Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

Correct Answer with

Questions Option A Option B Option C Option D


Description
Lack of
What has led to the Introducti
The increased Downloading awareness
increase in cybercrime on of Introduction of mobile
use of of infected about
relate to mobile mobile wallets
smartphones applications mobile
devices? wallets
antivirus
Potential
Which of the following
losses due
does not belong to the Non-
Authenticity to Validation Validation
elements of data repudiation
security
security?
attacks
Ransomware and Android Operating
Hackers Malware Malware
Rootkit are: Updates Systems
Which of the following
is considered as one of CryptoLocke
Morris
the “first ever Pikachu Virus Simile Virus r Trojan Morris Worm
Worm
registered online Horse
viruses”?

ESET
Which of the following
Avast! Mobile Mobile Python
is not a mobile 360 Security Python Protection
Security Security & Protection
antivirus?
Antivirus

Installing
the
computer in
Out of the following, Installing a UPS Updating
a location
which is not the (Uninterruptibl the
where
correct step to protect Creating a e Power operating Updating the operating
damage due
computer and the data backup Supply) to have system on system on a timely basis
to natural
stored on them against a battery a timely
factors can
natural threats? backup basis
be
minimised
or avoided.

Directly Officially
Data can be generated Externally and Explicitly and
and and Explicitly and Implicitly
in two ways: Internally Implicitly
Indirectly Unofficially
Checking
whether the Checking
Which of the following site is secured whether a Checking Checking
is not the correct using Secure website has a the name the domain Checking the name of
method for identifying Socket Layer lock icon of the of the the website
a secure website? (SSL) before their website website
technology or URLs.
not.
Which of them is not a
category of computer MAN WAN VPN SAN SAN
networks?
Out of the following,
Sophos Email Netcraft
which is a filter that PhishTank Spamihilator Spamihilator
Appliance Toolbar
removes spam mails?
What is 'S' in HTTPS? Secure Salient Safe Simple Secure
The act of
searching
The act of
The act of A wireless for
minimising
making the network access unsecured A wireless network
the
possibility for point that Wi-Fi access point that
What does the term possibility of
hackers to impersonates a networks impersonates a
‘evil twin’ refer to? a hacker
gain easy legitimate by an legitimate wireless
accessing
access to their wireless access individual access point
your
networks point in a
network
moving
vehicle
Protecting
The
all your
conversion of The conversion Authorisatio The conversion of digital
files by
Encryption refers to: digital data to of analog to n to access data to another form or
assigning
another form digital data code
password
or code
s to them
Decrypted
What is ciphertext? Encrypted Text Plain Text Hidden Data Encrypted Text
Text
Reading,
Fraudulent
obstructin
Gaining access practice of
Surveillance g or Fraudulent practice of
What do you mean by to sensitive using the
without stealing using the identity of
Identity Theft? and personal identity of
consent personal another person
information another
informati
person
on
Out of the following
methods, which one
backs up only the
Incremental Mirror Differential
changed files and new Full Backup Incremental Backup
Backup Backup Backup
files created since the
last incremental or full
backup?
What is the name of a Windows
Microsoft Windows Mcafee
built-in antivirus for Threat Windows Defender
Protection Defender Antivirus
Windows 10? Protection
Sites
Sites made for made to
routing users access Sites visited Sites made for routing
Sites that are
What are Stealth Sites? to the wrong your in incognito users to the wrong and
hidden
and affected private mode affected sites
sites informati
on
Which of the following Location of
Technolog
does not contribute in Data data centres
Data y
compromising the Ownership and Technology Drawbacks
Migration Drawback
privacy of data stored Issues permanency
s
on cloud? of data
A network that
connects all devices in
your home to the LAN MAN HAN VPN HAN
Internet and to each
other is known as:
_____ transaction
refers to any
Cloud Digital Virtual Electronic Digital
transaction that uses
electronic medium.
Which of the following
data backup method Differential Full Incremental
Mirror backup Full backup
utilises maximum backup backup backup
storage space?
An
A firewall An open Operating
developed by An open source source system An open source web
What is Firefox?
Mozilla antivirus web developed browser
foundation browser by Mozilla
foundation
Which of the following UI
User Interface UI Redress Cursorjackin
is not an alias for Redressin Cursorjacking
Redress attack attack g
Clickjacking? g

By default, how many


sign-in attempts
10 Unlimited One 36 Unlimited
Windows allow for
user accounts?
A collaborative effort
in which storage is
shared between
several companies
Community Public Hybrid Class
having common Private Cloud Community Cloud
Cloud Cloud Cloud
concerns, such as
security, compliance
and jurisdiction is
known as:
Which of the following
is not a mobile Linux iOS Symbian Android Linux
operating system?

