Home » Articles posted by Shraddha Khedkar

Author Archives: Shraddha Khedkar

News/Events@HB

Helping Brainz plans to support 3000 underprivileged children from Dharni, Amravati, Maharashtra. Helping Brainz shall be supporting these children with school stationeries and learning materials.

International TPRM Alliance – 12th TPRM Roundtable 2025 – Post Summit Quiz

0%
3

You have 20 mins to complete this QUIZ! Wish you all the best!

Time is UP!


12RTInternationalTPRMAlliance

12th TPRM Roundtable 2025

Please enter your full name, email address and location for certificate/score-generations! You will receive a certificate only if you score above 70%.

1 / 22

Category: 12RTInternationalTPRMAlliance

1. Among the below, which is also an important step for assessing the criticality of a third-party vendor?

2 / 22

Category: 11RTInternationalTPRMAlliance

2. How was the roundtable ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below
(feedback question - unscored)

3 / 22

Category: 12RTInternationalTPRMAlliance

3. Which of the following is NOT a benefit of using automated solutions for third-party assurance?

4 / 22

Category: 12RTInternationalTPRMAlliance

4. A vendor's financial health is deteriorating, posing a risk to your operations. How can automated solutions help in this scenario?

5 / 22

Category: 12RTInternationalTPRMAlliance

5. Your facility is evaluating a new IoT sensor vendor whose devices will integrate with your Industrial Control System (ICS). The vendor cannot provide detailed security testing or vulnerability assessments of their product. What should you do?

6 / 22

Category: 12RTInternationalTPRMAlliance

6. A third-party vendor fails to meet the agreed-upon service levels. What automated solution feature can help identify such issues promptly?

7 / 22

Category: 11RTInternationalTPRMAlliance

7. Your esteemed feedback about the event ?

8 / 22

Category: 12RTInternationalTPRMAlliance

8. A third-party vendor refuses to comply with your company's data protection policies. What should be your immediate course of action?

9 / 22

Category: 12RTInternationalTPRMAlliance

9. What is geopolitical risk in the context of vendor management?

10 / 22

Category: 12RTInternationalTPRMAlliance

10. During a compliance audit, it was discovered that a supplier has subcontracted critical services without informing your organization. What is the best immediate response?

11 / 22

Category: 12RTInternationalTPRMAlliance

11. Which of the following best describes automated third-party assurance solutions?

12 / 22

Category: 12RTInternationalTPRMAlliance

12. Which of the following best describes "continuous monitoring" in TPRM?

13 / 22

Category: 12RTInternationalTPRMAlliance

13. Your company discovers that a third-party vendor has suffered a data breach affecting customer information. Among the below what should be your immediate action?

14 / 22

Category: 12RTInternationalTPRMAlliance

14. What is the primary limitation of using static questionnaires for vendor risk assessments?

15 / 22

Category: 12RTInternationalTPRMAlliance

15. Which framework provides guidelines for risk management processes?

16 / 22

Category: 12RTInternationalTPRMAlliance

16. Your organization relies on a third-party vendor for cloud storage. Recently, the vendor experienced a data breach due to a misconfigured firewall. What automated solution could have helped prevent this incident?

17 / 22

Category: 12RTInternationalTPRMAlliance

17. During a ransomware attack, your IT team is deciding between paying the ransom or restoring from backups. What is the best practice under HIPAA?

18 / 22

Category: 12RTInternationalTPRMAlliance

18. Your bank is evaluating cloud SaaS monitoring tools. Which capability is most critical to comply with DORA and NIS2 requirements?

19 / 22

Category: 12RTInternationalTPRMAlliance

19. During a routine software composition analysis (SCA), you discover that a vendor’s product includes several outdated open-source libraries. What is the most prudent next step?

20 / 22

Category: 12RTInternationalTPRMAlliance

20. What is the primary function of a risk register in third-party assurance?

21 / 22

Category: 12RTInternationalTPRMAlliance

21. During a routine audit, it was observed that a third-party supplier lacks adequate access controls. What should you do?

