Skip to main content

IT Quiz


Q. 1. The term used to describe an email that is targeting a specific person is known as

(A) Spam

(B) Phishing

(c) Vishing

(D) Spear phishing

 

Q. 2. Machine learning is a subset of which of the following.

(A) Deep learning

(B) Data learning

(C) Artificial intelligence

(D) None of the above


Q. 3. What is the term used when a cybercriminal sends a fraudulent email disguised as being from a legitimate, trusted source?

(A) Trojan

(B) vishing

(C) Phishing

(D) backdoor

 

Q. 4. Who is the father of Machine Learning?

(A) Geoffrey Everest Hinton

(B) Howard Hinton

(C) George Everest

(D) Colin Clarkf

 

Q. 5.Personal Identifiable Information (PII) is used to distinguish one person from another and verify your identity. Which of the following is an example of PII?

(A) ID Number

(B) Date of Birth

(C) Home Address

(D) All of the answers are correct

 

Q. 6.Who is responsible for information security within your company?

(A) IT Security Department

(B) Everyone in the Company

(C) IT Department

(D) Top Management

 

Q. 7. Tailgating is a form of social engineering that allows hackers to:

(A) Watch company’s main gate

(B) Get unauthorized access to restricted area

(C) Watch employees as they leave gates

(D) Follow employee after work

 

Q. 8. Which one of the following can protect a computer from the risk of unwanted emails?

(A) Anti-Spam Software

(B) Anti-Virus Software

(C) Anti-Spyware Software

(D) PC Diagnostic Software


Q. 9. If you want to share a password with someone, what's the best option?

(A) Tell it via the phone

(B) Send a text message

(C) Send it via email

(D) None of the above

 

Q. 10. Which one of the following describes why firewalls are used?

(A) To prevent unauthorised access by incoming transmissions.

(B) To prevent destruction of a computer in the event of a fire.

(C) To enable easy downloading of data from web sites

(D) To detect and disable viruses already on a computer.



Answers


Q.1. Answer: D

Notes: Spear phishing is a phishing method that targets specific persons or targets.

Spear Phishing occurs when a malicious party obtains information about the targeted individuals from websites or social networking sites and customize a phishing scheme to them


Q.2. Answer: C

Notes: Deep learning is a subset of machine learning, and machine learning is a subset of Artificial Intelligence.


Q.3. Answer: C

Notes: Phishing is an email used by cybercriminals who create fraudulent messages that are meant to lure a user into either revealing sensitive or confidential information or installing malware.


Q.4. Answer: A

Notes: Geoffrey Everest Hinton is the father of Machine Learning.


Q.5. Answer: D

Notes: Personally identifiable information (PII) is any data that is used to identify a specific individual. All information that directly or indirectly links to a person is considered PII. One's name, email address, phone number, bank account number, and government-issued ID number are all examples of PII.


Q.6. Answer: B

Notes: Everyone bears the responsibility for information security in an organization?


Q.7. Answer: B

Notes: In information security, tailgating is a social engineering technique used by hackers to deceive organization's officials through direct speech or actions in order to gain access into restricted areas. An example of tailgating is when one person tags along with an authorized employee to access a building or pass a certain checkpoint.


Q.8. Answer: A

Notes: Anti-Spam Software has the potential of protecting your computer from the risk of unwanted emails.


Q.9. Answer: D

Notes: A password is personal data which shouldn't be shared with others.


Q.9. Answer: A

Notes: Firewalls are used to prevent unauthorised access by incoming transmissions.




Comments

Popular posts from this blog

Muhammad Shah Rangila

Aurangzeb, the last great Mughal emperor, died in 1707. Muhammad Shah became Mughal emperor in 1719. During the interregnum, Bahadur Shah I , Jahandar Shah, Farrukhsiyar, Rafi-ud-Darajat and Rafi-ud-Daula ascended the Mughal throne. Jahandar Shah was murdered on the orders of Farrukhsiyar who had the support of the two powerful Mughal nobles Sayyid Abdullah and his brother Sayyid Husain Ali at that time. They are famous in history as Sayyid brothers, the King-makers. In 1719, Farrukhsiyar were murdered in utter disregard of a Mughal emperor by Sayyid brothers. Rafi-ud-Darajat died of consumption in a few months. Rafi-ud-Daula was addicted to opium and died in 4 months. Sayyid brothers now chose Raushan Akhtar, a son of Jahan Shah (the fourth son of Bahadur Shah I), to be the emperor. Raushan Akhtar ascended the throne under the title of Muhamamd Shah in September 1719. In the beginning Muhammad Shah was a puppet in the hands of Sayyid brothers who soon began to lose their gri...

Sanskrit Books and Authors in Ancient India

  Books Authors Abhigyan Shakuntalam (Recognition of Shakuntala) Kalidasa Aihole Prasasti Ravikirti Amarakosha   Amarasimha   Arthashastra Kautilya Ashtadhyayi   Panini Bhattikavya Bhatti Brihat Samhita   Varahamihira Buddhacharita   Asvaghosa   Charaka Samhita ( Compendium of Charaka ) Charaka Devichandraguptam   Vishakhadatta Gita Govinda  ( Song of the Cowherd) Jayadeva Gatha Saptashati Hala Lilavati   Bhaskara II   Hammira Mahakavya   Nayachandra Suri Janakiharana   ( Janaki's abduction) Kumaradasa   Kama Sutra Vatsyayana ...

Turkan-i-Chahalgani, the Group of Forty

Amir-i-Chahalgani, known variously as Turkan-i-Chahalgani and Chalisa (The Forty), was a group of 40 faithful slaves which came into existence with the task of protecting Shamsuddin Iltutmish , the third Slave Sultan of Delhi Sultanate. The idea to form the group was taken by him when he came to realize that Turkish nobles cannot be trusted and could be a threat to his rule. With the passage of time the group went on to become very influential and powerful. Though Iltutmish succeeded in keeping the group under control, after his rule they became notorious and intrigued against nearly all his successors.  The Forty acquired domination on the affairs of the state so much so that no ruler could defy them. Without their support it was utterly out of questions for the rulers to win the battle for succession. The members of this Turkish nobility used to appropriate all the offices of the state to themselves. Some of the rulers of the Slave dynasty after Iltutmish were murdered by these s...