Cyber Threats Quiz Answers for Diksha Portal CIET and NCERT

Cyber Threats Quiz Answers for Diksha Portal CIET and NCERT

In this article we providing information regarding latest Cyber Threats Quiz Answers for Diksha Portal CIET and NCERT.

Cyber Threats Quiz Answers for Diksha Portal CIET and NCERT

We are giving Direct Questions and Answers.

Question 1 : What is the importance of keeping your software up to date?

Options –

  • It can fix security vulnerabilities that malware can exploit
  • It helps improve your computer’s perfomance
  • It allows you to access new features.
  • All of these

Answer – All of these

Question 2 : Which of the following is a preventative measure against identity theft?

Options –

  • Monitoring financial statements
  • Using strong passwords
  • Regularly updating software
  • All of these

Answer – All of these

Question 3 : What should you avoid while using public Wi-Fi ?

Answer – Logging in to personal accounts

Question 4 : How can organizations reduce the risk of employees failing for phishing attacks?

Answer – Discourage employees from clicking on any links in emails, even from seemingly legitimate sources and recommend employees never share their company login credentials with anyone

Question 5 : Why should you save evidence of cyberbullying?

Answer – To have proof when reporting the incident

Question 6 : Which of the following is the BEST way to protect yourself from malware?

Answer – Installing a reputable antivirus program

Question 7 : Which of the following statements best describes ‘Deepfake’ ?

Answer – It refers to synthetic media where images, audio, and video are created using artificial intelligence.

Question 8 : Which of the following is a sign that someone might be a victim of cyberbullying?

Answer – Avoiding social interactions and seeming distressed after using the internet.

Question 9 : Which of the following is not an example of digital Identity.

Options :

  • PAN Card
  • Device Type
  • Aadhar Card
  • Date of Birth

Answer – Device Type

Question 10 : Which type of cyber attack involves stealing personal information for unauthorized use?

Answer – Identity theft

Question 11 : What is identity theft?

Answer – Using personal information for fraud

Question 12 : What type of phishing attack involves sending emails that mimic legitimate business communications to device recipients?

Answer – Angler Phishing (phishing on social media platforms)

Question 13 : Which attack technique is often used in identity theft to deceive individuals into revealing personal information ?

Answer – Phishing

Question 14 : Where should you report a cyber fraud?

Answer – National Cyber Crime Reporting Portal

Question 15 : Why is it important to use strong passwords for your online accounts?

Answer – Strong passwords make it harder for hackers to guess

Question 16 : Why is AI considered a double-edged sward in cybersecurity?

Answer – It’s accessible to both defenders and attackers

Question 17 : Which of the following statements about spyware is true ?

Answer – Spyware can steal your personal information like passwords

Question 18 : Cyberbullying can happen through which of the following methods?

Answer – Emails, text messages, and social media

Question 19 : In a Man -in-the Middle (MitM) attack, who are the three main participants?

Answer – Victim, Entity, Man in the middle

Question 20 : Which of the following is NOT a good way to deal with cyberbullying?

Answer – Retaliating with mean comments

Question 21 : Which of the following is NOT a common way malware can infect a computer system?

Answer – Updating your operating system

Question 22 : How can you protect yourself from cyber threats?

Answer – Keep systems updated with patches

Question 23 : Why is cyberbullying often more harmful than traditional bullying ?

Answer – It can reach a larger audience quickly

Question 24 : Which of the following is a cyber threat ?

Answer – Unauthorized access to personal information

Question 25 : What is the best way to recover your files if they are encrypted by ransomware?

Answer – Restore your computer from a recent backup

Question 26 : What is the first step you should take if you suspect your computer is infected with malware?

Answer – Disconnect your computer from the internet.

Question 27 : What is email spoofing ?

Answer – Sending fake emails that appear genuine

Question 28 : What is cyberbullying ?

Answer – Using technology to harass someone intentionally

Question 29 : If you see someone being cyberbullied, what is a helpful action to take?

Answer – Offer support to the victim and report the incident

Question 30 : What is a major target of identity theft?

Option –

  • All of these
  • Social media accounts
  • Bank account details
  • Email address

Answer – All of these

Thanks to Beloved Readers.

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply