Breaking Updates

Module 4 : Cyber Security (ITI COPA)

ITI COPA TRADE : आपके ITI COPA की परीक्षा जल्द ही होने वाली है इसलिए ये बहुविकल्पीय प्रश्न आपके लिए अत्यंत महत्वपूर्ण सिद्ध होंगे | आज की इस पोस्ट में आपको ITI COPA के Module 5 से सम्बंधित सभी प्रश्नों को यहाँ दिया गया है | जिससे आपके एग्जाम की अच्छी तैयारी हो जायेगी |

    नमस्कार दोस्तों 🙏 , स्वागत हैं आपका हमारी वेबसाइट "ज्ञान और शिक्षा" में |

    Question Level - 1

    Q1. When the Indian Parliament passed the IT Act ?
    1. 1990
    2. 1992
    3. 2000
    4. 2005
    C

    Q2. What is the full form of LDAP ?
    1. Light Weight Directory Access Provider
    2. Light Weight Directory Access Protocol
    3. Light Weight Directory Access Program
    4. Light Weight Directory Access Protection
    B

    Q3. What is called the collective terms of malicious software, such as viruses, worms and trojans ?
    1. Spam
    2. Phishing
    3. Malware
    4. Harm
    C

    Q4. What is called protecting data from online attacks, deletions, malwares ?
    1. Physical security
    2. Cyber security
    3. Cyber attack
    4. Virus
    B

    Q5. What is called the protection of information and data from unauthorized Access ?
    1. Physical security
    2. Link security
    3. Risk management
    4. Information security
    D

    Q6. What is the full form of CIA under information security ?
    1. Confidentiality integrity Availability
    2. Criminal investigation agency
    3. Cost information agency
    4. Credit integrity assement
    A


    Q7. What is called periodic assessment of security vulnerability in computer system ?
    1. Threat
    2. Attack
    3. Hacking
    4. Security audit
    D

    Q8. What is called a single point of access for several networking services ?
    1. Phishing
    2. Webservice
    3. Directory service
    4. Worms
    C

    Q9. Which activities endanger the sovereignty and integrity of nation ?
    1. Cyber Terrorism
    2. Cyber Vandalism
    3. Cyber squatting
    4. Carding
    A

    Q10. Which crime involves the use of computer networks to create, distribute or access materials that sexually expoit underage persons ?
    1. Assault by Threat
    2. Cyber squatting
    3. Cyber vandalism
    4. Child pornography
    D

    Q11. What is called the unauthorized control / access over the computer system and destroys the data ?
    1. Defamation
    2. Carding
    3. Hacking
    4. Cyber - stalking
    C

    Q12. Which method go through all the files or network elements with an intention to detect something unusual ?
    1. Probing
    2. Phishing
    3. Infecting
    4. Scanning
    D



    Thank You
    for any further Information Please Comment.
    (किसी भी अन्य जानकारी के लिए, कृपया कमेंट जरूर करें |)

    No comments

    Give your valuable comments. Your Comments is very important for us. ❤ Thank You..❤