22 / 22

Category: 11RTInternationalTPRMAlliance

22. Kindly share the TPRM topics, which you would like to include in our next roundtables (you can also write to us at support@TPRMAlliance.com).

Your score is

0%

Exit

International TPRM Alliance – 10th TPRM Roundtable 2024 – Post Summit Quiz

0%
8

The quiz has expired!

International TPRM Alliance – 9th TPRM Roundtable 2024 – Post Summit Quiz

0%
45

The quiz has expired!

20th National Cyber Security and Cyber Crime Awareness Session at RMDSMS, Pune

0%
713

You have 10 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security General Awareness

20th National Cyber Security and Cyber Crime Awareness Session at R. M. Dhariwal Sinhgad Management School, Kondhapuri, Pune

 

Please enter your full name and email address  for certificate/score-generations! You will receive only if you score above 70%.

1 / 20

Category: Cyber Security General Awareness

1. You receive a phone call from the bank that particular person is asking you for your account details for a vertification. Unfortunately, you give your details and your money and has been withdrawn. You have been victim of which cyber attack?

2 / 20

Category: Cyber Security General Awareness

2. Select the fullform of "DDoS"

3 / 20

Category: Cyber Security General Awareness

3. Which portal is used to report a cyber crime in India ?

4 / 20

Category: Cyber Security General Awareness

4. Is the following statement true or false? Reusing the same password across multiple sites is a good idea. It's very convenient after all.

5 / 20

Category: Cyber Security General Awareness

5. You receive a text message from an unknown number. The text says that if you click the link provided, it will redirect you to a site where you can watch the latest award-winning movie that is still in theatres. You see that the link referenced is from a popular URL shortening site. You should:

6 / 20

Category: Cyber Security General Awareness

6. Which of the following best describes a grandparent scam?

7 / 20

Category: Cyber Security General Awareness

7. Which of the following would be the best password (hardest to crack)?

8 / 20

Category: Cyber Security General Awareness

8. You fell victim to a scam, through which an attacker stole money from you. What should you do?

9 / 20

Category: Cyber Security General Awareness

9. What is the meaning of Encryption?

10 / 20

Category: Cyber Security General Awareness

10. Which computer virus records every movement you make on your computer?

11 / 20

Category: Cyber Security General Awareness

11. What is a person called when they try to hurt a group of people with the use of a computer?

12 / 20

Category: Cyber Security General Awareness

12. Is it generally considered safe to use Starbucks Public Wi-Fi network for performing an online banking operation?

13 / 20

Category: Cyber Security General Awareness

13. Which of the following should you NOT publish on social media sites?

14 / 20

Category: Cyber Security General Awareness

14. Is the following statement true or false. Because operating system updates are time consuming and may need to restart the machine it's a good idea to postpone them as long as possible.

15 / 20

Category: Cyber Security General Awareness

15. Mary downloaded a free software program from an unknown website. After installing the program, her computer started behaving strangely and her files were encrypted. What likely happened, and what should Mary do?

16 / 20

Category: Cyber Security General Awareness

16. Rahul sees an advertisement promising immediate job placements in reputable companies without requiring any prior qualifications. All he needs to do is provide his personal information. What should Rahul do?

17 / 20

Category: Cyber Security General Awareness

17. How was the event ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below

18 / 20

Category: Cyber Security General Awareness

Will you try sharing whatever you learnt today with your friends, relatives and neighbours ?

18. (We will be also interested to conduct an event in your friend's school or college, so that they are also cyber secure. If you are interested to nominate a school or a college, please email us at help@helpingbrainz.org or call us at 8921979187) 

An opportunity for you to give back to the community!

(Note: This question doesn't have a score)

19 / 20

Category: Cyber Security General Awareness

19. When visiting a website, you notice a lock 🔒 icon next to the web address. What does the lock 🔒 represent?

20 / 20

Category: 5th TPRM Roundtable 2024

20. Your esteemed feedback about the event ?

 

Your score is

0%

19th Cyber Security and Cyber Crime Awareness Session at Balagokulam Delhi NCR

0%
29

You have 10 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security General Awareness

Cyber Security and Cyber Crime Awareness Session at Balagokulam Delhi NCR

 

Please enter your full name and email address  for certificate/score-generations! You will receive only if you score above 70%.