The act of monitoring


user communication
Spamming Eavesdropping Tracking Phishing Eavesdropping
without consent is
called:
Which of the following
cloud service is
designed for
None of the
developers to build, IaaS SaaS PaaS PaaS
above
run and manage
applications over the
Internet?
Asymmetr
A ic Symmetric
What is Diffie- Asymmetric encryption
programming An antivirus encryptio encryption
Hellman? algorithm
language n algorithm
algorithm

The feature under


which each time you
Single
log in to your account,
Three Step Two Step Click None of the
the system sends a one- Two Step Authentication
Encryption Authentication Authentic above
time password on your
ation
registered mobile
number is known as:

Which of the following Virus and Trojan Spyware &


Spam Spam
is not a Malware? Worm Horse Adware
The two most Encryptio
commonly used Decoding & Data Hiding & n& Scripting & Encryption &
methods for securing Encoding Virtualization Authentic Analysis Authentication
data are: ation
Which of the following
Microsoft Mozilla
is not an email service Opera Mail Whatsapp Whatsapp
Outlook Thunderbird
provider?
The use of methods
and practices to secure
the data and other
Portable
information stored on Cellphone Mobile Device Mobile
Device Mobile Device Security
the mobile devices, Security Security Security
Security
such as smartphones
and tablets is known
as:
The process that
involves software Data Data
Data Deletion Data Swiping Data Wiping
based data erasure is Hiding Wiping
known as:
National
In the context of e- Near Field
Normalization Finance Not for Near Field
wallet, what does NFC Communicatio
Form C Commissi Commerce Communication
stands for? n
on
What type of network
allows computers or an
entire network to
WAN LAN MAN VPN VPN
connect to each other
over the Internet
securely?
By
selecting
How can users secure By enabling
By not opening the By blocking By enabling the
their devices from the passcode
Bluetooth and airplane third-party passcode and Auto-Lock
hacker attacks on iOS and Auto-Lock
Wifi mode apps features
devices? features
when in
doubt
A
A
A Distributed Distanced Disk
Distinguished A Distributed Denial of
DDoS stands for: Denial of Data Operating
Denial of Service
Service Operating System
Service
Service
A ________ network
connects devices to
Social Wired Simple Wireless Wired
the Internet or other
networks using cables.
Wi-Fi is a type of
WWAN WPAN WLAN WMAN WLAN
_______
Advanced
Attached Research
The first computer
ALOHAnet Resource Projects CYCLADES Advanced Research
network was built in
(ALOHA Computer Agency computer Projects Agency
the year 1969 and it
System) NETwork Network network Network (ARPANET)
was known as:
(ARCNET) (ARPANET
)

Save cookies, Delete cookies,


temporary temporary
Delete cookies,
Internet files Internet files
Clear temporary Internet files
The main function of and browsing and browsing Hide IP
browsing and browsing history
private browsing is to: history after history after address
history after you close the
you close the you close the
browser window.
browser browser
window. window.
Wi-Fi
Which of the following Wireless
Wi-Fi Wireless protected
is not an encryption Encryption Wireless Encryption
protected Equivalent Access
method for wireless Application Application (WEA)
Access (WPA) Privacy (WEP) Version 2
settings? (WEA)
(WPA2)
The process
The process of The process of of
The
deleting data destroying data formatting The process of
process of
Data destruction refers stored on stored on electronic destroying data stored
destroyin
to: various various storage on various electronic
g storage
electronic electronic media storage media
facility
storage media storage media where data
is stored
Unsolicited Bulk Email
Computer
(UBE) is another name Spams Trojan Horses Phising Spams
Worm
for:
Which of the following
Likejackin Accountjacki
is a type of Serverjacking Profilejacking Likejacking
g ng
Clickjacking?
A network in a campus
is usually a PAN LAN WAN MAN MAN
___________
You can upgrade
BCLs ACLs UCLs VCLs ACLs
firewalls with _____
Safari is a web browser
based on the _______ WebKit NetFront MARTHA Gecko WebKit
engine.
Decentrali
In computer
Demilitarised Dead Man's zed Digital
networking, what does Demilitarised Zone
Zone Zone Machine Media Zone
DMZ stands for?
Zone
The act of
misleading a
user to The act of misleading a
Download
The process of different Securing IP user to different website
What is URL Spoofing? ing proxy
creating a URL website by address by sending a legitimate
servers
sending a looking URL
legitimate
looking URL
The method of adding
geographical metadata
to various media such
as images, videos,
Geostrate
websites, SMS Geometric Geotagging Geopolitics Geotagging
gy
messages, QR codes or
smartphone
transmissions is known
as:
Data Data Breach
Data security is also Information Information
Encryptio Managemen Information Security (IS)
called: Protection (IP) Security (IS)
n (DE) t (DBM)
The practice of
The practice The
convincing
of writing attempt
people to
malicious to hide
reveal
code or malicious The attempt to hide
confidential
program that programs All of the malicious programs in
What is Clickjacking? information
attackers in the above the garb of legitimate
about
develop to garb of buttons or links
themselves,
harm or legitimate
friends,
damage user’s buttons or
relatives or
security links
colleagues
Which of the following Three-
is an additional layer of Two-step Three-step step Single click
Two-step verification
security to your verification verification authentic strategy
LinkedIn account? ation
Which of the following
are the two types of Explicit and Direct and Passive Original and
Passive and Active
network security Implicit Indirect and Active Fake
threats?
The unauthorised
access of data through
an open and insecure Clickjackin
Hacking Backdoor Bluesnarfing Bluesnarfing
Bluetooth connection g
by a wireless device is
known as:

