COPA Trade – SEMESTER 2, Module 5: Cyber Security
Common For Computer Related  & COPA Trade 1st Year.
Sign in to Google to save your progress. Learn more
NAME *
Captionless Image
NAME OF THE ITI *
Captionless Image
MOBILE NUMBER *
1. When the Indian parliament passed the IT Act? *
4 points
2. What is the full form of LDAP? *
4 points
3. What is called the collective terms of malicious software, such as viruses, worms and trojans? *
4 points
4. What is called protecting data from online attacks, deletions, malwares? *
4 points
5. What is called the protection of information and data from unauthorized Access? *
4 points
6. What is the full form of CIA under information security? *
4 points
7. What is called periodic assessment of security vulnerability in computer system? *
4 points
8. What is called a single point of access for several networking services? *
4 points
9. Which activities endanger the sovereignty and integrity of nation? *
4 points
10. Which crime involves the use of computer networks to create, distribute or access materials that sexually expoit underage persons? *
5 points
11. What is called the unauthorized control / acess over the computer system and destroys the data? *
4 points
12. Which method go through all the files or network elements with an intention to detect something unusual? *
5 points
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy