0% found this document useful (0 votes)
43 views26 pages

Practice Assessment

The document discusses cyber security topics including components of cyber security like the internet of things and attacks, objectives of network security, features of cryptography, types of cyber attacks, and tools used for maintaining cyber security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views26 pages

Practice Assessment

The document discusses cyber security topics including components of cyber security like the internet of things and attacks, objectives of network security, features of cryptography, types of cyber attacks, and tools used for maintaining cyber security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

IoT Cyber Security

1. Which of the following is a component of cyber security?


a. Internet Of Things
b. AI
c. Database
d. Attacks

2. Which of the following is an objective of network security?


a) Confidentiality
b) Integrity
c) Availability
d) All of the above

3. ________ is not feature of Cryptography


a) Confidentiality
b) Integrity
c) Authenticity
d) Automation

4. Governments hired some highly skilled hackers for providing cyber security for the
country or state. These types of hackers are termed as _______
a) Nation / State sponsored hackers
b) CIA triad
c) Special Hackers
d) Government Hackers

5. Which of the following act violates cyber security?


a) Exploit
b) Attack
c) Threat
d) Vulnerability

6. Which of the following actions compromise cyber security?

|
a) Vulnerability
b) Attack
c) Threat
d) Exploit

7. Which of the following is an internet scam done by cyber-criminals where the user
is convinced digitally to provide confidential information.
a) MiTM attack
b) Phishing attack
c) Website attack
d) DoS attack

8. Which of the following can be considered as the elements of cyber security?


a) Application Security
b) Operational Security
c) Network Security
d) All of the above
9. In Wi-Fi Security, which of the following protocol is more used?
a) WPA
b) WPA2
c) WPS
d) Both A and C
10. Full form of UTM in network security is _______
a) United threat management
b) Unified threat management
c) Unintended threat management
d) United terminal management

11. What is the existence of weakness in a system or network is known as?


a) Attack
b) Exploit
c) Vulnerability
d) Threat

12. Which of the following is a type of cyber-attack?


a) Phishing
b) SQL Injections
c) Password Attack
d) All of the above

13. What does cyber security protect?


a) Cyber security protects criminals
b) Cyber security protects internet-connected systems

Practice Assessment
c) Cyber security protects hackers
d) None of the mentioned

14. Which of the following is not a type of peer-to-peer cyber-crime?


a) Hacking
b) Injecting Trojans to a target victim
c) Credit card details leak in the deep web
d) Phishing
15. Which of the following is defined as an attempt to harm, damage or cause threat
to a system or network?
a) Digital crime
b) Threats
c) System hijacking
d) Cyber Attack

16. IT security in any firm or organization is maintained and handled by


____________________
a) Software Security Specialist
b) CEO of the organization
c) Security Auditor
d) IT Security Engineer

17. Which of the following DDoS in mobile systems wait for the owner to trigger the
cyber-attack?
a) botnets
b) programs
c) virus
d) worms

18. Which of the following is the least strong security encryption standard?
a) WPA3
b) WPA2
c) WPA
d) WEP

19. In the computer networks, the encryption techniques are primarily used for
improving the ________
a) Security
b) Performance
c) Reliability
d) Longevity

20. Which of the following is a type of cyber security?


a) Cloud Security

Practice Assessment
b) Network Security
c) Application Security
d) All of the above

21. _______ is not Components of a Threat


a) Capability
b) Threat catalysts
c) Threat amplifiers
d) Threat attenuator
22. To protect the computer system against hackers and different kinds of viruses,
one must always keep _________ on in the computer system.
a) CMD
b) Firewall
c) Vlc player
d) Script

23. Which of the following is a Stuxnet?


a) Trojan
b) Antivirus
c) Worm
d) Virus

24. Which one of the following can be considered as the class of computer threats?
a) Dos Attack
b) Phishing
c) Soliciting
d) Both A and C

25. Which of the following usually observe each activity on the internet of the victim,
gathers all information in the background, and sends it to someone else?
a) Malware
b) Spyware
c) Adware
d) All of the above

26. What is Cyber Security?


a) Cyber Security provides security against malware
b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber attacks
d) All of the mentioned

