Page 138 - Cyber Safety C-8
P. 138

Before she even understood the situation, it escalated further. A deepfake video profile of Ishita appeared
                    online—her face on another body, paired with a fake AI-generated voice. A classmate, Karan, spread
                    rumours based on the deepfake, claiming Ishita was secretly ill and hiding things from the school.
                    Ishita was devastated. Her digital identity had been stolen, manipulated, and misused.
                    Both cyber incidents collided on the same day. The school’s cyber team noticed:

                        Mass ransomware alerts                            IoT device failures
                        Students receiving scam messages                  Fake videos circulating

                        Massive login attempts from unknown locations
                    It became clear: multiple systems were under attack at once.
                    Teachers informed the Cyber Cell. Officers arrived and traced:

                       The portal breach to Dev’s phishing email
                       The spyware and deepfake creation to Ishita’s AI app

                       The IoT takeover to weak device passwords
                       The spread of rumours to student misuse

                    Dev and Ishita were not criminals—but their careless actions had caused a chain reaction affecting the
                    entire school.
                    Based on the above case, answer the following questions:
                    1.  What was Dev’s first mistake?

                              a.  Ignoring the email


                              b.  Clicking a phishing link and entering his password

                              c. Updating his portal


                              d. Opening a safe file

                    2.  What type of malware locked the teachers’ files?

                              a.  Spyware                                    b.  Ransomware

                              c.  Adware                                     d.  Worm

                    3.  What did Ishita accidentally install through the AI app?

                              a.  Antivirus                                  b.  Spyware

                              c.  VPN                                        d.  Game

                    4.  Which feature did the malicious AI app misuse?

                              a.  Camera and speaker                         b.  Microphone, contacts, and files

                              c.  Bluetooth                                  d.  Keyboard





                                 Science
                                       - VIII
                  136136  Computer Science - VIII
                        Computer
   133   134   135   136   137   138