Page 59 - Cyber Safety C-8
P. 59
A. Tick ( ) the correct option.
1. Cyber protection includes tools, practices, and used to secure computers,
networks, and information from attacks.
(i) careless actions (ii) responsible behaviours
(iii) entertainment activities (iv) online games
2. What is the aim of a cyber threat?
(i) harm a computer, smartphone, or online account
(ii) repair software
(iii) increase Internet speed
(iv) improve gaming performance
3. Identify the sophisticated modular malware primarily used as a banking Trojan but later evolved
into a platform for delivering multiple malware strains.
(i) DDoS attack (ii) Cloud Vulnerability
(iii) Phishing (iv) Emotet
4. Which option explains about ransomware attacks?
(i) clean viruses (ii) encrypt data and demand payment
(iii) create new passwords (iv) block social media accounts only
5. What is two-factor authentication?
(i) unnecessary steps
(ii) slower device performance
(iii) an extra security step during the login process
(iv) more advertisements
B. Write ‘T’ for true and ‘F’ for false.
1. Carelessness or lack of awareness can create weaknesses that cybercriminals exploit.
2. A message asking for an OTP cannot be a cyber threat.
3. Zero-day threats use vulnerabilities that have already been fixed by developers.
4. A trusted antivirus program provides essential protection against harmful software that
can damage a device or steal important information.
5. Free public Wi-Fi is safe for banking and academic work.
Cyber Protection and Security Basics 57