Practice Assessment
27. What does cyber security protect?
a) Cyber security protects criminals
b) Cyber security protects internet-connected systems
c) Cyber security protects hackers
d) None of the mentioned

28. Which of the following is not a cybercrime?


a) Denial of Service
b) Man in the Middle
c) Malware
d) AES

29 The full form of Malware is ________


a) Malfunctioned Software
b) Multipurpose Software
c) Malicious Software
d) Malfunctioning of Security

30. ____ is a code injecting method used for attacking the database of a system /
website.
a) HTML injection
b) SQL Injection
c) Malicious code injection
d) XML Injection
31. Which of this is an example of physical hacking?
a) Remote Unauthorized access
b) Inserting malware loaded USB to a system
c) SQL Injection on SQL vulnerable site
d) DDoS (Distributed Denial of Service) attack

32. These are a collective term for malicious spying programs used for secretly
monitoring someone’s activity and actions over a digital medium.
a) Malware
b) Remote Access Trojans
c) Keyloggers
d) Spyware

33. When you use the word _____ it means you are protecting your data from getting
disclosed.
a) Confidentiality
b) Integrity
c) Authentication
d) Availability

Practice Assessment
34. ______ means the protection of data from modification by unknown users.
a) Confidentiality
b) Integrity
c) Authentication
d) Non-repudiation

35. When integrity is lacking in a security system, _________ occurs.


a) Database hacking
b) Data deletion
c) Data tampering
d) Data leakage

36. This helps in identifying the origin of information and authentic user. This referred to
here as __________
a) Confidentiality
b) Integrity
c) Authenticity
d) Availability

37. Which of these is not a proper method of maintaining confidentiality?


a) Biometric verification
b) ID and password based verification
c) 2-factor authentication
d) switching off the phone

38. Data integrity gets compromised when _____ and _____ are taken control off.
a) Access control, file deletion
b) Network, file permission
c) Access control, file permission
d) Network, system

39. One common way to maintain data availability is __________


a) Data clustering
b) Data backup
c) Data recovery
d) Data Altering

40. _______ is the practice and precautions taken to protect valuable information from
unauthorised access, recording, disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security

Practice Assessment
41. Compromising confidential information comes under _________
a) Bug
b) Threat
c) Vulnerability
d) Attack

42. Possible threat to any information cannot be ________________


a) reduced
b) transferred
c) protected
d) ignored

43. IT security department must periodically check for security logs and entries made
during office hours.
a) True
b) False

44. __________ is a set of conventions & rules set for communicating two or more
devices residing in the same network?
a) Security policies
b) Protocols
c) Wireless network
d) Network algorithms

45. ________ is any action that might compromise cyber-security.


a) Threat
b) Vulnerability
c) Exploit
d) Attack

46. What is Kali Linux?


a) A penetration testing operating system
b) A game development software
c) A social media platform
d) A video editing software
47. Who developed Kali Linux?
a) Canonical Ltd.
b) Microsoft Corporation
c) Offensive Security Ltd.
d) Red Hat Inc.

Practice Assessment
48. Which tool is used for password cracking in Kali Linux?
a) Burp Suite
b) Aircrack-ng
c) John the Ripper
d) Wireshark

49. Which tool is used for social engineering attacks in Kali Linux?
a) SET
b) THC Hydra
c) Medusa
d) Nikto

50. What is the primary package manager used in Kali Linux?


a) apt-get
b) yum
c) pacman
d) zypper

Practice Assessment
SAP Analytics Cloud
1. What is SAC stand for?
a. System Application Cloud
b. SAP Analytics Cloud
c. SAP Analyst Cloud
d. SAP Advance Cloud

2. What is SAP Analytics Cloud?


a. An enterprise resource planning (ERP) software
b. A business intelligence and data visualization tool
c. A customer relationship management (CRM) platform
d. An open-source programming language

3. Which of the following is NOT a component of SAP Analytics Cloud?


a. Planning
b. Predictive analytics
c. Data integration
d. Human resources management

4. Which data sources can SAP Analytics Cloud connect to?


a. Only SAP HANA databases
b. Only Microsoft Excel files
c. A wide range of on-premises and cloud-based sources
d. Only SAP Business Warehouse (BW)