1 / 20

Category: Cyber Security General Awareness

1. Which portal is used to report a cyber crime in India ?

2 / 20

Category: Cyber Security General Awareness

2. Is it generally considered safe to use Ambience Mall's(Gurugram) Public Wi-Fi network for performing an online banking operation?

3 / 20

Category: Cyber Security General Awareness

3. _______is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination.

 

4 / 20

Category: Cyber Security General Awareness

4. What are the characteristics of a strong password?

5 / 20

Category: Cyber Security General Awareness

5. The technique used in whaling attack is similar to

6 / 20

Category: Cyber Security General Awareness

6. Never give this out over the phone, or through or email or on the Internet.

7 / 20

Category: Cyber Security General Awareness

7. What does 's' in https stand for?

8 / 20

Category: Cyber Security General Awareness

8. When visiting a website, you notice a lock 🔒 icon next to the web address. What does the lock 🔒 represent?

9 / 20

Category: Cyber Security General Awareness

9. Extracting information over the phone by tricking someone is:

10 / 20

Category: Cyber Security General Awareness

10. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______

11 / 20

Category: Cyber Security General Awareness

11. Which among the following is the safest password ?

12 / 20

Category: Cyber Security General Awareness

12. Who are the targets of modern day hackers?

13 / 20

Category: Cyber Security General Awareness

13. You receive an email from 'hajhsyye@sound.ocn.ne.jp' that urges you to reset your Hyundai password. What should you do?

14 / 20

Category: Cyber Security General Awareness

14. Which is the phishing capital of India ?

15 / 20

Category: Cyber Security General Awareness

15. Which of the following should you do to restrict access to your files and devices?

16 / 20

Category: Cyber Security General Awareness

16. Which of the following is not a cybercrime ?

17 / 20

Category: Cyber Security General Awareness

17. How can a person executing a phishing attack steal someone's identity?

18 / 20

Category: Cyber Security General Awareness

18. How was the event ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below

19 / 20

Category: Cyber Security General Awareness

Will you try sharing whatever you learnt today with your friends, relatives and neighbours ?

19. (We will be also interested to conduct an event in your friend's school or college, so that they are also cyber secure. If you are interested to nominate a school or a college, please email us at help@helpingbrainz.org or call us at 8921979187) 

An opportunity for you to give back to the community!

(Note: This question doesn't have a score)

20 / 20

Category: 5th TPRM Roundtable 2024

20. Your esteemed feedback about the event ?

 

Your score is

0%

Cyber Security Awareness Quiz

This is an initiative by Helping Brainz to spread cyber awareness.

0%
9

You have 5 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security Awareness Month

Cyber Security Awareness Quiz by Helping Brainz

 

Please enter your full name, email address and location for certificate/score-generations! You will receive only if you score above 50%.

1 / 1

Category: Cyber Security Awareness Month

1. Who are the targets of whaling phishing attacks?

Your score is

0%

Music credits: bensound.com

18th Cyber Security and Cyber Crime Awareness Session at SVIMS, Pune

0%
49

You have 10 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security General Awareness

Cyber Security and Cyber Crime Awareness Session at Sadhu Vaswani Institute of Management Studies for Girls, Pune

 

Please enter your full name and email address  for certificate/score-generations! You will receive only if you score above 70%.

1 / 20

Category: Cyber Security General Awareness

1. Which portal is used to report a cyber crime in India ?

2 / 20

Category: Cyber Security General Awareness

2. Is it generally considered safe to use Ambience Mall's(Gurugram) Public Wi-Fi network for performing an online banking operation?

3 / 20

Category: Cyber Security General Awareness

3. _______is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination.

