Page 31 - 2619_PlusGPT V2.1_C-8
P. 31
test Your skiLLs
1. Tick ( ) the correct option.
a. Which of the following are online threats?
(i) Phishing (ii) Email spoofing
(iii) Chat spoofing (iv) All of these
b. General rules to follow for online secure transactions are:
(i) Do not share personal information
(ii) Use antivirus and antispyware software
(iii) Use only secure websites for such transactions
(iv) All of the above
c. Which of the following passwords is not easy to crack?
(i) Favourite colour as a password
(ii) Friend's name as a password
(iii) Mobile number as a password
(iv) Combination of alphanumeric and special characters as a password
d. It can be a software program or a hardware device that filters all data packets coming through
the Internet, a network, etc. It is known as the _______________.
(i) Antivirus (ii) Firewall
(iii) Cookies (iv) Malware
e. When a computer system or a user of a computer masquerades to be another identity while
engaging in chat is known as _______________ .
(i) E-mail spoofing (ii) chat spoofing
(iii) Identity theft (iv) Phishing
2. Fill in the blanks using the words given below:
File Injector, Password, https, Identity Protection,
Antivirus, Antispyware
a. A program file infecting virus is also known as a _______________ .
b. Web addresses that start with _______________ also signify that the website is secure.
c. _______________ and _______________ programs offer real-time protection to computer from
malwares and reduce the risk of getting hacked.
Cyber Security 29

