical reality experience
National Association of Software and Serving Computer
National Association of Software and Server Computer
National Association of Software and Service Companies
None of these
Symmetric cryptography
Asymmetric cryptography
Hash cryptography
Quantum cryptography
Mainframe computers
Traditional relational databases
Cloud computing and distributed computing platforms
Personal computers
Write it in another language
Keep the message in attachment
Encrypt the message
Send as a blind copy
Google Drive
Dropbox
OneDrive
USB Flash Drive
Anti virus
Cookies
Firewall
Cyber safety
Platform as a Server
Product as a Service
Platform as a Service
Program as a Service
To develop machines that can think like humans
To develop algorithms that can improve automatically through experience
To develop machines that can perform physical tasks
To develop faster computer processors
A cybersecurity attack
A social engineering tactic
A security mechanism that requires users to provide two forms of identification to access an account or system
A programming language
Fisher Ada
Alan Turing
John McCarthy
Allen Newell
Public Cloud
Private Cloud
Hybrid Cloud
2012
2005
2008
2010
Searching.
Heuristics.
Pattern recognition.
Parallel processing.
Hackers
Spam
Worm
Match Cybersecurity Measures with Their Purpose in Digital Finance
A-1, B-3, C-2, D-4
A-4, B-3, C-1, D-2
A-3, B-1, C-2, D-4
A-4, B-3, C-2, D-1
Security
Performance
Storage
All of above
System access control
System design
Data access control
None of above
Hardware Failure
Privacy Invasion
Fraudulent Manipulation of Data
Antivirus software
Encryption
Intrusion detection system (IDS)
Tangible property
Intangible property
The name of a particular good or service
Ideas contained in varied forms of expression
Increased upfront costs
Limited scalability
Reduced IT infrastructure and management costs
Decreased accessibility
Reduced costs
Increased student engagement and interactivity
Limited accessibility
Inefficient learning process
Analyzing data with a small number of variables
Analyzing data that exceeds the processing capacity of traditional database systems
Analyzing data stored in physical files
Analyzing data using handwritten calculations
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Function as a Service (FaaS)
Hadoop
Intranet
Web Applications
All of the mentioned
Entertainment
Training and simulation
Social networking
Financial analysis
Virtual Personal Network
Virtual Private Network
Variable Public Network
Virtual Protocol Network
A type of cryptocurrency
A digital signature
A group of transactions
A cryptographic hash function
Match the types of computer viruses with their behaviors.
1 → C, 2 → B, 3 → A, 4 → D
1 → D, 2 → A, 3 → B, 4 → C
1 → E, 2 → B, 3 → A, 4 → F
1 → C, 2 → A, 3 → D, 4 → B
System as a Service
Software as a Solution
Software as a Service
Solution as a System
Giga byte
Mega byte
Meta byte
Kilo byte
Register
Encoder
Decoder
Flip Flop
To collect as much data as possible
To analyze data quickly without considering accuracy
To derive meaningful insights and make data-driven decisions
To encrypt data
To decrypt data
To provide proof of identity and authenticity
To analyze weather data
Ignorance
Trojan horses
Adware
Crackers
SIM
GPS
Both A andB
None
Fraudulently acquiring sensitive information.
An encryption technique
An anti-spam technique
A password building technique
Ladger
Wallet
Hash
Praman authority
A type of computer hardware
A digital currency
A distributed ledger technology
An operating system