 

4 / 20

Category: Cyber Security General Awareness

4. What are the characteristics of a strong password?

5 / 20

Category: Cyber Security General Awareness

5. The technique used in whaling attack is similar to

6 / 20

Category: Cyber Security General Awareness

6. Never give this out over the phone, or through or email or on the Internet.

7 / 20

Category: Cyber Security General Awareness

7. What does 's' in https stand for?

8 / 20

Category: Cyber Security General Awareness

8. When visiting a website, you notice a lock 🔒 icon next to the web address. What does the lock 🔒 represent?

9 / 20

Category: Cyber Security General Awareness

9. Extracting information over the phone by tricking someone is:

10 / 20

Category: Cyber Security General Awareness

10. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______

11 / 20

Category: Cyber Security General Awareness

11. Which among the following is the safest password ?

12 / 20

Category: Cyber Security General Awareness

12. Who are the targets of modern day hackers?

13 / 20

Category: Cyber Security General Awareness

13. You receive an email from 'hajhsyye@sound.ocn.ne.jp' that urges you to reset your Hyundai password. What should you do?

14 / 20

Category: Cyber Security General Awareness

14. Which is the phishing capital of India ?

15 / 20

Category: Cyber Security General Awareness

15. Which of the following should you do to restrict access to your files and devices?

16 / 20

Category: Cyber Security General Awareness

16. Which of the following is not a cybercrime ?

17 / 20

Category: Cyber Security General Awareness

17. Shweta Kumari is a MBA student who is a young aspiring volleyball player. Shweta received an email from the Principal of The Sadhu Vaswani Institute of Management Studies (SVIMS) for Girls, Pune asking her to nominate herself for the trails happening for college's volleyball team. Here she is supposed to submit an online form which she received through the email.

As Shweta attended the Cybercrime Awareness session by Helping Brainz, she was aware about the fact that she needs to check the domain and the URL. Which among the below (e-mail) is the correct one?

18 / 20

Category: Cyber Security General Awareness

18. How was the event ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below

19 / 20

Category: Cyber Security General Awareness

Will you try sharing whatever you learnt today with your friends, relatives and neighbours ?

19. (We will be also interested to conduct an event in your friend's school or college, so that they are also cyber secure. If you are interested to nominate a school or a college, please email us at help@helpingbrainz.org or call us at 8921979187) 

An opportunity for you to give back to the community!

(Note: This question doesn't have a score)

20 / 20

Category: 5th TPRM Roundtable 2024

20. Your esteemed feedback about the event ?

 

Your score is

0%

17th Cyber Security and Cyber Crime Awareness Session at RMDSMS, Pune

0%
555

You have 10 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security General Awareness

Cyber Security and Cyber Crime Awareness Session at R. M. Dhariwal Sinhgad Management School, Kondhapuri, Pune

 

Please enter your full name and email address  for certificate/score-generations! You will receive only if you score above 70%.

1 / 20

Category: Cyber Security General Awareness

1. Which portal is used to report a cyber crime in India ?

2 / 20

Category: Cyber Security General Awareness

2. Is it generally considered safe to use Ambience Mall's(Gurugram) Public Wi-Fi network for performing an online banking operation?

3 / 20

Category: Cyber Security General Awareness

3. _______is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination.

 

4 / 20

Category: Cyber Security General Awareness

4. What are the characteristics of a strong password?

5 / 20

Category: Cyber Security General Awareness

5. The technique used in whaling attack is similar to

6 / 20

Category: Cyber Security General Awareness

6. Never give this out over the phone, or through or email or on the Internet.

7 / 20

Category: Cyber Security General Awareness

7. What does 's' in https stand for?

8 / 20

Category: Cyber Security General Awareness

8. When visiting a website, you notice a lock 🔒 icon next to the web address. What does the lock 🔒 represent?

9 / 20

Category: Cyber Security General Awareness

9. Extracting information over the phone by tricking someone is:

10 / 20

Category: Cyber Security General Awareness

10. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______

11 / 20

Category: Cyber Security General Awareness

11. Which among the following is the safest password ?

12 / 20

Category: Cyber Security General Awareness

12. Who are the targets of modern day hackers?

13 / 20

Category: Cyber Security General Awareness

13. You receive an email from 'hajhsyye@sound.ocn.ne.jp' that urges you to reset your Hyundai password. What should you do?