A basic
Representat
Interpreted, unit which
In context of data, Collection of ion of
organised and leads to Interpreted, organised
what is an facts and conditions,
structured the and structured data
information? figures ideas or
data creation
objects
of data
______ is a device or
software that allows Encryptio
Antispam Zombie Packet
eavesdropping on n Packet Sniffer
Tool Computer Sniffer
traffic moving between Detection
computers.
Online data backup is Internet Online Web
Cloud Storage Cloud Storage
also known as: Storage Storage Storage
Apart from the Lock
option, what other
option can be used to
lock your PC when you Sleep Power Settings Accounts Sleep
want to leave your
device for a little
while?

Unforesee
Which of the following Unsolicited
Undetectable n Solicited Unsolicited Commercial
is another name for a Commercial
Cheat Engine Circumsta Bulk Email Email
spam? Email
nces
Excepted
When an untrusted
device gains access to
another mobile device
Backdoor None of the
via Bluetooth to collect Bluesnarfing MITM attack Backdoor hacking
hacking above
the data of the latter,
this practice is known
as:
Searching for
unsecured Wi-Fi
networks by an
individual in a moving
LAN driving War Driving Misconfig WAN driving War Driving
vehicle, using a
uration
computer and an
802.11 wireless LAN
adapter is known as:

Which type of digital


wallets offer personal
user accounts where a
All types
user can sign up for an Device-based Internet-based None of the Internet-based digital
of digital
account and store digital wallets digital wallets above wallets
wallets
credit or debit card
information in it for
faster checkout?
Undertak
e
Providing an Providing
Running decisions
Which of the following easy-to-use utilities for Undertake decisions
applications, based on
in not the key function user interface managing based on previous
executing and previous
of operating system for interacting and activities and run on its
cancelling activities
(OS)? with organising own.
processes and run
computers hardware
on its
own.
Lists that Lists that
Lists that Lists that appear appear
appear when appear when when the when the Lists that appear when
In Windows 10, Jump
the user right- the user left- user right- user left- the user right-clicks a
Lists feature refers to:
clicks a clicks a taskbar clicks a clicks a taskbar icon
taskbar icon icon program program
icon icon
Leaving
Posting on Browsing
Which of the following transaction
Saving phone social history of
is not an example of receipts at Saving phone numbers
numbers networking your
implicit data? public
sites computer
places

Infrastructure- Applicatio Software-as-


Which of them is not a Platform-as-a- Application-as-a-Service
as-a-Service n-as-a- a-Service
cloud service? Service (PaaS) (AaaS)
(IaaS) Service (SaaS)
(AaaS)
Out of the following,
which cloud service
offers virtual servers, IaaS VaaS PaaS SaaS IaaS
storage disks and
networks?
How many types of
categories exist for One Two Three Four Two
digital wallets?

the act of
hiding the
IP address the act of
the act of to mislead copying
the act of the act of hiding the IP
securing IP the target someone
obtaining address to mislead the
address to computer else's IP
proxies in target computer to think
IP Spoofing refers to: protect from to think address in
order to access that it is receiving data
cyberattacks that it is order to
unwanted from a trusted computer
that may harm receiving hide one's
websites. or host.
the computer. data from true
a trusted identity.
computer
or host.

