2Week VirtualTraining on Cyber Security for Women Govt Officials

2Week VirtualTraining on Cyber Security for Women Govt Officials

Professional Development

20 Qs

quiz-placeholder

Similar activities

Computer Hardware Quiz

Computer Hardware Quiz

Professional Development

20 Qs

Drilling Quiz AEM

Drilling Quiz AEM

Professional Development

15 Qs

svsvs

svsvs

Professional Development

20 Qs

TIK Kontemporer

TIK Kontemporer

Professional Development

15 Qs

Pre-test CEH v13

Pre-test CEH v13

Professional Development

15 Qs

HyQuizz_Mùa 3_Day 1

HyQuizz_Mùa 3_Day 1

Professional Development

15 Qs

FOS Quiz 1

FOS Quiz 1

Professional Development

15 Qs

Código ASCII

Código ASCII

Professional Development

18 Qs

2Week VirtualTraining on Cyber Security for Women Govt Officials

2Week VirtualTraining on Cyber Security for Women Govt Officials

Assessment

Quiz

Information Technology (IT)

Professional Development

Practice Problem

Hard

Created by

CDAC NOIDA

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of Cyber Security?

To prevent unauthorized access to systems and data

To improve website speed

To reduce the cost of software licenses

To increase internet connectivity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym "CIA" stand for in the context of cybersecurity?

Computer, Information, Analysis

Confidentiality, Integrity, Availability

Cyber, Identity, Access

Communication, Internet, Application

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common type of cyberattack?

Phishing

Malware

Social engineering

website performance

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step you should take if you suspect your email account has been hacked?

Change your password immediately

Ignore it, it's probably a false alarm

Contact your bank to report the incident

Delete all suspicious emails

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below benefits of cyber security is not true?

  1. System getting slower

  1. Computer lagging and crashes

  1. provide privacy to users

  1. Secures system against viruses 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below is a hacking technique in which cybercriminals create fictitious web pages or domains to deceive or obtain more traffic?

  1. Pharming

  1. Mimicking

  1. Spamming

  1. Website-Duplication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below does not qualify as a form of peer-to-peer cybercrime?

  1. Trojans are implanted into a targeted device.

  1. On the deep web, payment information is leaked.

Dos

Phishing

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?