Page 20 - ThinkGPT_V2.1_C6_Flipbook
P. 20

3.   Which type of cyber crime is referred to sending of bulk mail by an identified or unidentified source?
                          (i)  Hacking                                     (ii)  Spamming

                         (iii)  Phishing                                   (iv)  None of these

                      4.   Online ____________ fraud refers to the illegal withdrawing or transferring of money from one bank
                         account to another by a cybercriminal.
                          (i)  email                                       (ii)  citation

                         (iii)  transaction                                (iv)  both (i) and (ii)
                      5.  Which of the following is an antivirus?

                          (i)  Worm                                        (ii)  Norton

                         (iii)  Trojan                                     (iv)  None of these
                      6.   Which malware spreads through spam emails to steal banking information?

                          (i)  Emotet                                      (ii)  Pegasus

                         (iii)  Wabbit                                     (iv)  Storm
                  B.  Fill in the blanks using the words given below.

                                     Biometric   Adware   Malware   Password   Retina biometrics

                      1.  Malacious software is known as                  .
                      2.  Recognition of biological characteristics is an example of             authentication.
                      3.   An                  tracks user's browser and download history and keeps popping advertisements
                         on the screen.
                      4.                    shoots an infrared light beam into eye that has been placed close to the signal
                         receiver.
                      5.   A                  is a word or collection of characters used for user authentication to prove the
                         identity.


                  C.  State whether these statements are true or false.
                      1.  A virus cannot replicate itself.
                      2.  AVG is a malware program.
                      3.  A worm does not need any program to activate it.

                      4.  We should scan our computer regularly.
                      5.   Downloading from a non-secured website can cause harm to your computer.

                  D.  Answer the following questions:
                      1.  What is meant by authentication? What are the types of authentication?





                      2.  How does a virus infect a computer?






                       18    Premium Edition-VI
   15   16   17   18   19   20   21   22   23   24   25