5. What is the purpose of a story in SAP Analytics Cloud?


a. To manage user access and permissions
Practice Assessment
b. To create ad hoc data visualizations
c. perform predictive analytics
d. To schedule and distribute reports

6. What does the SAP Analytics Cloud Smart Discovery feature do?
a. Automatically detects and visualizes data patterns and relationships
b. Enables users to create custom formulas and calculations
c. Allows collaboration and commenting on shared data stories
d. Provides advanced geospatial analytics capabilities

7. What is the purpose of the "Smart Predict" feature in SAP Analytics Cloud?
a. To perform advanced statistical analysis
b. To create complex data models
c. To automate predictive forecasting
d. To integrate with external data sources

8. How can you share SAP Analytics Cloud stories with others?
a. Exporting as PDF or PowerPoint files
b. Sharing via email or link
c. Embedding in web pages
d. All of the above

9. Which feature of SAP Analytics Cloud provides real-time data monitoring and
alerts?
a. Smart Predict
b. Smart Insights
c. Digital Boardroom
d. Analytics Designer

Practice Assessment
10. What is the purpose of the "Collaboration" feature in SAP Analytics Cloud?
a. To perform collaborative data modeling
b. To enable social media integration
c. To share, comment, and collaborate on data stories
d. To automate workflow processes

11. Which SAP Analytics Cloud feature provides pre-built machine learning models?
a. Smart Insights
b. Digital Assistant
c. Smart Predict
d. Analytics Catalog

12. Which chart type is used to display the relationship between two continuous
variables?
a. Bar chart
b. Line chart
c. Scatter plot
d. Area chart

13. Which chart type is useful for displaying the distribution and spread of data,
including outliers?
a. Bar chart
b. Line chart
c. Box plot
d. Radar chart

14. Which type of map visualization is commonly used to represent data based on
geographical locations?
a. Choropleth map
b. Scatter plot

Practice Assessment
c. Bar chart
d. Line chart

15. What is a key application of SAP Analytics Cloud in the field of marketing?
a. Analyzing customer behavior and segmentation
b. Evaluating marketing campaign performance and ROI
c. Tracking digital marketing metrics and conversions
d. All of the above

16. What is a "story" in SAP Analytics Cloud?


a. A narrative that accompanies the data visualizations
b. A collection of interactive data visualizations and insights
c. A template for creating data models
d. A feature for real-time collaboration on data analysis

17. How can you create a story in SAP Analytics Cloud?


a. By importing data from external sources
b. By designing data visualizations using drag-and-drop functionality
c. By defining data connections and models
d. By exporting reports as PDF or PowerPoint files

18. What is the purpose of using filters in an SAC story?


a. To exclude certain data from the visualizations
b. To focus on specific subsets of data for analysis
c. To enhance the aesthetics of the visualizations
d. To enable collaboration and commenting on the story

19. What is the purpose of the "Smart Discovery" feature in SAP Analytics Cloud?

Practice Assessment
a. To automate data visualization and chart selection
b. To provide real-time collaboration and commenting on data analysis
c. To perform automated machine learning-driven insights and recommendations
d. To enable advanced statistical analysis and modelling

20. You created a story and want to share it with an external agent, who does not
have SAP Analytics Cloud. You decide to export the story as a file. Which file type
can be used?
a. xlsx
b. csv
c. pdf
d. html

21. You have used the SAP Analytics Cloud Add-In for Microsoft Office for a business
intelligence data analysis. Your colleague says that you can also use the SAP
Analytics Cloud Add-In for Microsoft Office for planning scenarios. Is the
statement of your colleague true or false?
a. True
b. False

22. Your users need a story where the pages adjust the size and location of the
elements on the page depending on the device, or size of device, being used to
view the story. What page type should you use?
a. Responsive
b. Grid
c. Canvas
d. Page

23. In SAP Analytics Cloud you use an import connection to an SAP ERP system.
Your colleague says that no data is stored in SAP Analytics Cloud. Is the
statement of your colleague true or false?
a. True
b. False
Practice Assessment
24. Which of the following is a key feature of the SAP Analytics Cloud Mobile App?
a. Real-time collaboration
b. Smart Insights
c. Data wrangling
d. Workflow management

