Page 20 - ThinkGPT_V2.1_C6_Flipbook
P. 20
3. Which type of cyber crime is referred to sending of bulk mail by an identified or unidentified source?
(i) Hacking (ii) Spamming
(iii) Phishing (iv) None of these
4. Online ____________ fraud refers to the illegal withdrawing or transferring of money from one bank
account to another by a cybercriminal.
(i) email (ii) citation
(iii) transaction (iv) both (i) and (ii)
5. Which of the following is an antivirus?
(i) Worm (ii) Norton
(iii) Trojan (iv) None of these
6. Which malware spreads through spam emails to steal banking information?
(i) Emotet (ii) Pegasus
(iii) Wabbit (iv) Storm
B. Fill in the blanks using the words given below.
Biometric Adware Malware Password Retina biometrics
1. Malacious software is known as .
2. Recognition of biological characteristics is an example of authentication.
3. An tracks user's browser and download history and keeps popping advertisements
on the screen.
4. shoots an infrared light beam into eye that has been placed close to the signal
receiver.
5. A is a word or collection of characters used for user authentication to prove the
identity.
C. State whether these statements are true or false.
1. A virus cannot replicate itself.
2. AVG is a malware program.
3. A worm does not need any program to activate it.
4. We should scan our computer regularly.
5. Downloading from a non-secured website can cause harm to your computer.
D. Answer the following questions:
1. What is meant by authentication? What are the types of authentication?
2. How does a virus infect a computer?
18 Premium Edition-VI

