Module 4 : Cyber Security (ITI COPA)
ITI COPA TRADE : आपके ITI COPA की परीक्षा जल्द ही होने वाली है इसलिए ये बहुविकल्पीय प्रश्न आपके लिए अत्यंत महत्वपूर्ण सिद्ध होंगे | आज की इस पोस्ट में आपको ITI COPA के Module 5 से सम्बंधित सभी प्रश्नों को यहाँ दिया गया है | जिससे आपके एग्जाम की अच्छी तैयारी हो जायेगी |
Q2. What is the full form of LDAP ?
Q3. What is called the collective terms of malicious software, such as viruses, worms and trojans ?
Q4. What is called protecting data from online attacks, deletions, malwares ?
Q5. What is called the protection of information and data from unauthorized Access ?
Q6. What is the full form of CIA under information security ?
Q7. What is called periodic assessment of security vulnerability in computer system ?
Q8. What is called a single point of access for several networking services ?
Q9. Which activities endanger the sovereignty and integrity of nation ?
Q10. Which crime involves the use of computer networks to create, distribute or access materials that sexually expoit underage persons ?
Q11. What is called the unauthorized control / access over the computer system and destroys the data ?
Q12. Which method go through all the files or network elements with an intention to detect something unusual ?
नमस्कार दोस्तों 🙏 , स्वागत हैं आपका हमारी वेबसाइट "ज्ञान और शिक्षा" में |
Question Level - 1
Q1. When the Indian Parliament passed the IT Act ?- 1990
- 1992
- 2000
- 2005
C
Q2. What is the full form of LDAP ?
- Light Weight Directory Access Provider
- Light Weight Directory Access Protocol
- Light Weight Directory Access Program
- Light Weight Directory Access Protection
B
Q3. What is called the collective terms of malicious software, such as viruses, worms and trojans ?
- Spam
- Phishing
- Malware
- Harm
C
Q4. What is called protecting data from online attacks, deletions, malwares ?
- Physical security
- Cyber security
- Cyber attack
- Virus
B
Q5. What is called the protection of information and data from unauthorized Access ?
- Physical security
- Link security
- Risk management
- Information security
D
Q6. What is the full form of CIA under information security ?
- Confidentiality integrity Availability
- Criminal investigation agency
- Cost information agency
- Credit integrity assement
A
Q7. What is called periodic assessment of security vulnerability in computer system ?
- Threat
- Attack
- Hacking
- Security audit
D
Q8. What is called a single point of access for several networking services ?
- Phishing
- Webservice
- Directory service
- Worms
C
Q9. Which activities endanger the sovereignty and integrity of nation ?
- Cyber Terrorism
- Cyber Vandalism
- Cyber squatting
- Carding
A
Q10. Which crime involves the use of computer networks to create, distribute or access materials that sexually expoit underage persons ?
- Assault by Threat
- Cyber squatting
- Cyber vandalism
- Child pornography
D
Q11. What is called the unauthorized control / access over the computer system and destroys the data ?
- Defamation
- Carding
- Hacking
- Cyber - stalking
C
Q12. Which method go through all the files or network elements with an intention to detect something unusual ?
- Probing
- Phishing
- Infecting
- Scanning
D
Thank You
for any further Information Please Comment.
(किसी भी अन्य जानकारी के लिए, कृपया कमेंट जरूर करें |)
No comments
Give your valuable comments. Your Comments is very important for us. ❤ Thank You..❤