In this article we providing information regarding latest Cyber Threats Quiz Answers for Diksha Portal CIET and NCERT.
Cyber Threats Quiz Answers for Diksha Portal CIET and NCERT
We are giving Direct Questions and Answers.
Question 1 : What is the importance of keeping your software up to date?
Options –
- It can fix security vulnerabilities that malware can exploit
- It helps improve your computer’s perfomance
- It allows you to access new features.
- All of these
Answer – All of these
Question 2 : Which of the following is a preventative measure against identity theft?
Options –
- Monitoring financial statements
- Using strong passwords
- Regularly updating software
- All of these
Answer – All of these
Question 3 : What should you avoid while using public Wi-Fi ?
Answer – Logging in to personal accounts
Question 4 : How can organizations reduce the risk of employees failing for phishing attacks?
Answer – Discourage employees from clicking on any links in emails, even from seemingly legitimate sources and recommend employees never share their company login credentials with anyone
Question 5 : Why should you save evidence of cyberbullying?
Answer – To have proof when reporting the incident
Question 6 : Which of the following is the BEST way to protect yourself from malware?
Answer – Installing a reputable antivirus program
Question 7 : Which of the following statements best describes ‘Deepfake’ ?
Answer – It refers to synthetic media where images, audio, and video are created using artificial intelligence.
Question 8 : Which of the following is a sign that someone might be a victim of cyberbullying?
Answer – Avoiding social interactions and seeming distressed after using the internet.
Question 9 : Which of the following is not an example of digital Identity.
Options :
- PAN Card
- Device Type
- Aadhar Card
- Date of Birth
Answer – Device Type
Question 10 : Which type of cyber attack involves stealing personal information for unauthorized use?
Answer – Identity theft
Question 11 : What is identity theft?
Answer – Using personal information for fraud
Question 12 : What type of phishing attack involves sending emails that mimic legitimate business communications to device recipients?
Answer – Angler Phishing (phishing on social media platforms)
Question 13 : Which attack technique is often used in identity theft to deceive individuals into revealing personal information ?
Answer – Phishing
Question 14 : Where should you report a cyber fraud?
Answer – National Cyber Crime Reporting Portal
Question 15 : Why is it important to use strong passwords for your online accounts?
Answer – Strong passwords make it harder for hackers to guess
Question 16 : Why is AI considered a double-edged sward in cybersecurity?
Answer – It’s accessible to both defenders and attackers
Question 17 : Which of the following statements about spyware is true ?
Answer – Spyware can steal your personal information like passwords
Question 18 : Cyberbullying can happen through which of the following methods?
Answer – Emails, text messages, and social media
Question 19 : In a Man -in-the Middle (MitM) attack, who are the three main participants?
Answer – Victim, Entity, Man in the middle
Question 20 : Which of the following is NOT a good way to deal with cyberbullying?
Answer – Retaliating with mean comments
Question 21 : Which of the following is NOT a common way malware can infect a computer system?
Answer – Updating your operating system
Question 22 : How can you protect yourself from cyber threats?
Answer – Keep systems updated with patches
Question 23 : Why is cyberbullying often more harmful than traditional bullying ?
Answer – It can reach a larger audience quickly
Question 24 : Which of the following is a cyber threat ?
Answer – Unauthorized access to personal information
Question 25 : What is the best way to recover your files if they are encrypted by ransomware?
Answer – Restore your computer from a recent backup
Question 26 : What is the first step you should take if you suspect your computer is infected with malware?
Answer – Disconnect your computer from the internet.
Question 27 : What is email spoofing ?
Answer – Sending fake emails that appear genuine
Question 28 : What is cyberbullying ?
Answer – Using technology to harass someone intentionally
Question 29 : If you see someone being cyberbullied, what is a helpful action to take?
Answer – Offer support to the victim and report the incident
Question 30 : What is a major target of identity theft?
Option –
- All of these
- Social media accounts
- Bank account details
- Email address
Answer – All of these
Thanks to Beloved Readers.