Cyber Jagrooktha 2023 Quiz Round1

Cyber Jagrooktha 2023 Quiz Round1

University

20 Qs

quiz-placeholder

Similar activities

PHP - Functions & Arrays- Surprise Test 1

PHP - Functions & Arrays- Surprise Test 1

University

23 Qs

Cyber Security @ Workplace

Cyber Security @ Workplace

KG - Professional Development

20 Qs

Hackers?

Hackers?

University

20 Qs

Average level

Average level

University

15 Qs

Cyber Security (OE)

Cyber Security (OE)

University

15 Qs

Kuis 1

Kuis 1

University

17 Qs

Living in the IT Era - Q1

Living in the IT Era - Q1

University

15 Qs

Lesson 5 - Internet Threats

Lesson 5 - Internet Threats

University

15 Qs

Cyber Jagrooktha 2023 Quiz Round1

Cyber Jagrooktha 2023 Quiz Round1

Assessment

Quiz

Computers

University

Hard

Created by

Karthika IT

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the full form of "MALWARE"?

Multipurpose software

Malicious software        

Malfunctional software

Malfunctional Security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of cyber security?

Network security

Cloud security

Application security

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered as the unsolicited commercial email?

Virus

Malware

Spam

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Code Red is a sort of a ----------

Video Editing Software

Computer Virus

Photo Editing Software

Antivirus Program

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following do cyber attackers commonly target for fetching IP address of a target of victim user?

IP tracker

E-mail

Websites

Web pages

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an antivirus program?

Kaspersky

Quick heals

MCafee

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems networks or their associated information?

Cyber-attack     

Computer Security

Cryptography

Digital hacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?