Search Header Logo

2Week VirtualTraining on Cyber Security for Women Govt Officials

Authored by CDAC NOIDA

Information Technology (IT)

Professional Development

Used 3+ times

2Week VirtualTraining on Cyber Security for Women Govt Officials
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of Cyber Security?

To prevent unauthorized access to systems and data

To improve website speed

To reduce the cost of software licenses

To increase internet connectivity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym "CIA" stand for in the context of cybersecurity?

Computer, Information, Analysis

Confidentiality, Integrity, Availability

Cyber, Identity, Access

Communication, Internet, Application

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common type of cyberattack?

Phishing

Malware

Social engineering

website performance

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step you should take if you suspect your email account has been hacked?

Change your password immediately

Ignore it, it's probably a false alarm

Contact your bank to report the incident

Delete all suspicious emails

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below benefits of cyber security is not true?

  1. System getting slower

  1. Computer lagging and crashes

  1. provide privacy to users

  1. Secures system against viruses 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below is a hacking technique in which cybercriminals create fictitious web pages or domains to deceive or obtain more traffic?

  1. Pharming

  1. Mimicking

  1. Spamming

  1. Website-Duplication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below does not qualify as a form of peer-to-peer cybercrime?

  1. Trojans are implanted into a targeted device.

  1. On the deep web, payment information is leaked.

Dos

Phishing

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?