Page 60 - PlusGPT_V2.1_C8_Flipbook
P. 60

test Your skiLLs


                  1.  Tick ( ) the correct option.

                     a.  Which of the following are online threats?
                        (i)  Phishing                                    (ii)  Email spoofing

                       (iii)  Chat spoofing                             (iv)  All of these

                     b.  General rule to follow for online secure transactions are:
                        (i)  Do not share personal information


                       (ii)  Use antivirus and antispyware software
                       (iii)  Use only secure websites for such transactions

                       (iv)  All of the above

                     c.  Which of the following passwords is not easy to crack?

                        (i)  Favourite colour as password

                       (ii)  Friend's name as password

                       (iii)  Mobile number as password

                       (iv)  Combination of alphanumeric and special characters as password

                     d.   It can be a software program or a hardware device that filters all data packets coming through
                        the Internet, a network, etc. it is known as the _______________.

                        (i)  Antivirus                                   (ii)  Firewall
                       (iii)  Cookies                                   (iv)  Malware

                     e.   When a computer system or a user of a computer masquerades to be another identity while

                        engaging in chat is known as _______________ .
                        (i)  E-mail spoofing                             (ii)  chat spoofing

                       (iii)  Identity theft                            (iv)  Phishing


                  2.  Fill in the blanks using the words given below:

                                           File Injector, Password, https, Identity Protection,
                                                      Antivirus and Antispyware

                     a.  A program file infecting virus is also known as a _______________ .

                     b.  Web addresses that start with _______________ also signify that the website is secure.
                     c.  _______________ and _______________ programs offer real-time protection to computer from
                        malwares and reduce the risk of getting hacked.



                  58    Premium Edition-VIII
   55   56   57   58   59   60   61   62   63   64   65