O Level Online Exam
Menu mobile
Home
MCQ Topic Wise
INFORMATION TECHNOLOGY TOOLS AND NETWORK BASIS
New
WEB DESIGNING AND PUBLISHING
New
PROGRAMMING AND PROBLEM SOLVING THROUGH PYTHON
New
INTERNET OF THINGS AND ITS APPLICATIONS
New
Online Mock Test
INFORMATION TECHNOLOGY TOOLS AND NETWORK BASIS
New
WEB DESIGNING AND PUBLISHING
New
PROGRAMMING AND PROBLEM SOLVING THROUGH PYTHON
New
INTERNET OF THINGS AND ITS APPLICATIONS
New
Old Papers
Practical Questions
Projects
True/False Questions : SECURITY AND FUTURE OF IOT ECOSYSTEM For NIELIT O Level Exam
SECURITY AND FUTURE OF IOT ECOSYSTEM For NIELIT O Level Exam
00:00:00
English
Hindi
Question No# :
01
out of 18
Report Bug
Bitcoin is the first distributed blockchain implementation
Bitcoin is the first distributed blockchain implementation
A.
TRUE
B.
FALSE
Question No# :
02
out of 18
Report Bug
Trojan Horse are very similar to virus in that they are computer programs that replicate copies of themselves
Trojan Horse are very similar to virus in that they are computer programs that replicate copies of themselves
A.
TRUE
B.
FALSE
Question No# :
03
out of 18
Report Bug
Cryptocurrency is a digital currency that uses encryption techniques to verify and secure transaction
A.
TRUE
B.
FALSE
Question No# :
04
out of 18
Report Bug
Firewall is hardware or software designed to keep network hackers out
A.
TRUE
B.
FALSE
Question No# :
05
out of 18
Report Bug
Password is the method of Authentication, Confidentiality, Integrity and availability are basic requirements of Internet security
Password is the method of Authentication, Confidentiality, Integrity and availability are basic requirements of Internet security
A.
TRUE
B.
FALSE
Question No# :
06
out of 18
Report Bug
IP cameras are frequently targeted IoT devices
A.
TRUE
B.
FALSE
Question No# :
07
out of 18
Report Bug
Hashing algorithms are referred to as one way hashes
A.
TRUE
B.
FALSE
Question No# :
08
out of 18
Report Bug
In blockchain, each block is linked backward to the previous block
In blockchain, each block is linked backward to the previous block
A.
TRUE
B.
FALSE
Question No# :
09
out of 18
Report Bug
Firewalls cannot protect against viruses
A.
TRUE
B.
FALSE
Question No# :
10
out of 18
Report Bug
Default or hardcoded password can be misused by hackers
A.
TRUE
B.
FALSE
Question No# :
11
out of 18
Report Bug
Signature algorithms are used to create digital signatures
A.
TRUE
B.
FALSE
Question No# :
12
out of 18
Report Bug
You cannot access your data from any computer in the world, as long as you have an internet connection
A.
TRUE
B.
FALSE
Question No# :
13
out of 18
Report Bug
Password is the method of authentication
A.
TRUE
B.
FALSE
Question No# :
14
out of 18
Report Bug
Compared to supervised learning, unsupervised learning operates upon only the input data without outputs or target variables
A.
TRUE
B.
FALSE
Question No# :
15
out of 18
Report Bug
Mirai botnet attack was originated from IoT cameras
A.
TRUE
B.
FALSE
Question No# :
16
out of 18
Report Bug
Mirai botnet attack was originated from IoT cameras
A.
TRUE
B.
FALSE
Question No# :
17
out of 18
Report Bug
Blockchain is growing list of records, called blocks, which are linked using cryptography
A.
TRUE
B.
FALSE
Question No# :
18
out of 18
Report Bug
DNS spoofing attack is either for their own personal gain or to spread malware
A.
TRUE
B.
FALSE
CCC Online Test
Python Programming Tutorials
Best Computer Training Institute in Prayagraj (Allahabad)
Online Exam Quiz
O Level NIELIT Study material and Quiz
Bank SSC Railway TET UPTET Question Bank
career counselling in allahabad
Best Website and Software Company in Allahabad
Website development Company in Allahabad