Overview of Future Skills and Cyber Security Set-2

Instruction:-

  • Number of Questions : 25
  • Total Marks : 25
  • Each question carry 1 Marks.
  • No negative marking

  •  

    Results

    #1. The ability of a machine to perform tasks that typically require human intelligence is known as:

    #2. Which of the following describes the delivery of on-demand computing services—from applications to storage and processing power—over the internet?

    #3. Which of the following is NOT part of the CIA Triad in cyber security?

    #4. A software designed to disrupt, damage, or gain unauthorized access to a computer system is generally known as:

    #5. What is a “phishing” attack?

    #6. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules is called a:

    #7. Which of the following types of hackers breaks into systems with malicious intent?

    #8. Which of the following is an example of Augmented Reality (AR)?

    #9. Which term refers to the process of extracting meaningful insights and patterns from large and complex datasets?

    #10. A model where computing resources are provided as a service over the internet, allowing users to access them without owning the underlying infrastructure, is called:

    #11. What is the primary function of a 3D printer?

    #12. Which of these is a key characteristic of Blockchain technology?

    #13. Which type of AI focuses on enabling machines to learn from data without being explicitly programmed?

    #14. IoT devices typically rely on which of the following to communicate and send data?

    #15. What is the term for a malicious program that duplicates itself and spreads to other computers, often causing damage or disruption?

    #16. The act of attempting to acquire sensitive information such as usernames, passwords, and credit card details, often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication, is known as:

    #17. Which of the following is a security measure that typically involves two different authentication factors to verify a user’s identity?

    #18. What is a ‘Denial of Service (DoS)’ attack?

    #19. Which of the following is a technique used to conceal messages or information within other non-secret data, such as images or audio files?

    #20. What does ‘Malware’ stand for?

    #21. Which principle of cybersecurity ensures that information is protected from unauthorized modification or destruction, and that data is accurate and reliable?

    #22. A “Zero-Day Exploit” refers to

    #23. Which of the following is NOT a component of the CIA Triad in information security?

    #24. What is a “Firewall” in the context of network security?

    #25. “Phishing” is an example of what type of cyber attack?

    Previous
    Finish

    Leave a Comment

    Your email address will not be published. Required fields are marked *