Page 61 - PlusGPT_V2.1_C8_Flipbook
P. 61

d.   A  _______________ can be  termed  as a key  of codes  that  protects our valuable  contents,
                       documents or files.

                    e.  _______________ refers to the safety practices followed to prevent theft of personal information.
                 3.   Write 'T' for true and 'F' for false.

                    a.  A program file infecting virus is also known as a ‘File Injector’.                __________

                    b.  You should keep same password for all your online accounts.                       __________
                    c.  You should prefer private browsing mode.                                          __________

                    d.  Internet security leads to reduction of data loss, theft, and damage.             __________
                    e.  Spoofing can be part of phishing.                                                 __________

                 4.  Answer the following:

                    a.  What is the need of Internet security?

                      __________________________________________________________________________________
                      __________________________________________________________________________________

                    b.  List any five cyber threats.

                      __________________________________________________________________________________

                      __________________________________________________________________________________

                    c.  What is spyware? How you can prevent the attack of spyware?
                      __________________________________________________________________________________

                      __________________________________________________________________________________

                    d.  What are the symptoms and effects of a malware?

                      __________________________________________________________________________________

                      __________________________________________________________________________________

                    e.  Write a few tips for having a strong password.
                      __________________________________________________________________________________

                      __________________________________________________________________________________

                    f.  Write Short Notes on:

                       i.  Spoofing
                           ______________________________________________________________________________

                           ______________________________________________________________________________
                       ii.  Phishing

                           ______________________________________________________________________________
                           ______________________________________________________________________________



                                                                                                   Cyber Security  59
   56   57   58   59   60   61   62   63   64   65   66