Page 32 - 2619_PlusGPT V2.1_C-8
P. 32

d.   A  _______________ can be  termed  as a key  of codes  that  protects our valuable  contents,
                        documents or files.

                     e.  _______________ refers to the safety practices followed to prevent theft of personal information.
                  3.  Write 'T' for true and 'F' for false.

                     a.  A program file infecting virus is also known as a ‘File Injector’.                 __________

                     b.  You should keep same password for all your online accounts.                        __________
                     c.  You should prefer private browsing mode.                                           __________

                     d.  Internet security leads to reduction of data loss, theft and damage.               __________
                     e.  Spoofing can be part of phishing.                                                  __________

                  4.  Answer the following:

                     a.  What is the need for Internet security?

                        __________________________________________________________________________________
                        __________________________________________________________________________________

                     b.  List any five cyber threats.

                        __________________________________________________________________________________

                        __________________________________________________________________________________

                     c.  What is spyware? How you can prevent a spyware attack?
                        __________________________________________________________________________________

                        __________________________________________________________________________________

                     d.  What are the symptoms and effects of malware?

                        __________________________________________________________________________________

                        __________________________________________________________________________________

                     e.  Write a few tips for creating a strong password.
                        __________________________________________________________________________________

                        __________________________________________________________________________________

                     f.  Write short notes on:

                        i.  Spoofing
                            ______________________________________________________________________________

                            ______________________________________________________________________________
                        ii.  Phishing

                            ______________________________________________________________________________
                            ______________________________________________________________________________



                  30    Premium Edition-VIII
   27   28   29   30   31   32   33   34   35   36   37