Page 77 - CA_165_V2.0_C9_Flipbook
P. 77
5. Which of the following is not a malware?
i. Koobface ii. Ballpit
iii. Firewall iv. Sasser
Ans. 1. ii 2. i 3. iii 4. iv 5. iii
Unsolved Exercise
SECTION A
(Objective Type Questions)
A. Multiple choice questions.
1. Which type of cyber attack involves tracking a user’s keystrokes?
i. Ransomware ii. Phishing
iii. Keylogging iv. Spoofing
2. Which of the following signifies a secure website?
i. http:// ii. https://
iii. www. iv. ftp://
3. What is an example of an adware?
i. Pop-up advertisements ii. File-encrypting software
iii. Antivirus software iv. Email spam filter
4. Which cybercrime involves repeatedly harassing someone online?
i. Cyberstalking ii. Phishing
iii. Spamming iv. Social engineering
5. What does the golden lock in the browser address bar indicate?
i. A slow website ii. A secure and encrypted connection
iii. A website is loading ads iv. A website has viruses
6. What is a proxy server used for?
i. Enhancing graphics ii. Blocking malware
iii. Hiding IP address iv. Speeding up the Internet
7. What does antivirus software do?
i. Increases Internet speed ii. Detects and removes malware
iii. Improves battery life iv. Sends spam emails
8. Which of the following is an example of social engineering?
i. Installing software updates ii. Tricking users into revealing passwords
iii. Using a VPN for security iv. Creating strong passwords
B. Fill in the blanks.
1. The .................................... is the most significant innovation of mankind.
2. .................................... and .................................... programs offer real-time protection and restrict the computer
from getting affected by malwares.
Cyber Safety 75

