Increased upfront costs
Limited scalability
Reduced IT infrastructure and management costs
Decreased accessibility
Machine learning
Robotics
Nanotechnology
Natural language processing
Packet Filter
Application Gateways
Proxy Server
Fire Proxy Service
.c
.py
.exe
.jar
Confidentiality
Integrity
Availability
Hacking
Volume
Velocity
Variety
Validity
Performance
Reliability
Security
Longevity
Something that sounds too good to be true
An email that contains plenty of grammar mistakes
An email sent to a bunch of random people
All of These
Virtual Machine
Neural Networks
Virtual Reality
Blockchain
Steve Jobs
Bill Gates
John Mashey
John Bredi
POST
DELETE
TRACE
GET
Virtual vertigo
Simulator sickness
Reality nausea
Cyber dizziness
Machine Language
Machine Learning
Main Logic
Memory Link
Send fake mails
Send Spam
Hack Email
All of the above
Java
Python
C++
Visual Basic for Applications (VBA)
Secret–encryption
Private encryption
Symmetric encryption
Asymmetric encryption
To develop machines that can think like humans
To develop algorithms that can improve automatically through experience
To develop machines that can perform physical tasks
To develop faster computer processors
AI
Cloud
Big Data
SIM
GPS
Both A andB
None
Match the cybersecurity threats with their descriptions.
1 → A, 2 → D, 3 → B, 4 → C
1 → B, 2 → A, 3 → C, 4 → D
1 → C, 2 → A, 3 → D, 4 → B
1 → E, 2 → F, 3 → B, 4 → A
Ignorance
Trojan horses
Adware
Crackers
Reduced costs
Increased student engagement and interactivity
Limited accessibility
Inefficient learning process
Public Cloud
Private Cloud
Hybrid Cloud
Trojans
Virus
Spyware
All of these
Microsoft Azure
VMware vCloud Air
OpenStack
Amazon Web Services (AWS)
A type of cryptocurrency
A digital signature
A group of transactions
A cryptographic hash function
Mining
Trading
Investing
Storing
An online scam to steal personal information
A method to speed up internet browsing
A technique for improving network security
A way to encrypt data
Hadoop
Intranet
Web Applications
All of the mentioned
Bacteria
Tram
Spam
is not easily available
for computer-to-computer exchange of business documents in a structured format.
is not popular
defines only a transmission protocol
Entertainment
Training and simulation
Social networking
Financial analysis
Virtual Personal Network
Virtual Private Network
Variable Public Network
Virtual Protocol Network
Creative writing
Complex decision-making
Data entry from spreadsheets to databases
Physical labor in a factory
Giga byte
Mega byte
Meta byte
Kilo byte
Brute force of passwords
SIM swap attacks
SQL injection
Cross-site scripting
Security patches
Refresh patches
Security breath fixes
System access control
System design
Data access control
None of above
Password
Keycard
Retina
Fingerprint
A type of computer hardware
A digital currency
A distributed ledger technology
An operating system
Web Service
Softwares
Internet
Storing data on physical servers
Accessing software programs on local computers
Providing computing resources over the internet on-demand
Using floppy disks for data storage
Symmetric cryptography
Asymmetric cryptography
Hash cryptography
Quantum cryptography
The study of human behavior
The simulation of human intelligence by machines
The process of genetic engineering
The study of celestial bodies
International mobile equipment identify
Internet mobile equipment identify
International mobile equipment identity
None of these
Attacks on confidentiality
Attacks on integrity
Attacks on property
Antivirus
Firewall
Compiler
Browser
A type of computer virus
A security protocol
A programming language
A type of physical robot used in manufacturing
A software technology that automates repetitive and rule-based tasks
A manual process for data entry
A type of virtual reality simulation
One Time Password
Once and twice password
On time Password
None of the above