An
An operating A Software
antivirus
system that is designed to
that A Software designed to
designed to block
prevents An block unauthorised
protect other unauthorised
What is a firewall? the encrypted IP access to a computer
operating access to a
system address over a network or the
systems from computer over
from Internet
unauthorised a network or
cyberatta
access the Internet
cks
Which of the following
is a web browser that
Chrome
is specially designed KidZee KidZui Google Plus KidZui
Kids
for kids to show
filtered results?

Distribute
Which of the following d
Distributed Software
are not the benefits Software Enhanced
Higher Speed Reduced Cost and Hardware
associated with and Security
Management
computer networks? Hardware
Managem
ent

Using two
Storing and
storage Copying Inspecting
maintaining Copying important data
Data backup refers to devices for important data external
data in a to preserve it as an
the process of: the same data to preserve it devices
storage alternate
in a same as an alternate for a
facility
place threat
Man-In-
What does MITM Monitor-In- Meet-In-The- None of the
The- Man-In-The-Middle
stands for? The-Middle Middle above
Middle
Attacks that involve
attempts by an
intruder to monitor a
communication for Implicit Direct Active
Passive Threats Passive Threats
stealing sensitive Threats Threats Threats
information that two
devices transmit over a
network is known as:

Which of the following


Message
is not a primary part of Header Message body Signature Message Font
Font
an email message?

What is a built-in
BitLocker
security feature of Windows
Bitmap Drive Drive BitLocker Drive
Windows OS that Drive VeraCrypt
Encryption Encryptio Encryption
encrypts the hard drive Encryption
n
on your computer?

Pediatric Patent
Point-to-Point PowerPoi
What does PPTP stands Preclinical Periodical Point-to-Point Tunneling
Tunneling nt
for? Testing Trust Protocol
Protocol Presentati
Program Partnership
on
Never
In the context of file New
Never Try New Tools for Tested New Technology File
encryption tools, what Technology
Free Systems Storage File System
does NTFS stands for? File System
System
Blocking
Giving a Authenticating the user Checking
Digital signature helps Authenticating the
unique look to the identity of from the mail for
in: identity of the sender
an email the sender accessing malware
the mail
How many types of
architecture is involved
Two Three Four Five Four
in cloud
implementation?
A real-time
intervention in the
personal conversation Encryptio Eavesdroppi
Spamming Identity Theft Eavesdropping
of others over an n ng
electronic medium is
known as:

Network security is Small and


Governmental All of the
essentially required Large Homes All of the above
Entities above
for: Organisations

that is
confined
to a small
that spans geographi
over a large that usually cal area that is based that spans over a large
Wide Area Network
geographical spans a large such as a on the client- geographical area, such
(WAN) refer to a
area, such as a campus or an school, server as a country or the
network:
country or the entire city office, or architecture entire world
entire world multiple
offices
within a
campus

Use of wireless
communication
technology that
Over-the-
facilitates transmission Bluetooth Wi-Fi
air Online Over-the-air
and reception of communicatio communicatio
communi Transaction communication
transactions among n n
cation
devices without being
connected physically is
known as:
Public Key Man-in-the-
Infrastructure (PKI) middle Man-in-the-middle
DoS & DDoS IP Spoofing Spams
based authentications attack attack (MITM)
are used to tackle: (MITM)

to create
to block every to authenticate to
network to authenticate every
Employ Network connection every device implement
segments device before
Access Control (NAC) is that is before strong
to prevent establishing any
used______ suspected to establishing encryption
eavesdrop connection
be harmful any connection policy
ping
Ashley
Which of the following Madison Panama
Google Hack Yahoo Hack Google Hack
is not a cyberattack? Data Papers
Breaches
Data cannot be
None of the
securely protected on External Drive Local Drive Network Network
above
a:
Which of the following
allows a connection
over the air between
All of the
two systems to be SSL/TLS HTTPS VPN SSL/TLS
above
encrypted, making the
data unreadable to
attackers?
PGP is a software used Pretty
for protecting Pretty Good Pretty Good Good Pretty Good
Pretty Good Privacy
electronic mails. Its full Privacy PracticeProtectio Project
form is: n
Maintena Precaution>
Which is the correct
Precaution>> Maintenance nce >> > Precaution>>
order of steps for
Maintenance >> Reaction>> Precautio Reaction>> Maintenance >>
implementing data
>> Reaction Precaution n>> Maintenanc Reaction
security?
Reaction e

