2Week VirtualTraining on Cyber Security for Women Govt Officials

2Week VirtualTraining on Cyber Security for Women Govt Officials

Professional Development

20 Qs

quiz-placeholder

Similar activities

Week 20 Quizzz

Week 20 Quizzz

Professional Development

15 Qs

Network+ 802.11, cellular, vpn

Network+ 802.11, cellular, vpn

Professional Development

23 Qs

Q1: DATABASE SYSTEM

Q1: DATABASE SYSTEM

Professional Development

18 Qs

CyberSecurity Training-Quiz

CyberSecurity Training-Quiz

Professional Development

19 Qs

CSF-PT05Q1

CSF-PT05Q1

Professional Development

15 Qs

DIGITAL INITIATIVES IN EDUCATION

DIGITAL INITIATIVES IN EDUCATION

Professional Development

15 Qs

Frontend - CTO Cup

Frontend - CTO Cup

Professional Development

20 Qs

2Week VirtualTraining on Cyber Security for Women Govt Officials

2Week VirtualTraining on Cyber Security for Women Govt Officials

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

CDAC NOIDA

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of Cyber Security?

To prevent unauthorized access to systems and data

To improve website speed

To reduce the cost of software licenses

To increase internet connectivity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym "CIA" stand for in the context of cybersecurity?

Computer, Information, Analysis

Confidentiality, Integrity, Availability

Cyber, Identity, Access

Communication, Internet, Application

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common type of cyberattack?

Phishing

Malware

Social engineering

website performance

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step you should take if you suspect your email account has been hacked?

Change your password immediately

Ignore it, it's probably a false alarm

Contact your bank to report the incident

Delete all suspicious emails

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below benefits of cyber security is not true?

  1. System getting slower

  1. Computer lagging and crashes

  1. provide privacy to users

  1. Secures system against viruses 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below is a hacking technique in which cybercriminals create fictitious web pages or domains to deceive or obtain more traffic?

  1. Pharming

  1. Mimicking

  1. Spamming

  1. Website-Duplication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below does not qualify as a form of peer-to-peer cybercrime?

  1. Trojans are implanted into a targeted device.

  1. On the deep web, payment information is leaked.

Dos

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?