Breaking Updates

Module 4 : Cyber Security (ITI COPA)

ITI COPA TRADE : आपके ITI COPA की परीक्षा जल्द ही होने वाली है इसलिए ये बहुविकल्पीय प्रश्न आपके लिए अत्यंत महत्वपूर्ण सिद्ध होंगे | आज की इस पोस्ट में आपको ITI COPA के Module 5 से सम्बंधित सभी प्रश्नों को यहाँ दिया गया है | जिससे आपके एग्जाम की अच्छी तैयारी हो जायेगी |

नमस्कार दोस्तों 🙏 , स्वागत हैं आपका हमारी वेबसाइट "ज्ञान और शिक्षा" में |

Question Level - 1

Q1. When the Indian Parliament passed the IT Act ?
  1. 1990
  2. 1992
  3. 2000
  4. 2005
C

Q2. What is the full form of LDAP ?
  1. Light Weight Directory Access Provider
  2. Light Weight Directory Access Protocol
  3. Light Weight Directory Access Program
  4. Light Weight Directory Access Protection
B

Q3. What is called the collective terms of malicious software, such as viruses, worms and trojans ?
  1. Spam
  2. Phishing
  3. Malware
  4. Harm
C

Q4. What is called protecting data from online attacks, deletions, malwares ?
  1. Physical security
  2. Cyber security
  3. Cyber attack
  4. Virus
B

Q5. What is called the protection of information and data from unauthorized Access ?
  1. Physical security
  2. Link security
  3. Risk management
  4. Information security
D

Q6. What is the full form of CIA under information security ?
  1. Confidentiality integrity Availability
  2. Criminal investigation agency
  3. Cost information agency
  4. Credit integrity assement
A


Q7. What is called periodic assessment of security vulnerability in computer system ?
  1. Threat
  2. Attack
  3. Hacking
  4. Security audit
D

Q8. What is called a single point of access for several networking services ?
  1. Phishing
  2. Webservice
  3. Directory service
  4. Worms
C

Q9. Which activities endanger the sovereignty and integrity of nation ?
  1. Cyber Terrorism
  2. Cyber Vandalism
  3. Cyber squatting
  4. Carding
A

Q10. Which crime involves the use of computer networks to create, distribute or access materials that sexually expoit underage persons ?
  1. Assault by Threat
  2. Cyber squatting
  3. Cyber vandalism
  4. Child pornography
D

Q11. What is called the unauthorized control / access over the computer system and destroys the data ?
  1. Defamation
  2. Carding
  3. Hacking
  4. Cyber - stalking
C

Q12. Which method go through all the files or network elements with an intention to detect something unusual ?
  1. Probing
  2. Phishing
  3. Infecting
  4. Scanning
D



Thank You
for any further Information Please Comment.
(किसी भी अन्य जानकारी के लिए, कृपया कमेंट जरूर करें |)

Post Comment

No comments

Give your valuable comments. Your Comments is very important for us. ❤ Thank You..❤