Which of following Sharing of


Avoiding
measures should not Understanding personal Sharing of personal
sharing
be applied to keep the Terms and Encryption details for details for
information
your cloud data Conditions authentic authentication
on cloud
private: ation
Securing
your
Ensuring the Ensuring
informati
information that your
Ensuring that on so that
One of the guiding stays in its system stays Securing your
the system is only
principles for original form available to information so that only
updated authorise
protecting cyber assets and isn’t perform its authorised users will be
constantly and d users
is Confidentiality, modified when intended able to access and view
firewall is will be
which means: transmitted function them.
checked. able to
over a when
access
network. required.
and view
them.
Out of the following,
which issues are Overall Access to
irrelevant while aesthetics the cloud’s Overall aesthetics of the
Space Finances
examining and of the customer interface
analysing a cloud interface service
service:
The act of
encouraging The
the user to practice
The practice of
click a link of The practice of sending
sending spam
that may obtaining spam across multiple
Snowshoe spamming across multiple None of the
redirect to private domains and IP
refers to: domains and IP above
another link or informati addresses to dodge
addresses to
website on in a filters
dodge filters
hosting fraudulen
malware or t manner
spyware
___________ is a free
and easy-to-use
Data
software that
Rubber Eraser Destructo File Secure Eraser
overwrites data on
r
your hard drive with
random patterns.
Which of the following
Direct Symmetric
option depicts two External and Valid and
and and Direct and Indirect
approaches of Social Internal Invalid
Indirect Asymmetric
Engineering?

