top of page

Overview of Future skills and Cyber Security MCQ

Writer: Rajesh SinghRajesh Singh

Q1. Secret key encryption is known as.....

A.      Secret encryption

B.      Private encryption

C.      Symmetric encryption

D.      Asymmentric encryption

Ans: C

 Q2.Which type of cloud deployments is used to serve multiple users not a single customer?

A.      Private cloud

B.      Public cloud

C.      Both A & B

D.      Hybrid cloud

Ans: B

 Q3. Unsolicited commercial email is known as

A.      Spam

B.      Malware

C.      Virus

D.      Spyware

Ans: A

Q4. Which of the following principle is violated if computer system is not?

A.      Confidentiality

B.      Availability

C.      Access Control

D.      Authentication

Ans: B

Q5. Unauthorized access is a network has which type issue

A.      Performance

B.      Reliability

C.      Security

D.      All of Above

Ans: C

Q6. Big data is used in

A.      Government

B.      Healthcare

C.      Banking

D.      All of Above

Ans: D

Q7. Which object to be controlled remotely across existing network infrastructure?

A.      Future Skills

B.      IOT

C.      Cloud Computing

D.      None of Above

Ans: C

 
 
 

Recent Posts

See All

IT Tools and Network Basics MCQ

Q1. Presentation file created in LibreOffice Impress is saved with the extension….   लिब्रे ऑफिस इंप्रेस में बनाई गई प्रेजेंटेशन फ़ाइल...

What is an electronic mail?

Electronic mail is known as e-mail. E-mail is a simple ways to send and receive a message or letter from one person to other person. With...

Commentaires


bottom of page