2Week VirtualTraining on Cyber Security for Women Govt Officials

2Week VirtualTraining on Cyber Security for Women Govt Officials

Professional Development

20 Qs

quiz-placeholder

Similar activities

CyberSecurity Training-Quiz

CyberSecurity Training-Quiz

Professional Development

19 Qs

Cybersecurity Core Functions

Cybersecurity Core Functions

Professional Development

15 Qs

CB-Quiz On AWS_IAM USER

CB-Quiz On AWS_IAM USER

Professional Development

20 Qs

CSS National Training TechPro Class 1

CSS National Training TechPro Class 1

Professional Development

15 Qs

Exploring Computer Networks & The Internet

Exploring Computer Networks & The Internet

Professional Development

15 Qs

Chapter 10: Incident Detection and Analysis

Chapter 10: Incident Detection and Analysis

Professional Development

20 Qs

2Week VirtualTraining on Cyber Security for Women Govt Officials

2Week VirtualTraining on Cyber Security for Women Govt Officials

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

CDAC NOIDA

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of Cyber Security?

To prevent unauthorized access to systems and data

To improve website speed

To reduce the cost of software licenses

To increase internet connectivity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym "CIA" stand for in the context of cybersecurity?

Computer, Information, Analysis

Confidentiality, Integrity, Availability

Cyber, Identity, Access

Communication, Internet, Application

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common type of cyberattack?

Phishing

Malware

Social engineering

website performance

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step you should take if you suspect your email account has been hacked?

Change your password immediately

Ignore it, it's probably a false alarm

Contact your bank to report the incident

Delete all suspicious emails

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below benefits of cyber security is not true?

  1. System getting slower

  1. Computer lagging and crashes

  1. provide privacy to users

  1. Secures system against viruses 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below is a hacking technique in which cybercriminals create fictitious web pages or domains to deceive or obtain more traffic?

  1. Pharming

  1. Mimicking

  1. Spamming

  1. Website-Duplication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below does not qualify as a form of peer-to-peer cybercrime?

  1. Trojans are implanted into a targeted device.

  1. On the deep web, payment information is leaked.

Dos

Phishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?