Question 1
In computer security, …………. Means that the information in a computer system only be accessible viewing by authorised parities... कंप्यूटर सुरक्षा में ....... का अर्थ है कि कंप्यूटर प्रणाली में सूचना केवल अधिकृत पार्टिज द्वारा देखने योग्य हो।
Question 2
Which protection method is used to monitoring who can access the data for what purpose किसी सुरक्षा विधि का उपयोग निगरानी के लिए किया जाता है कि कौन किस उद्देश्य के लिए डेटा तक पहुंच सकता है ?
Question 3
Encryption techniques improve a network`s------- एन्क्रिप्शन तकनीक एक नेटवर्क...........को बेहतर बनाती है।
Question 4
The main goals of secure computing is सुंरक्षित कंप्यूटिंग का मुख्य लक्ष्य है..........
Question 5
----------means that sender must not be able to deny sending a message that he sent. ..............इसका मतलब है कि प्रेषक को एक मैसेज भेजने से इनकार करने में सक्षम नहीं होना चाहिए जो उसने भेजा था।
Question 6
In computer security,……. Means that computer system assets can be modified only by authorised parities. कंप्यूटर सुरक्षा में .... का मतलब है कि कंप्यूटर सिस्टम की संपति को केवल अधिकृत समानताएं द्वारा संशधित किया जा सकता है।
Question 7
Which of the following is not a method to provide protection?- निम्नलिखित मे से कौन सुरक्षा प्रदान करने की एक विधि नहीं हैं।
Question 8
In computer security integrity refer to कंप्यूटर सूरक्षा में इंटीग्रिटी को देखें
Question 9
------- refers to the situation in which services or data become unavailable unusable and destroyed. ......उस स्थिति को संदर्भित करता है जिसमें सेवाए या डेटा अनुपलब्ध अनुपयोगी और नष्ट हो जाते हैं।
Question 10
Authentication is प्रमाणीकरण है
Question 11
Which of the following means that the receiver is ensured that the massage is coming from the intended sender not an imposer निम्न में से किस का अर्थ है कि रिसीवर सुनिश्चित करता है कि मैसेज किसी प्रेषक से नहीं बल्कि इच्छित पे्रषक से हो रही है।
Question 12
------- means to prove/verify the identity of the entity tries to access the system’s resources. .........का मतलब उस संस्था की पहचान को प्राणित /सत्यापित करना है जो सिस्टम के संसाधानों तक पहुँचने की कोशिश करती है।
Question 13
Software programs that close potential security breaches in an operating system are down as सोफ्टवेयर प्रोग्राम जो एक ओपरेटिंग सिस्टम में संभावित सुरक्षा ब्रिचेस के रूप में जाने जाते हैं।
Question 14
Major security problem for operation system is सिस्टम ओपरेशन के लिए एक बडी सुरक्षा समस्या है
Question 15
Malware is use to मैलवेयर का उपयोग किया जाता हैं।
Question 16
The aspect of security that falls when an email in intercepted is सुरक्षा का वह पहलू जो विफल हो जाता है जब ईमेल काइंटरसेप्ट किया गया होता है
Question 17
The creeper virus was eventually deleted by a program known as ------ क्रपीर वायरस को अंततः....... नामक एक कार्यक्रम द्वारा हटा दिया गया था।
Question 18
For secure Electronic Data Interchange (EDI) transmission on internet used-- इंटरनेट पर सुरक्षित इलेक्ट्रॅानिक डाटा इंटरचेंज टांसमिशन के लिए उपयोग किया जाता है।
Question 19
What are the three basic component of computer security कंप्यूटर सुरक्षा के तीन बुनियादी घटक क्या हैं।
Question 20
The secure Electronic transaction protocol is used for which type of payment सुरक्षित इलेक्ट्रोनिक लेनदेन प्राटोकोल का उपयोग किस प्रकार के भुगतान के लिए किया जाता है।
Question 21
Data security threats include डेटा सुरक्षा खतरों में शमिल हैं
Question 22
Which of the following is/are threat(s) for electronic payment system निम्नलिखत में सें कौन इलेक्ट्रोनिक भुगतान प्रणाली के लिए खतरा है।
Question 23
In SET protocol a customer sends a purchase order SET प्रोटोकोल में एक ग्राहक एक खरीद आदेश भेजता है
Question 24
Which of the following is a class of computer thereat प्रोटोकोल में एक ग्राहक एक खरीद आदेश भेजता है
Question 25
Trend micro is a ट्रेंड माइक्रो एक है।
Question 26
Firewall is a type of फायरवोल एक प्रकार है।
Question 27
Unauthorised access is which type of network issue. अनाधिकृत पहुँच किस प्रकार की नेटवर्क समस्या है।
Question 28
Included in Industry उद्योग 4.0 में शमिल है ।
Question 29
Vision of the Industry 4.0 is उद्योग का विजन 4.0 है।
Question 30
Included In internet of things. इंटरनेट ओफ थिंग्स में शमिल है
Question 31
This is not a benefit of big Data Analytics. यह बिग डेटा एनालिटिक्स का लाभ नहीं हैं।
Question 32
Which is a mobile social network? यह बिग डेटा एनालिटिक्स का लाभ नहीं हैं।
Question 33
Which is a benefit of cloud Computing क्लाउड कम्प्यूटिंग के लाभ कौन .. कौन सा हैं।
Question 34
Included in Artificial Intelligence. आर्टिफिशियल इंटेलीजेंस में शमिल हैं।
Question 35
This is not a type of cyber attacks. निम्न में सें कौन साइबर सुरक्षा का प्रकार नही है।
Question 36
--------ensures that unauthorized users do not access the system यह सुनिश्चित करता है कि अनाधिकृत उनयोगकर्ता सिस्टम का उपयोग न करें।
Question 37
Benefit of robotic process automation is रोबोटिक प्रोसेस ओटोमेशन का लाभ हैं।
Question 38
This certificates will be issued for both business and individuals use यह प्रमाण पत्र व्यवसाय और व्यक्तियों के उपयोग के लिए जारी किया जाऐगा
Question 39
-----is are the branch of information technology which is intended to protect computer सूचन प्रद्योगिकी की एक शाखा है जिसका उद्देश्य कंप्यूटर की सुरक्षा करना है।
Question 40
This is a type of SSL certificate. यह एक प्रकार का एसएसएल प्रमाण पत्र है।
Question 41
