Page 366 - Web_Application_v2.0_C12_Fb
P. 366

c.  A is true but R is false.
                 d.  A is false but R is true.
                 1.  Assertion (A): Using two-factor authentication (2FA) enhances the security of online accounts.
                    Reasoning (R): 2FA requires users to verify their identity through two separate means, such as a password and a
                    one-time code sent to their phone
               Ans.  a.
                 2.  Assertion  (A): Public Wi-Fi networks are completely safe for  accessing sensitive information, such as bank
                    accounts.
                    Reasoning (R): Public Wi-Fi networks often lack encryption, making it easier for attackers to intercept data.
               Ans.  d.

              E.  Statement-based questions.
                 Two statements are given. Statement 1 and Statement 2. Examine the statements and answer the question according
                  to the instructions given below:
                  a.  Statement 1 is True, Statement 2 is True
                 b.  Statement 1 is False, Statement 2 is False
                 c.   Statement 1 is True, Statement 2 is False
                 d.  Statement 1 is False, Statement 2 is True
                 1.  Statement 1: Using strong passwords helps in protecting personal data online.
                    Statement 2: Strong passwords include personal information like your name and birthdate.
               Ans.  c

                 2.  Statement 1: Phishing emails try to trick users into sharing personal information.
                    Statement 2: These emails often contain fake links and urgent messages.
               Ans.  a

              Unsolved Exercise



                                                              Section A
                                                      (Objective Type Questions)

              A.   Choose the correct option.
                  1.  What is the term for the trail of information you leave behind while using the internet?
                    i.  Online shadow                                 ii.  Digital echo
                    iii.  Digital footprint                          iv.  Online history
                  2.  Which of the following is NOT an example of an IPR?                              [CBSE Handbook]
                     i.  Copyright                                    ii.  Trademark
                    iii.  Patent                                     iv.  Trade secret

                  3.  What is the primary purpose of data privacy regulations?                         [CBSE Handbook]
                    i.   To restrict the use of the internet
                    ii.   To protect personal information from unauthorized access or misuse
                    iii.  To control the development of new technologies
                    iv.  To censor online content
                  4.  Which of the following is NOT a common method for spreading malware?
                    i.  Phishing Emails                               ii.  Malicious Websites
                    iii.  Infected Attachments                       iv.  Secure Websites

                364   Touchpad Web Applications (Ver. 2.0)-XII
   361   362   363   364   365   366   367   368   369   370   371