Wi-Fi Windows Wired


Works Progress
WPA stands for: Protected Product Protected Wi-Fi Protected Access
Administration
Access Activation Access
Traditional Upgraded Internet
What is a snail mail? A website Traditional Mail
Mail Email Tool
Confidenti
Protecting your cyber Confidentiality, Integrity,
Confidentiality ality,
assets involves three Security and Modificatio Confidentiality, Integrity
, Integrity and Security
simple principles, and Risk n and and Availability
Availability and
they are: Management Availability
Monitorin
g
Which of the following Symmetric
Explicit and Authentic and Valid and Symmetric and
options depict two and
Implicit Inauthentic Invalid Asymmetric
types of encryption? Asymmetric
Total
In the context of hard Technical Productiv Trusted
Third-Party Trusted Platform
drive encryption, what Performance e Platform
Maintenance Module
does TPM stands for? Measurement Maintena Module
nce
The computer that is
used to launch attacks Android Hacking Zombie Virtual
Zombie Computer
on other computers is Computer Machine Computer Computer
knows as:
Exchanging text
messages between
two or more
participants in real Instant Online
Social
time over the internet Telecommutin Messagin Communica Instant Messaging
Networking
using a set of g g tion
communication
technologies is called
_______
An email A web
A type of spam A fake
What is a spoof mail? service browser A fake mail
mail mail
provider extension
In which year India
suffered the largest
1988 1999 2016 2003 2016
data breach in the
banking sector?
Protect
Access the the Promote
Display all the
information system and Access the information
The main function of previous and
and resources from enhance and resources from the
the web browser is to: existing online
from the World online Internet World Wide Web
activities
Wide Web virus security
attacks
For checking
For checking where the For For For checking where the
LongURL.org is used the length of suspected link masking browsing in suspected link is
for: characters in a is destined your IP incognito destined without
long URL without address mode clicking on it
clicking on it
Which of them is not a Incremental Extensive Mirror
Full backup Extensive backup
data backup method? backup backup backup
A High-
What is High A Type of
A Wireless powered None of the
Performance Radio Wide Area A Wireless LAN Standard
LAN Standard Computer above
LAN (HiperLAN)? Network
Network
In which of the
following attacks,
legitimate users are IP None of the
DDos DoS DoS
deprived of access to a Spoofing above
network or a web
resource?
Which of the following
Google Docs Cisco WebEx Azure Azure
is not SaaS? Basecamp
Electronic Mail (email)
Charles Robert
was invented by Ray Tomlinson Vint Cerf Ray Tomlinson
Babbage Kahn
whom?
Internatio
International International Internationa
nal
Mobile Mobile l Mobile International Mobile
IMEI stands for: Medical
Equipment Equipment Equipment Equipment Identity
Education
Identifier Identification Identity
Institute
Making the Verifying
digital data, Protecting identity for
Securing all the
software, your gaining Verifying identity for
Authentication is a digital assets
hardware identity legitimate gaining legitimate access
method for: on your
(such as hard on the access to to the system or data.
system.
drive) internet the system
encrypted. or data.
What is the age limit
at least 18 at least 21 at least 13 at least 14
for creating an account at least 13 years old
years old years old years old years old
on Instagram?
They help
the
They
They keep us computer
Why Software updates They help in increase the They help the computer
updated with to work
are essentially upgrading our overall to work smoothly
the newest smoothly
important? system speed of the without any glitches
features without
CPU
any
glitches
Network
Which of the following Network Network Network
Intrusion Network Intrusion
can help prevent Independent Interface Interface
Prevention Prevention System
botnets? Protocol Plug Processor
System
Which of the following Quick
Apple Pay PayPal Paytm Quick Heal
is not a digital wallet? Heal
Which of the following
Online
are not the primary Browser Network Application
data Application Security
elements of Internet security security Security
security
security?
Store Provide
Which of the following Manage Pay
information alternative Provide alternative to
is not a function of e- payment electronic
regarding to cloud cloud storage
wallet? instruments ally
transaction storage
Addition or Keeping
Creating
modification Updating the track of Addition or modification
Extensions are applications
of a specific current version user's of a specific feature in a
software that help in: and web
feature in a of the browser browser browser
content
browser history
Threaded
What does TLS stand Thread Local Transport Target Level
Locking Transport Layer Security
for? Storage Layer Security of Safety
System
Simple Mail Strategic Small Mail Safe Mail
What does SMTP stand Simple Mail Transfer
Transfer Medium Term Transfer Transfer
for? Protocol
Protocol Plan Protocol Protocol
You can recharge or Debit Receive
fund your e-wallet cards/credit Directly from money All of the
All of the above
from various sources cards/prepaid bank accounts from above
such as: cards others
Out of the following,
Social Media Digital Name
what is not a digital Domain Names Name Plates
Account Cameras Plates
asset?
Which of the following
OneDrive McAffe Drive iCloud Dropbox McAffe Drive
is not a cloud service?
In which of the
following parts of a
user account, the user Photos Friend List Timeline Profile Profile
describes
himself/herself?
Global General Genome
Global Python Global Positioning
GPS stands for? Positioning Practice Positioning
System System
System Strategy System
Which of the following Uninstalling
System Hardware Uninstalling Web
does not result in the Human Error Web
Malfunction Theft Browser
loss of data? Browser
Refers to the
A
What do you mean by database
A name for its metaphor A metaphor A metaphor for the
‘cloud’ in cloud management
algorithm for the for storage Internet
computing? of a cloud
Internet
server
Another name for a Virtual Network
Packet Sniffer Bot Bot
zombie computer is: Computer System
The term
‘cybersecurity’ was 1988 1969 1995 1971 1988
coined in which year?
Anti-
Operating A type of
What is SPAMfighter? Antivirus Spamming Anti-Spamming Tool
System Spam mail
Tool
Which of the following
Symmetric Asymmetric Decryptio None of the
is also known as ‘public Asymmetric Encryption
Encryption Encryption n above
key encryption’?
Installing Using a
The security of the OS Using Managing
multiple web firewall to Installing multiple web
(operating system) legitimate user
browsers to filter browsers to access
cannot be enhanced antivirus accounts
access network Internet
by: software securely
Internet traffic
Businesses derive
greater flexibility and
Communi Hybrid Class
enhanced data Private Cloud Public Cloud Hybrid Class Cloud
ty Cloud Cloud
deployment options by
using________.
Personal Part Professional
Personal Data Personal Digital
What are PDAs? Digital Design Diary
Assistants Assistants
Assistants Approvals Accessories
How many types of
social networking Two Five Four Three Three
services are there?
Sending
Deliberately
Online or
communicating
The Practice of sexting harassment by receiving None of the Sending or receiving
hostile
involves: stalkers and sexually above sexually explicit material
information
other threats explicit
about others
material
An act of
A hidden A network of A network
monitorin A network of infected
A Botnet is: computer infected of ethical
g without computers
networks computers hackers
consent
Data is referred as a Explicit and Facts and
Information Pixels Facts and figures
collection of: implicit data figures
MobiShield is a mobile
Windows
antivirus for which Android Symbian iOS iOS
Mobile
operating system?
A technique in
which a
system
security A technique in which a
mechanism is An encryption An Anti- system security
None of the
Backdoor refers to: bypassed algorithm for spamming mechanism is bypassed
above
without securing files tool without detection to
detection to access computer data.
access
computer
data

You might also like