NPTEL-1

NPTEL-1

University

40 Qs

quiz-placeholder

Similar activities

SIMKOMDIG

SIMKOMDIG

KG - University

40 Qs

IP MIDTERM

IP MIDTERM

University

45 Qs

Arsitektur Komputer

Arsitektur Komputer

University

40 Qs

Introduction to Multimedia

Introduction to Multimedia

University

45 Qs

1sm2. UT5. Periféricos de entrada (2)

1sm2. UT5. Periféricos de entrada (2)

University

39 Qs

Câu hỏi trắc nghiệm về thông tin

Câu hỏi trắc nghiệm về thông tin

4th Grade - University

36 Qs

Ôn Tập Chuong III - Tin 11

Ôn Tập Chuong III - Tin 11

6th Grade - University

40 Qs

Topic 1 Introduction to Computer System

Topic 1 Introduction to Computer System

University

40 Qs

NPTEL-1

NPTEL-1

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

N.ILAYARAJA IT

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

How do spear-phishing attacks differ from general phishing attacks?

They use only phone calls as a medium
They are randomly sent to thousands of people
They target specific individuals with personalized messages
They do not involve malware at all

Answer explanation

Jupiter is a gas giant made primarily of hydrogen and helium. Unlike terrestrial planets that have solid surfaces, gas giants like Jupiter don't have a well-defined solid surface, allowing them to accumulate more mass in a gaseous form. This composition has allowed Jupiter to grow significantly larger than planets with solid surfaces.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

What does ransomware typically do to a victim’s files?

Deletes them permanently
Encrypts them to prevent access
Transfers them to another device
Makes them publicly available online

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Which of the following are examples of systems protected under Critical Infrastructure Protection (CIP)?

Gaming consoles and home Wi-Fi routers
SCADA systems, Industrial Control Systems (ICS), and operational technology
Social media networks and entertainment apps
Educational platforms and student databases

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

_______________ is the protection of information assets that use, store, or transmit information through the application of policy, education, and technology.

Network Security
Operations Security
Communications Security
Information Security

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_______ is the property of information that describes how data is whole, complete, and uncorrupted.

Integrity
Availability
Confidentiality
Accuracy

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

To protect the confidentiality of information, which of the following measures can be taken:

Information classification
Secure document storage
Application of general security policies
All the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of cybersecurity, how can technology act as a source of threat?

It includes tools that can attack other networks
It increases internet traffic for organizations
It automates routine business operations
Through software that prevents users from sharing information

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?