Page 96 - Cyber Safety C-5
P. 96

A.  Tick ( ) the correct option.
                     1.  Choose the type of hacking that locks your files and demands money to unlock them.


                                 (i)  Phishing                             (ii)  Malware


                                (iii)  Ransomware                          (iv)  Password Cracking

                     2.  Select the action you should take if you notice unusual activity in your online account.

                                 (i)  Ignore it                            (ii)  Close the account


                                (iii)  Share password                      (iv)  Change password


                     3.  Identify the warning sign that indicates your account might have been hacked.

                                 (i)  Email from friend                    (ii)  Easy password


                                (iii)  Strange posts                       (iv)  Friends like posts


                     4.  Mark the correct statement about Two-Factor Authentication (2FA).

                                 (i)  Username only                        (ii)  Extra security


                                (iii)  Social media only                   (iv)  Stops strong passwords

                     5.  Choose the type of hacking where hackers pretend to be trusted people or companies.

                                 (i)  Phishing                             (ii)  Password cracking


                                (iii)  Malware                             (iv)  Ransomware



                  B.  Write ‘T’ for true and ‘F’ for false.

                     1.  Hackers can affect your online life and people around you.


                     2.  Receiving strange emails about account activity can be a sign of hacking.


                     3.  Public Wi-Fi is always safe to use for accessing sensitive information.

                     4.  Weak and simple passwords are easy to crack.


                     5.  Malware attacks are harmless software that helps protect your data.




                   94   Computer Science - V
   91   92   93   94   95   96   97   98   99   100   101