
NPTEL-1
Authored by N.ILAYARAJA IT
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
How do spear-phishing attacks differ from general phishing attacks?
They use only phone calls as a medium
They are randomly sent to thousands of people
They target specific individuals with personalized messages
They do not involve malware at all
Answer explanation
Jupiter is a gas giant made primarily of hydrogen and helium. Unlike terrestrial planets that have solid surfaces, gas giants like Jupiter don't have a well-defined solid surface, allowing them to accumulate more mass in a gaseous form. This composition has allowed Jupiter to grow significantly larger than planets with solid surfaces.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What does ransomware typically do to a victim’s files?
Deletes them permanently
Encrypts them to prevent access
Transfers them to another device
Makes them publicly available online
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following are examples of systems protected under Critical Infrastructure Protection (CIP)?
Gaming consoles and home Wi-Fi routers
SCADA systems, Industrial Control Systems (ICS), and operational technology
Social media networks and entertainment apps
Educational platforms and student databases
4.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
_______________ is the protection of information assets that use, store, or transmit information through the application of policy, education, and technology.
Network Security
Operations Security
Communications Security
Information Security
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
_______ is the property of information that describes how data is whole, complete, and uncorrupted.
Integrity
Availability
Confidentiality
Accuracy
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
To protect the confidentiality of information, which of the following measures can be taken:
Information classification
Secure document storage
Application of general security policies
All the above
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the context of cybersecurity, how can technology act as a source of threat?
It includes tools that can attack other networks
It increases internet traffic for organizations
It automates routine business operations
Through software that prevents users from sharing information
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?