57 solutions available
Question 1While working, Mrs Sharma's system stopped functioning suddenly. After her system got repaired, she tried to log in to her e-mail account...
Question 2Nimmi is planning to spend her vacations abroad and surfed the internet to get details about some of the places. Now she keeps getting...
Question 3Aakriti copied a game from her friend's system into her laptop. But after she executed this game, some of the data from her laptop was...
Question 1............... is the process of stealing confidential, personal information, and financial information.
Question 2VPN stands for ............... .
Question 3The two common cyber crimes are ............... and ............... .
Question 4............... is temporary in nature.
Question 5............... are permanently stored on your system.
Question 6To prevent tracking of browsing history, we can use ..............., ............... or ............... .
Question 7A ............... is a dedicated computer or a software system which acts as an intermediary between an end point device, such as a...
Question 8A VPN allows you to hide your true identity by ............... the data and web traffic.
Question 9Turning your ............... settings to "off" can keep your family's where-about more private.
Question 10............... and ............... can serve in cutting your data charges and are helpful in completing work efficiently.
Question 11A ............... is just like a key to your personal information.
Question 12A password should be minimum ............... characters long.
Question 13The strength of a password is determined by length, complexity and ............... .
Question 14............... is a technique similar to the Dictionary attack but with a little difference that it detects the password using algorithm.
Question 15The term ............... describes a person actively involved in online communities or the Internet in general.
Question 16In Windows operating system, the ............... keeps track of a system's hardware and software.
Question 1What do you mean by online identity? List some threats to your online identity.
Question 2How can you safeguard your confidential information from getting hacked?
Question 3What is the relevance of private browsing? Explain with the help of an example.
Question 4Mention any two ways by which websites can track you.
Question 5Explain the term malware and its types. What precautions should be taken to prevent the entry of malware?
Question 6Explain any four types of Cybercrimes.
Question 7What is confidentiality of information? Mention any three practices to protect your confidential information.
Question 8Write a note on User Agent.
Question 9Write down the steps to protect your password from being hacked.
Question 10Write down the ways to report a cyber-crime.
Question 1............... is a social identity that a user establishes during online communities and websites.Internet identityPersonal identityLogin...
Question 2............... is a technique used to fetch personal details of a user from his discarded documents.Dumpster DivingShoulder...
Question 3Name the tool which is used for tracking and reporting the traffic received on a particular website.Google ChromeGoogle AnalyticsGoogle...
Question 4Which key combination launches the private mode in Firefox?Ctrl + Shift + PCtrl + Shift + NCtrl + Shift + FNone of these
Question 5............... is a technique used to gather web pages across the web and feed them into search engines for web...
Question 6............... is a software which keeps a track of all your activities and sends your confidential information to...
Question 7............... involves an attack coupled with a demand for money to stop further attacks.Cyber stalkingCyber extortionCyber bullyingNone...
Question 8Which one of the following is not a password cracking technique?Dictionary AttackSpideringUser AgentNone of these
Question 9In which year Cyber law was introduced?200920012000None of these
Question 10Mention the cyber crime in which the attacker harasses a victim by using the electronic communication.Cyber stalkingCyber espionageCyber...
Question 11Which software is designed to capture keystrokes without being identified by the user or security...
Question 12Name the malware program that send unwanted advertisements to the user's computer which may disrupt user's working.SpywareAdwareWormNone...
Question 13Which program can create multiple copies of itself and can consume large portion of system memory?WormTrojan horseRootkitNone of these
Question 14Which type of cookies, websites store to get details of a user's search history and the web browsing history?First party cookieThird party...
Question 15When we enter the password, which text box displays password strength?Strength text fieldPassword text fieldUser name text fieldNone of...
Question 16Which program sends message to the user system that the system is locked and the user will not be able to work on it until one pays a...
Question 17Name the software that helps the other malware to enter in your system and harm it.KeyloggersRansomwareBackdoorsNone of these
Question 18Which of the following are the types of malicious software?Anti-virus softwareViruses, worms, trojansWord Processing packagesNone of these
Question 19Which one of the following is not the best practice to protect the confidential information?Use multifactor authenticationSlowing down the...
Question 1How can you prevent the entry of virus into your system?
Question 2How are the first party cookies different from third party cookies?
Question 3What do you mean by Cybercrime?
Question 4What precautions should be taken to safeguard one's online identity?
Question 5How does a proxy server work to protect your data?
Question 6What do you mean by Cyber terrorism?
Question 7How firewall can safeguard your data on the network?
Question 8What is Phishing?
Question 9How can you check that the website you are visiting is open in secure mode?