Page 61 - PlusGPT_V2.1_C8_Flipbook
P. 61
d. A _______________ can be termed as a key of codes that protects our valuable contents,
documents or files.
e. _______________ refers to the safety practices followed to prevent theft of personal information.
3. Write 'T' for true and 'F' for false.
a. A program file infecting virus is also known as a ‘File Injector’. __________
b. You should keep same password for all your online accounts. __________
c. You should prefer private browsing mode. __________
d. Internet security leads to reduction of data loss, theft, and damage. __________
e. Spoofing can be part of phishing. __________
4. Answer the following:
a. What is the need of Internet security?
__________________________________________________________________________________
__________________________________________________________________________________
b. List any five cyber threats.
__________________________________________________________________________________
__________________________________________________________________________________
c. What is spyware? How you can prevent the attack of spyware?
__________________________________________________________________________________
__________________________________________________________________________________
d. What are the symptoms and effects of a malware?
__________________________________________________________________________________
__________________________________________________________________________________
e. Write a few tips for having a strong password.
__________________________________________________________________________________
__________________________________________________________________________________
f. Write Short Notes on:
i. Spoofing
______________________________________________________________________________
______________________________________________________________________________
ii. Phishing
______________________________________________________________________________
______________________________________________________________________________
Cyber Security 59

