Search Header Logo

NPTEL-1

Authored by N.ILAYARAJA IT

Computers

University

Used 1+ times

NPTEL-1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

How do spear-phishing attacks differ from general phishing attacks?

They use only phone calls as a medium
They are randomly sent to thousands of people
They target specific individuals with personalized messages
They do not involve malware at all

Answer explanation

Jupiter is a gas giant made primarily of hydrogen and helium. Unlike terrestrial planets that have solid surfaces, gas giants like Jupiter don't have a well-defined solid surface, allowing them to accumulate more mass in a gaseous form. This composition has allowed Jupiter to grow significantly larger than planets with solid surfaces.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

What does ransomware typically do to a victim’s files?

Deletes them permanently
Encrypts them to prevent access
Transfers them to another device
Makes them publicly available online

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Which of the following are examples of systems protected under Critical Infrastructure Protection (CIP)?

Gaming consoles and home Wi-Fi routers
SCADA systems, Industrial Control Systems (ICS), and operational technology
Social media networks and entertainment apps
Educational platforms and student databases

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

_______________ is the protection of information assets that use, store, or transmit information through the application of policy, education, and technology.

Network Security
Operations Security
Communications Security
Information Security

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_______ is the property of information that describes how data is whole, complete, and uncorrupted.

Integrity
Availability
Confidentiality
Accuracy

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

To protect the confidentiality of information, which of the following measures can be taken:

Information classification
Secure document storage
Application of general security policies
All the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of cybersecurity, how can technology act as a source of threat?

It includes tools that can attack other networks
It increases internet traffic for organizations
It automates routine business operations
Through software that prevents users from sharing information

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?