Q1. Secret key encryption is known as.....
A. Secret encryption
B. Private encryption
C. Symmetric encryption
D. Asymmentric encryption
Ans: C
Q2.Which type of cloud deployments is used to serve multiple users not a single customer?
A. Private cloud
B. Public cloud
C. Both A & B
D. Hybrid cloud
Ans: B
Q3. Unsolicited commercial email is known as
A. Spam
B. Malware
C. Virus
D. Spyware
Ans: A
Q4. Which of the following principle is violated if computer system is not?
A. Confidentiality
B. Availability
C. Access Control
D. Authentication
Ans: B
Q5. Unauthorized access is a network has which type issue
A. Performance
B. Reliability
C. Security
D. All of Above
Ans: C
Q6. Big data is used in
A. Government
B. Healthcare
C. Banking
D. All of Above
Ans: D
Q7. Which object to be controlled remotely across existing network infrastructure?
A. Future Skills
B. IOT
C. Cloud Computing
D. None of Above
Ans: C
Commentaires