Ticker

6/recent/ticker-posts

Cyber Security Free Course With Certificate

 Cyber Security Course , Cyber Security Quiz, Free online cyber security course

Cyber Security Free Course With Certificate || Free Online Cyber Security Course || Cyber Crime Awareness

Hello everyone most welcome on my blog. Today in this post I will tell you about a new and most interesting quiz competition. This is an online quiz competition on Cyber Security. This quiz competition is organized by The Library of Kendriya Vidyalaya No.1,  Roorkee . In this quiz competition school students can participate . There is no any registration fee . There is no any time limit . There is no any negative marking. There is total 20 MCQ. All questions are related to basic knowledge of Cyber Security. 

Important:

Per day only 100 certificates are generated means per day only 100 students can participate . If you find quiz link is closed then please participate in the next day in this quiz competition .

After Quiz Completion Each Students Will Receive This Type of Participation Certificate.

Cyber Security Free Course With Certificate


Here You can sell all the questions which are asked in this quiz competition

 

1. What is the penalty for publishing images of a person's private parts without consent, as per IT Act 2000?


Life imprisonment

5 years imprisonment or 5 lakh rupees penalty or both

Two year imprisonment or 1 lakh rupees penalty or both

3 years imprisonment or 2 lakh rupees penalty or both


2. Which one of the following would be considered the BEST way to store a PIN number?


Keep a written note of it in your office drawer.

Keep a written note of it with you bank cards.

Store it on your computer

Memories it.


3. Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This practice is called …


Ransomware

Botnet

Spamming

Phishing


4. Which one of the following can protect a computer from the risk of unwanted emails?


PC diagnostic software.

Anti-spam software.

Anti-virus software.

Anti-spyware software.


5. A group of computers that is networked together and used by hackers to steal information is called a …


Rootkit

DDoS

Operating system

Botnet


6. Which one of the following is MOST likely to be a hoax?


An email with an attachment sent by a colleague using their personal email address.

An email from a friend you have not seen recently.

An email advertisement from a local shop you subscribe to.

An email asking you to go to a website for a free computer scan.


7. What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?


That information entered into the site is encrypted

That the site is not accessible to certain computers

That the site is the newest version available

That the site has special high definition


8. Which one of the following describes why firewalls are used?


To detect and disable viruses already on a computer.

To prevent unauthorized access by incoming transmissions.

To enable easy downloading of data from web sites.

To prevent destruction of a computer in the event of a fire.


9. If a public Wi-Fi network (such as in an airport or café) requires a password to access, is it generally safe to use that network for sensitive activities such as online banking?


Yes, it is safe

No, It is not Safe

Safe and unsafe

None of these


10. Which Act in India focuses on data privacy and information technology?


IT Act 2000

IT (amendment) Act 2008

Indian Penal Code

Banking Regulation Act 1949


11. Which of the following is an example of a “phishing” attack?


Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows

Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information

Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest

All of the above


12. Some websites and online services use a security process called two-step authentication. Which of the following images is an example of two-step authentication?


Option 1

Option 2

Option 3

None of these


13. Which of the following four passwords is the most secure?


mydateofbirth@

123Brinda

Password123

Grisha@923#1089


14. What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?


Use of insecure Wi-Fi networks

De-anonymization by network operators

Key-logging

Phishing attacks


15. Which section of IT Act 2000 deals with the punishment for cheating by impersonation by using computer resources?


Section 66C

Section 66B

Section 66D

Section 66F


16. You are on a business trip and sitting in the local cafe trying to send emails to your colleagues to catch up on a few tasks.


Use a Virtual Private Network (VPN)

Use private browsing

Turn off your file sharing

Find the strongest WiFi signal near you


17. Which one of the following is the recommended action to prevent the risk of access to a network by other users?


Change the default WEP or WPA access key to one that only you know.

Disconnect the computer from the network.

Adjust the Internet security settings.

Complain to the System Administrator


18. Which one of the following describes why it is important to update antivirus software regularly?


To protect your computer from all known viruses.

To protect your computer from unwanted bulk messages.

To prevent the spread of malicious programs on the Internet.


19. This type of attack is designed to hinder the normal operation of a website, or other network resource.


DoS attack

Ransomware

PoS attack

Phishing


20. Which one of the following should you use to backup personal data?


A friends computer

A Printout

A Labelled CD

A website offering file sharing service

For Answers of This Quiz Competition Click On The Following Video


Quiz Link: Click Here


Please Like and Subscribe My Youtube Channel (CS TECH)  For More Quizzes and Free Certification Courses Click On The Following Link


Youtube Channel Link:CS TECH

Post a Comment

0 Comments

Ad Code