14 / 20

Category: Cyber Security General Awareness

14. Which is the phishing capital of India ?

15 / 20

Category: Cyber Security General Awareness

15. Which of the following should you do to restrict access to your files and devices?

16 / 20

Category: Cyber Security General Awareness

16. Which of the following is not a cybercrime ?

17 / 20

Category: Cyber Security General Awareness

17. Shweta Kumari is a MBA student who is a young aspiring volleyball player. Shweta received an email from the Principal of The Sadhu Vaswani Institute of Management Studies (SVIMS) for Girls, Pune asking her to nominate herself for the trails happening for college's volleyball team. Here she is supposed to submit an online form which she received through the email.

As Shweta attended the Cybercrime Awareness session by Helping Brainz, she was aware about the fact that she needs to check the domain and the URL. Which among the below (e-mail) is the correct one?

18 / 20

Category: Cyber Security General Awareness

18. How was the event ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below

19 / 20

Category: Cyber Security General Awareness

Will you try sharing whatever you learnt today with your friends, relatives and neighbours ?

19. (We will be also interested to conduct an event in your friend's school or college, so that they are also cyber secure. If you are interested to nominate a school or a college, please email us at help@helpingbrainz.org or call us at 8921979187) 

An opportunity for you to give back to the community!

(Note: This question doesn't have a score)

20 / 20

Category: 5th TPRM Roundtable 2024

20. Your esteemed feedback about the event ?

 

Your score is

0%

16th Cyber Security and Cyber Crime Awareness Session at KDK College of Engineering, Nagpur

0%
219

You have 10 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security General Awareness

Cyber Security and Cyber Crime Awareness Session at KDK College of Engineering, Nagpur

 

Please enter your full name and email address  for certificate/score-generations! You will receive only if you score above 70%.

1 / 20

Category: Cyber Security General Awareness

1. Which portal is used to report a cyber crime in India ?

2 / 20

Category: Cyber Security General Awareness

2. Is it generally considered safe to use Ambience Mall's(Gurugram) Public Wi-Fi network for performing an online banking operation?

3 / 20

Category: Cyber Security General Awareness

3. _______is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination.

 

4 / 20

Category: Cyber Security General Awareness

4. What are the characteristics of a strong password?

5 / 20

Category: Cyber Security General Awareness

5. The technique used in whaling attack is similar to

6 / 20

Category: Cyber Security General Awareness

6. Never give this out over the phone, or through or email or on the Internet.

7 / 20

Category: Cyber Security General Awareness

7. What does 's' in https stand for?

8 / 20

Category: Cyber Security General Awareness

8. When visiting a website, you notice a lock 🔒 icon next to the web address. What does the lock 🔒 represent?

9 / 20

Category: Cyber Security General Awareness

9. Extracting information over the phone by tricking someone is:

10 / 20

Category: Cyber Security General Awareness

10. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______

11 / 20

Category: Cyber Security General Awareness

11. Which among the following is the safest password ?

12 / 20

Category: Cyber Security General Awareness

12. Who are the targets of modern day hackers?

13 / 20

Category: Cyber Security General Awareness

13. You receive an email from 'hajhsyye@sound.ocn.ne.jp' that urges you to reset your Hyundai password. What should you do?

14 / 20

Category: Cyber Security General Awareness

14. Which is the phishing capital of India ?

15 / 20

Category: Cyber Security General Awareness

15. Which of the following should you do to restrict access to your files and devices?

16 / 20

Category: Cyber Security General Awareness

16. Which of the following is not a cybercrime ?

17 / 20

Category: Cyber Security General Awareness

17. Shweta Kumari is a MBA student who is a young aspiring volleyball player. Shweta received an email from the Principal of The Sadhu Vaswani Institute of Management Studies (SVIMS) for Girls, Pune asking her to nominate herself for the trails happening for college's volleyball team. Here she is supposed to submit an online form which she received through the email.