25. What is the purpose of the "Data Quality" feature in SAP Analytics Cloud?
a. To enable real-time collaboration on data models
b. To perform advanced statistical analysis
c. To ensure the accuracy and consistency of data
d. To create custom data visualizations

26. What is the primary purpose of SAP Analytics Cloud?


a) Customer Relationship Management (CRM)
b) Enterprise Resource Planning (ERP)
c) Human Capital Management (HCM)
d) Business Intelligence and Analytics
27. What is Master Data in SAC?
a) Primary Data
b) Secondary data
c) Third party data
d) None of the above

28. How can you ensure data security in SAP Analytics Cloud service?
a) By Auditing
b) By Encryption control
c) By Data Access Control.
d) By viewing control.

29. How can you ensure data security in SAP Analytics Cloud service?
a) By Auditing
b) By Encryption control

Practice Assessment
c) By Data Access Control.
d) By viewing control.

30. SAP Analytics Cloud service is a?


a) Public mode offering.
b) Private mode offering.
c) Both
d) None of the above.

31. SAP Analytics Cloud service Model holds?


a) Data cleansing.
b) Data wrangling.
c) Data redefining.
d) All.

32. in SAP Analytics Cloud service Model is store in the form?


a) Star Schema
b) Single table
c) Multiple table.
d) None of the above.

33. SAP Analytics Cloud is better than Tableau?


a) better connectivity
b) upgrade
c) Pricing.
d) All.

34. In the SAP Analytics cloud, we can collaborate in?


a) Exchanging reports
b) Using comments section.
c) Both a & b.
d) None of the above.

35.Can the SAP analytics cloud be hosted?


a) True
b) False

Practice Assessment
36. Does SAP Analytics Cloud support customize themes?
a) True
b) False.

37. We integrate SAP Analytics Cloud with


a) Oracel data base
b) Azure data base.
c) Both a & b.
d) SAP S4 HANA data base.

38. In the SAP Analytics cloud, we can collaborate in?


a) Exchanging reports
b) Using comments section.
c) both.
d) None of the above.

39. Does SAP analytics cloud store data?


a) True
b) False.

40. What programming language is used in SAP Analytics Cloud?


a) Python
b) JAVA.
c) Java Script.
d) PHP.

41. in SAP Analytics Cloud model can____data?


a) overwrite
b) delect.
c) Not able to change.
d) paush

42. SAP Analytics Cloud has ____predictive scenarios?


a) 8
b) 4.
c) 3.
d) 10.

Practice Assessment
43. In SAP Analytics Cloud story have?
a) Charts.
b) Text & Pictogram.
c) images.
d) All of the above.

44. SAP Analytics Cloud have a predictive scenario?


a) Regression
b) classification.
c) Both a & b.
d) None of the above.

45. SAP Analytics Cloud trends can be predicted by?


a) Regression
b) Dense Network.
c) Both a & b.
d) Time series analysis.

46. SAP Analytics Cloud Free trail accountant have validity duration ?
a) 30 days
b) 120 days.
c) 365 days.
d) 60 days.

47. Which SAP Analytics Cloud data model function use to enhance data?
a) Calculation view
b) Data grouping.
c) Both a & b.
d) Dimension sorting.

48. SAP Analytics Cloud represent which sap software strategy?


a) Cloud first strategy
b) Cloud only strategy.
c) On premise strategy.
d) Platform strategy.

Practice Assessment
49. SAP Analytics Cloud support customize themes.
a) True
b) False.

50. We can access data in SAP Analytics Cloud through mobile devices with?
a) SAP HANA
b) SAP BTP.
c) Both a & b.
d) Netweaver.