Which of the following tools / applications relates to industry 4.0 उद्योग 4.0 के लिए कितने डिजाइन सिद्धांत लागू होते है।
Question 42
-------design principles are applied for Industry 4.0 डिजाईन सिद्धान्तों को उद्योग 4.0 के लिए लागू किया जाता है।
Question 43
The objective for industry 4.0 is उद्योग 4.0 का उद्देश्य है।
Question 44
IIoT stand for -----IIoT स्टैंड करता है।
Question 45
IoT stand for स्टैड करत है।
Question 46
Which industry branches are auditable for industry 4.0 development उद्योग 4.0 विकास के लिए कौन सी उद्योग शाखाए उपयुक्त है।
Question 47
Which of the following option is not best described about industry 4.0उद्योग 4.0 के बारे में निम्नलिखित में सें कौन सा विक्लप सबसे उपयुक्त नही है।
Question 48
What is a smart factory ? स्मार्ट फैक्टरी क्या है।
Question 49
Which social media is more based on mobile compare desktop ? डेस्कटोप की तुलना मोबाइल पर कौन सा सोशल मीडिया अधिक है।
Question 50
Which social media is more based on image and video ? कौन सा सोशल मिडिया इमेज और वीडियो पर आधारित है।
Question 51
A firewall may be implemented in routers which connect intranet to internet .
Question 52
A which is a network security issue ?
Question 53
When a server goes down this is a network reliality issue ?
Question 54
Spyware monitors user activity on internet and transmit that information in the background to someone else.
Question 55
Firewall is a program of hardware that filters the information coming through an internet connection to a network or computer system.
Question 56
The main function of proxy application gateway firewall is to allow internet users to securely use specified internet services.
Question 57
A firewall is a security device deployed at the boundary of a corporate intranet to protect it from unauthorized access.
Question 58
Industry 4.0 is a new technology for politician
Question 59
The certificate authority signs the digital certificate whit its own private key.
Question 60
Industry 4.0 is based on the base of development of machines.
Question 61
In the smart factory workers machines and resources communicate easily.
Question 62
Phishing is a form of fraud where fraudulent emails are sent from reputable sources
Question 63
The step data-information –knowledge-wisdom-decision turn big data become smart data
Question 64
If’s is missing in the URL means that site is secure.
Question 65
The objective if industry 4.0 is increase efficiency.
Question 66
Sophisticated software programs are used for Big data Analytics.
Question 67
Example of social network are face book, twitter etc.
Question 68
LinkedIn is the largest mobile social network.
Question 69
Instagram is a mobile social media owned by Google.
Question 70
Companies providing cloud services enable users to store files and applications on remote servers,and then access
Question 71
Microsoft azure is an example of public cloud.
Question 72
Amazon elastic is an example of private cloud.
Question 73
The way of industry 4.0 leads to the connectivity of virtual world and physical objects.
Question 74
The internet of things allows to interact and exchange data with device .
Question 75
In the internet of things information system can not be access remotely.
Question 76
Data may be collected from social network digital image sensor and sales transaction.
Question 77
Software as a service a platform for creating software.
Question 78
Virtual Reality and augmented Reality are two sides of the same coin
Question 79
Robotics is also a major field related to Artificial intelligence.
Question 80
Robotic process automation (RPA) is a part of an organization’s IT infrastructure.
Question 81
Block chain was invented by a person using the name satoshi Nakamoto in 2008 to serve as the public transaction ledger of the crypto currency bit coin.
Question 82
Oculus Rift oculus VR and face book are the major players in Virtual Reality.
Question 83
Cyber security protects the data and integrity of computing assets belonging to or connecting to an organization’ s network.
Question 84
Phone security is the practice of defending mobile devices against a wide range of cyber attack.
Question 85
Digital signatures develop tow type of key one private key and second public key that are mathematically linked…..
Question 86
Attacks on confidentiality are not a type of cyber attacks.
Question 87
Publishing is the type of cyber security?
Question 88
Six design principles are applied for Industry 4.0 .
Question 89
Facebook and Instagram a mobile social Network.
Question 90
Firewall is a type to threat.
Question 91
Computer viruses are man made.
Question 92
Low cost and Fast speed of a benefit of could computing .
Question 93
Attacks on integrity the type of cyber security.
Question 94
Instagram social media is more based on mobile compare desktop.
Question 95
Trend micro is a program.
Question 96
A block chain carries on transaction cost.
Question 97
Big online business website like flipkart snapdeal uses face book or Gmail data to view the customer information or behavior.
Question 98
Cloud computing offers online development and deployment tools programming runtime environment .
Question 99
Back up your files regularly to prevent cyber security attacks.
Question 100
A typical enterprise uses multiple and disconnect IT systems to run its operations.