Question 1
Which of the following is an anti-virus program
Question 2
All of the following are examples of real security and privacy threats except:
Question 3
Trojan horses are very similar to virus in the matter that they are computer programs that replicate copies of themselves.
Question 4
_____________ monitors user activity on internet and transmit that information in the background to someone else.
Question 5
Viruses are __________.
Question 6
Firewall is a type of ____________.
Question 7
Unsolicited commercial email is known as ____________.
Question 8
Which of the following is not an external threat to a computer or a computer network.
Question 9
When a person is harassed repeatedly by being followed, called or be written to he / she is a target of.
Question 10
Which of the following is a class of computer threat.
Question 11
A license allows a user to use copyrighted material.
Question 12
It is a program or hardware device that filters the information coming through an internet connection to a network or computer system.
Question 13
It allow a visited website to store its own information about a user on the user’s computer.
Question 14
It is stealing ideas or creations of others.
Question 15
Hacking a computer is always illegal and punishable by law.
Question 16
Exploring appropriate and ethical behaviors related to online environments and digital media.
Question 17
Which of the following is digital certificate standard ?
Question 18
Which of the following technique is used to verify the integrity of the message ?
Question 19
Which of the following principle is violated if computer system is not accessible ?
Question 20
Transit time and response time measure the _______ of a network.
Question 21
Network failure is primarily a _______ issue.
Question 22
_______ is a network reliability issue.
Question 23
_______ is a network reliability issue.
Question 24
Unauthorized access is a network _______ issue.
Question 25
A virus is a network _______ issue.
Question 26
A _______ is illicitly introduced code that damages a network device.
Question 27
Passwords are used to improve the _______ of a network.
Question 28
Unauthorized access and viruses are issues dealing with network _______
Question 29
Which of the following are network reliability issues ?
Question 30
When a hacker penetrates a network, this is a network _______ issue
Question 31
When a server goes down, this is a network _______ issue.
Question 32
When an earthquake severs a fiber-optic cable, this is a network _______ issue.
Question 33
When a network upgrades to a transmission medium with a data rate that is 100 times faster, this improves the______ of the network.
Question 34
A company doubles the number of nodes on its network. The greatest impact will be on the _______ of the network.
Question 35
A company changes its network configuration so that only one router instead of two can access the Internet. The greatest impact will be on the _______ of the network.
Question 36
A company requires its users to change passwords every month. This improves the _______ of the network.
Question 37
A company buys a computer to serve as a backup to its main server. This will mainly affect the _______ of the network.
Question 38
A company requires each employee to power off his computer at the end of the day. This rule was implemented to make the network _______
Question 39
What Security tradeoff occurs while using IDS (Intrusion Detection System) ?
Question 40
EDI (Electronic Data Interchange) use.
Question 41
EDI (Electronic Data Interchange) over internet uses.
Question 42
For secure EDI (Electronic Data Interchange) transmission on internet.
Question 43
EDI (Electronic Data Interchange) standard.
Question 44
By security in e-Commerce we mean. (i) Protecting an organization’s data resource from unauthorized access (ii)Preventing disasters from happening (iii) Authenticating messages received by an organization (iv) Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations.
Question 45
A firewall is a ?
Question 46
A firewall may be implemented in
Question 47
Firewall as part of a router program.
Question 48
The Acronym DES stands for.
Question 49
DES works by using.
Question 50
DES (i) is a symmetric key encryption method(ii) guarantees absolute security (iii) is implementable as hardware VLSI chip (iv) is a public key encryption method
Question 51
DES using 56 bit keys
Question 52
Triple DES uses.
Question 53
ripple DES
Question 54
Triple DES
Question 55
Public key encryption method is a system.
Question 56
Public key system is useful because.
Question 57
In public key encryption if A wants to send an encrypted message.
Question 58
What does IP mean ?
Question 59
What happens to your data when it is encrypted ?
Question 60
What is a computer virus ?
Question 61
Which of the following is valid difference between a Virus and a Spyware ?
Question 62
How to avoid Man-in-the-middle attacks ?
Question 63
What happens during the TCP attack; Denial of Service ?
Question 64
What is Internet Protocol Security ?
Question 65
Which of the following is a valid Cyber / Internet Security requirement ?
Question 66
Digital signatures provide which of the following ?
Question 67
In which of the following protocols does a website (if accessed using the protocol) encrypt the session with a Digital Certificate ?
Question 68
कृत्रिम बुद्धिमत्ता ( Artificial Intelligence) क्या है ?
Question 69
निम्न उपकरणों में से कौन बुद्धिमत्ता ( Artificial Intelligence) में उपयोग किया जाता है ?
Question 70
कृत्रिम बुद्धिमत्ता ( Artificial Intelligence) में शोध का मौलिक गोल है-
Question 71
इनमें से कौन सा क्षेत्र के AI निकटतम है ?
Question 72
Cloud Computing के बारे में क्या चिंतनीय है ?
Question 73
इनमें से कौन सा क्लाउड कम्यूटिंग उपयोग का एक प्रमुख प्रकार नहीं है ?
Question 74
Cloud Computing मैं Cloud का अर्थ है-
Question 75
क्लाउड कम्प्यूटिंग में निम्नलिखित कौन सा सबसे महत्वपूर्ण क्षेत्र है ?
Question 76
क्लाउड कम्प्यूटिंग के द्वारा………….से आप जानकारी तक पंहुच सकते हैं-
Question 77
क्लाउड कम्प्यूटिंग निकटतम है-
Question 78
किस मॉडल में कलाकत्म प्रकार की सेवाएं शामिल हैं जिन्हे आप क्लाउड कम्प्यूटिंग प्लेटफॉर्म पर एक्सेस कर सकते हैं-
Question 79
निम्न कौन सा मॉडल डेप्लॉयमेंट मॉडल है ?
Question 80
निम्नलिखित में से कौन सा मॉडल सर्वोत्तम सर्विस मॉडल के रूप में जाना जाता है ?
Question 81
क्लाउड इंफ्रास्ट्रक्चर किसी संस्था के अनन्य उपयोग के लिए सांचालित होता है।
Question 82
निम्नलिखित में से कौन क्लाउड सेवाओं को बेचने वाले संगठन के स्वामित्व में है ?
Question 83
IOT किस पर बनाया गया है ?
Question 84
Internet of Things का अविष्कार किसने किया था ?
Question 85
IIoT क्या है ?
Question 86
IoT Devices को संदर्भित( Referring) करने का अन्य तरीका है-
Question 87
Internet of Things से जुडी बनी संख्या में उपकरणों को स्वाचालित रूप से संवाद करना पड़ता है, मनुष्य के माध्यम से नहीं। इसे क्या कहा जाता है ?
Question 88
कौन क्षेत्र वर्चुअल रियलिटी द्वारा प्रभावित नहीं है ?
Question 89
Big Data शब्द को सबसे पहले किसने इस्तेमाल किया था ?
Question 90
Big Data का इस्तेमाल सबसे अधिक कहां होता है।
Question 91
RPA का पूर्ण अर्थ है।
Question 92
3D क्या कार्य करता है।
Question 93
Attacks on confidentiality is not a type of cyber attacks ?
Question 94
Phishing is the types of cyber security ?
Question 95
Firewall is a type of threat .
Question 96
Computer viruses are man made.
Question 97
Trend micro is a program.
Question 98
Encryption techniques improve a network's _______
Question 99
The certificate Authority signs the digital certificate with.
Question 100
The number of users on a network has the greatest impact on the network's _______