Power BI
1. What is Power BI?

a. A business analytics tool


b. A database management system
c. A project management software
d. A graphic design tool

2. Which of the following is a data visualization feature in Power BI?

a. Charts
b. Word processing
c. Video editing
d. Animation

3. Which programming language is used to create custom visuals in Power BI?

a. Python
b. C#
c. Java
d. Go

4. Which of the following is NOT a data source that can be used in Power BI?

a. Excel spreadsheets
b. JSON files
Practice Assessment
c. Oracle databases
d. Adobe Photoshop files

5. Which of the following is a data transformation feature in Power BI?

a. Data modelling
b. Data visualization
c. Data exploration
d. Data cleansing

6. Which of the following is a visualization option in Power BI?

a. Pivot table
b. Histogram
c. Bubble chart
d. All of the above

7. What is a dashboard in Power BI?

a. A visual representation of data that provides an at-a-glance view of key metrics


b. A report that contains detailed information about a specific topic or area
c. A data source that provides access to raw data for analysis
d. A collaboration tool that allows users to share and work on data together

8. What is a measure in Power BI?

a. A calculation based on data in a dataset


b. A visualization option for displaying data
c. A filter that restricts the amount of data displayed in a report
d. A connection to a data source

9. Which of the following is a way to filter data in Power BI?

a. Slicer
b. Histogram
c. Scatter plot
d. Line chart

10. What is the purpose of Power Query in Power BI?

a. To import, transform, and combine data from various sources


b. To create custom visuals for data visualization

Practice Assessment
c. To analyse and visualize data
d. To create and manage data models

11. What is the purpose of Power Pivot in Power BI?

a. To import and transform data from various sources


b. To create and manage data models
c. To analyze and visualize data
d. To share reports and dashboards with other users

12. Which of the following is a way to create a new measure in Power BI?

a. Using DAX formula language


b. Using SQL query language
c. Using Python programming language
d. Using JavaScript programming language

13. What is the purpose of Power View in Power BI?

a. To create and share reports and dashboards


b. To import and transform data from various sources
c. To analyze and visualize data
d. To create and manage data models

14. Which of the following is a way to share a report or dashboard in Power BI?

a. Publish to the Power BI service


b. Export to a PDF file
c. Share via email
d. All of the above

15. What is the purpose of the Power BI service?

a. To create and manage data models


b. To import and transform data from various sources
c. To analyze and visualize data
d. To share reports and dashboards with other users

16. Which of the following is a way to connect to a data source in Power BI?

a. Using external web browser


b. Using a command-line interface

Practice Assessment
c. Using an API
d. All of the above

17. What is the purpose of the Query Editor in Power BI?

a. To create and manage data models


b. To import and transform data from various sources
c. To analyze and visualize data
d. To share reports and dashboards with other users

18. Which of the following is a way to Predict in Power BI?

a. Using a analytic tool


b. Using a chart
c. Using a table
d. All of the above

19. Which of the following is a way to create a hierarchy in Power BI?

a. Using the Fields pane


b. Using the Filters pane
c. Using the Visualizations pane
d. Using the Pages pane

20. Which of the following is a way to create a calculated column in Power BI?

a. Using DAX formula language


b. Using SQL query language
c. Using C programming language
d. Using JavaScript programming language

21. What is the purpose of the Q&A feature in Power BI?

a. To allow users to ask natural language questions and get answers from data
b. To create and share reports and dashboards
c. To analyze and visualize data
d. To create and manage data models

22. Which of the following is a way to create a report in Power BI?

a. Using the Power BI desktop application


b. Using the Power BI service
c. Using a mobile app
d. All of the above

Practice Assessment
23. What is the purpose of the Power BI mobile app?

a. To create and share reports and dashboards


b. To analyse and visualize data
c. To view and interact with reports and dashboards on mobile devices
d. To create and manage data model

24. Which of the following is a way to create a dashboard in Power BI?

a. Using the Power BI desktop application


b. Using the Power BI service
c. Using a mobile app
d. All of the above

25. What is the purpose of the Power BI API?

a. To allow integration with other applications and services


b. To analyze and visualize data
c. To create and share reports and dashboards
d. To create and manage data models

26. Which of the following is a way to share a report in Power BI?

a. Publishing to the Power BI service


b. Exporting to a PDF file
c. Sharing a link to the report
d. All of the above

27. Which of the following is a way to create a custom visual in Power BI?

a. Using the Visualizations pane


b. Using the Fields pane
c. Using the Format pane
d. Using the Developer tools

28. Which of the following is a way to perform data modelling in Power BI?

a. Using the Data view


b. Using the Visualizations pane
c. Using the Format pane
d. Using the Developer tools