As Shweta attended the Cybercrime Awareness session by Helping Brainz, she was aware about the fact that she needs to check the domain and the URL. Which among the below (e-mail) is the correct one?

18 / 20

Category: Cyber Security General Awareness

18. How was the event ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below

19 / 20

Category: Cyber Security General Awareness

Will you try sharing whatever you learnt today with your friends, relatives and neighbours ?

19. (We will be also interested to conduct an event in your friend's school or college, so that they are also cyber secure. If you are interested to nominate a school or a college, please email us at help@helpingbrainz.org or call us at 8921979187) 

An opportunity for you to give back to the community!

(Note: This question doesn't have a score)

20 / 20

Category: 5th TPRM Roundtable 2024

20. Your esteemed feedback about the event ?

 

Your score is

0%

15th Cyber Security and Cyber Crime Awareness Session at SIOM, Pune

0%
304

You have 10 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security General Awareness

Cyber Security and Cyber Crime Awareness Session at Sinhgad Institute of Management, Pune

 

Please enter your full name and email address  for certificate/score-generations! You will receive only if you score above 70%.

1 / 20

Category: Cyber Security General Awareness

1. Is it generally considered safe to use Ambience Mall's(Gurugram) Public Wi-Fi network for performing an online banking operation?

2 / 20

Category: Cyber Security General Awareness

2. Which portal is used to report a cyber crime in India ?

3 / 20

Category: Cyber Security General Awareness

3. _______is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination.

 

4 / 20

Category: Cyber Security General Awareness

4. What are the characteristics of a strong password?

5 / 20

Category: Cyber Security General Awareness

5. The technique used in whaling attack is similar to

6 / 20

Category: Cyber Security General Awareness

6. Never give this out over the phone, or through or email or on the Internet.

7 / 20

Category: Cyber Security General Awareness

7. What does 's' in https stand for?

8 / 20

Category: Cyber Security General Awareness

8. When visiting a website, you notice a lock 🔒 icon next to the web address. What does the lock 🔒 represent?

9 / 20

Category: Cyber Security General Awareness

9. Extracting information over the phone by tricking someone is:

10 / 20

Category: Cyber Security General Awareness

10. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______

11 / 20

Category: Cyber Security General Awareness

11. Which is the phishing capital of India ?

12 / 20

Category: Cyber Security General Awareness

12. Which among the following is the safest password ?

13 / 20

Category: Cyber Security General Awareness

13. Who are the targets of modern day hackers?

14 / 20

Category: Cyber Security General Awareness

14. You receive an email from 'hajhsyye@sound.ocn.ne.jp' that urges you to reset your Hyundai password. What should you do?

15 / 20

Category: Cyber Security General Awareness

15. Which of the following should you do to restrict access to your files and devices?

16 / 20

Category: Cyber Security General Awareness

16. Which of the following is not a cybercrime ?

17 / 20

Category: Cyber Security General Awareness

17. Shweta Kumari is a MBA student who is a young aspiring volleyball player. Shweta received an email from the Principal of The Sadhu Vaswani Institute of Management Studies (SVIMS) for Girls, Pune asking her to nominate herself for the trails happening for college's volleyball team. Here she is supposed to submit an online form which she received through the email.

As Shweta attended the Cybercrime Awareness session by Helping Brainz, she was aware about the fact that she needs to check the domain and the URL. Which among the below (e-mail) is the correct one?

18 / 20

Category: Cyber Security General Awareness

18. How was the event ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below

19 / 20

Category: Cyber Security General Awareness

Will you try sharing whatever you learnt today with your friends, relatives and neighbours ?

19. (We will be also interested to conduct an event in your friend's school or college, so that they are also cyber secure. If you are interested to nominate a school or a college, please email us at help@helpingbrainz.org or call us at 8921979187) 

An opportunity for you to give back to the community!

(Note: This question doesn't have a score)

20 / 20

Category: 5th TPRM Roundtable 2024

20. Your esteemed feedback about the event ?

 

Your score is

0%