2Week VirtualTraining on Cyber Security for Women Govt Officials

2Week VirtualTraining on Cyber Security for Women Govt Officials

Professional Development

20 Qs

quiz-placeholder

Similar activities

AI-102 (Modules-1,2,3)

AI-102 (Modules-1,2,3)

Professional Development

15 Qs

Exploring Computer Networks & The Internet

Exploring Computer Networks & The Internet

Professional Development

15 Qs

IP Addressing

IP Addressing

Professional Development

20 Qs

Cybersecurity Scenarios Quiz

Cybersecurity Scenarios Quiz

Professional Development

25 Qs

Networking Basics and Administration

Networking Basics and Administration

Professional Development

20 Qs

Cyber Security_FA-1

Cyber Security_FA-1

Professional Development

20 Qs

4.5 Identity and Access Management Quiz

4.5 Identity and Access Management Quiz

Professional Development

20 Qs

AI Terms Quiz

AI Terms Quiz

Professional Development

15 Qs

2Week VirtualTraining on Cyber Security for Women Govt Officials

2Week VirtualTraining on Cyber Security for Women Govt Officials

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

CDAC NOIDA

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of Cyber Security?

To prevent unauthorized access to systems and data

To improve website speed

To reduce the cost of software licenses

To increase internet connectivity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym "CIA" stand for in the context of cybersecurity?

Computer, Information, Analysis

Confidentiality, Integrity, Availability

Cyber, Identity, Access

Communication, Internet, Application

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common type of cyberattack?

Phishing

Malware

Social engineering

website performance

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step you should take if you suspect your email account has been hacked?

Change your password immediately

Ignore it, it's probably a false alarm

Contact your bank to report the incident

Delete all suspicious emails

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below benefits of cyber security is not true?

  1. System getting slower

  1. Computer lagging and crashes

  1. provide privacy to users

  1. Secures system against viruses 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below is a hacking technique in which cybercriminals create fictitious web pages or domains to deceive or obtain more traffic?

  1. Pharming

  1. Mimicking

  1. Spamming

  1. Website-Duplication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the below does not qualify as a form of peer-to-peer cybercrime?

  1. Trojans are implanted into a targeted device.

  1. On the deep web, payment information is leaked.

Dos

Phishing

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?