29. Which of the following is a way to customize the appearance of a Power BI report?

Practice Assessment
a. Using custom themes
b. Using custom visuals
c. Using custom tooltips
d. All of the above

30. What is the purpose of Power BI paginated reports?

a. To provide a high-level overview of data from multiple sources


b. To create interactive data visualizations
c. To create pixel-perfect, paginated reports for printing and PDF generation
d. To embed Power BI content in other applications

31. Which of the following is a way to monitor the performance of a Power BI report?

a. Using the Power BI desktop application


b. Using the Power BI service
c. Using the Power BI mobile app
d. None of the above

32. Which of the following is a way to access Power BI content offline?

a. Using the Power BI desktop application


b. Using the Power BI service
c. Using the Power BI mobile app
d. None of the above

33. What is the purpose of the Power BI data gateway?

a. To connect to on-premises data sources from the Power BI service


b. To create and manage data models in Power BI
c. To create custom visuals for Power BI reports and dashboards
d. To manage user access to Power BI content

34. Which of the following is a way to create a Power BI data gateway?

a. Using the Power BI desktop application


b. Using the Power BI service
c. Using the Power BI mobile app
d. Using the Power BI gateway installer

35. What is the purpose of the Power BI premium capacity?

a. To increase the performance and scalability of Power BI reports and dashboards


b. To provide additional data modelling capabilities in Power BI

Practice Assessment
c. To create custom visuals for Power BI reports and dashboards
d. To manage user access to Power BI content

36. Which of the following is a way to create a Power BI premium capacity?

a. Using the Power BI desktop application


b. Using the Power BI service
c. Using the Power BI mobile app
d. None of the above

37. What is the purpose of Power BI Embedded?

a. To embed Power BI content in other applications


b. To provide additional data modelling capabilities in Power BI
c. To manage user access to Power BI content
d. To increase the performance and scalability of Power BI reports and dashboards

38. Which of the following is a way to create a Power BI Embedded solution?

a. Using the Power BI desktop application


b. Using the Power BI service
c. Using the Power BI mobile app
d. Using the Power BI Embedded SDK

39. Which of the following is a way to customize the appearance of a Power BI report?

a. Using custom themes


b. Using custom visuals
c. Using custom tooltips
d. All of the above

41. Which of the following is a way to set up row-level security in Power BI?

a. Using DAX formulas


b. Using Power Query
c. Using Power Automate
d. None of the above

42. Which of the following is a way to export data from a Power BI report?

a. Using the Power BI desktop application


b. Using the Power BI service
c. Using the Power BI mobile app
d. All of the above

Practice Assessment
43. Which of the following is a way to share a Power BI report with others?

a. Using the Power BI desktop application


b. Using the Power BI service
c. Using the Power BI mobile app
d. All of the above

44. Which of the following is a way to create a calculated table in Power BI?

a. Using the Power BI desktop application


b. Using the Power BI service
c. Using the Power BI mobile app
d. None of the above

45. Which of the following is a way to create a data model in Power BI?

a. Using the Power BI desktop application


b. Using the Power BI service
c. Using the Power BI mobile app
d. All of the above

46. Which of the following is a way to add custom visuals to a Power BI report?

a. Using the Power BI desktop application


b. Using the Power BI service
c. Using the Power BI mobile app
d. None of the above

47. Which of the following is a way to create a drill through in Power BI?

a. Using the Power BI desktop application


b. Using the Power BI service
c. Using the Power BI mobile app
d. All of the above

48. In which year did Microsoft discharge an extra administration called Power BI
Embedded?

a. 2011
b. 2012
c. 2013
d. 2016

49. The principal arrival of Power BI depended on


Practice Assessment
a. MS Word

b. MS Excel

c. MS Outlook

d. OneDrive

50. Power BI was first discharged to the overall population

a. 2010

b. 2011

c. 2016

d. 2015

References

1. https://chat.openai.com/
2. Using Basic and Advanced Stories (sap.com)

Practice Assessment

You might also like