Instruction:-
#1. The ability of a machine to perform tasks that typically require human intelligence is known as:
#2. Which of the following describes the delivery of on-demand computing services—from applications to storage and processing power—over the internet?
#3. Which of the following is NOT part of the CIA Triad in cyber security?
#4. A software designed to disrupt, damage, or gain unauthorized access to a computer system is generally known as:
#5. What is a “phishing” attack?
#6. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules is called a:
#7. Which of the following types of hackers breaks into systems with malicious intent?
#8. Which of the following is an example of Augmented Reality (AR)?
#9. Which term refers to the process of extracting meaningful insights and patterns from large and complex datasets?
#10. A model where computing resources are provided as a service over the internet, allowing users to access them without owning the underlying infrastructure, is called:
#11. What is the primary function of a 3D printer?
#12. Which of these is a key characteristic of Blockchain technology?
#13. Which type of AI focuses on enabling machines to learn from data without being explicitly programmed?
#14. IoT devices typically rely on which of the following to communicate and send data?
#15. What is the term for a malicious program that duplicates itself and spreads to other computers, often causing damage or disruption?
#16. The act of attempting to acquire sensitive information such as usernames, passwords, and credit card details, often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication, is known as:
#17. Which of the following is a security measure that typically involves two different authentication factors to verify a user’s identity?
#18. What is a ‘Denial of Service (DoS)’ attack?
#19. Which of the following is a technique used to conceal messages or information within other non-secret data, such as images or audio files?
#20. What does ‘Malware’ stand for?
#21. Which principle of cybersecurity ensures that information is protected from unauthorized modification or destruction, and that data is accurate and reliable?
#22. A “Zero-Day Exploit” refers to
#23. Which of the following is NOT a component of the CIA Triad in information security?
#24. What is a “Firewall” in the context of network security?
#25. “Phishing” is an example of what type of cyber attack?
Previous
Finish