Organizer: CHRIST COLLEGE OF SCIENCE AND MANAGEMENT Hosur-Malur Main Road, Alambady, Malur, Karnataka-563160
About the Quiz
- Date : 13th-19th November 2024
- Free Participants
- Open to All
- E-Certificates will be issued to all participants.
Apply Link
This International Fraud Awareness Week, the Department of Management, Department of Library and Information Center and NDLI in collaboration with IIC & IQAC presents an E-Quiz on Cyber Security Awareness as part of our Christ Social Responsibility initiative from 13th-19th November 2024.
Challenge yourself and learn essential skills to protect yourself and others in our increasingly digital world. Let’s build a safer cyber community together—your knowledge is your best defense!
For further details about Cyber Security, please go through UGC’s recently released e-book – A Handbook on Basics of Cyber Hygiene.
100% Correct Answers Here
The _, includes any public web content that is indexed by search engines.
*
White web
Dark web
Cyberspace
Deep web
__ refer to the information available in cyberspace or on digital devices due to the digital activities undertaken by an individual.
*
Digital data
Digital footprints
Cyber information
None of the above
A __ occurs when unauthorized individuals, including insiders or external attackers, access confidential or sensitive information stored in computer systems without proper authorization.
*
cyber crime
cyber attack
data breach
digital divide
Which among the following is not part of the CIA Triad?
*
Confidentiality
Integrity
Accountability
Availability
__ is a term that combines elements of law and computer science to analyze data and secure data from computer systems, networks, wireless communications, and storage devices in a way that the information derived from them can be used as evidence in a court of law.
*
Cyber laws
Cyber security
Digital forensics
Digital security
_ is the psychological manipulation of people into performing actions or divulging confidential information.
*
Malware
Social engineering
Ransomware
All of the above
Which among the following is not an example of Ransomware?
*
WannaCry
Bad Rabbit
Trojan Horse
Ryuk
A ___is a type of malware that replicates itself and propagates automatically across a network.
*
virus
trojan horse
worm
backdoor
A _ is a type of software that enables hackers to access and control a device.
*
virus
backdoor
worm
rootkit
_ is malicious software that displays unwanted pop-up advertisements which can appear on a computer or mobile device.
*
Adware
Malware
Ransomware
Scareware
_ entails sending emails or messages to specific individuals while pretending to be a trusted sender to convince them to share personal information or money or to compromise their digital devices.
*
Spear phishing
Vishing
Smishing
Pharming
_ are complex audio, video, or images that are created using artificial intelligence (AI) algorithms based on ‘deep learning’ techniques
*
Deepfakes
Impersonation
Spoofing
Identity frauds
A cyberattack in which an infected USB charging station is used to compromise linked devices is known as _.
*
juice jacking
phishing
spamming
spoofing
__ is the act of sharing personal information or documents online without the owner’s consent
*
Cyber bullying
Phishing
Doxxing
Embezzlement
Which among the following is not a cyberterrorism attack?
*
Wannacry Ransomware
SolarWinds
Operation Cloud Hopper
MADO
_ is an act of using romantic or intimate relationships for interpersonal, political, or financial reasons to obtain sensitive information.
*
Honey trapping
Whaling
Doxxing
Cyberbullying
What is the helpline number if the cybercrime victim is a child?
*
1098
181
1091
1081
The Information Technology Act, 2000 also known as an IT Act is an act proposed by the Indian Parliament reported on_____.
*
17th October 2000
17th November 2000
17th October 2010
17th November 2010
What is the main objective of the Information Technology Act, 2000?
*
To promote international relations
To regulate foreign trade
To prevent cyber crimes
To provide legal recognition for e-commerce and digital signatures
Which section of the IT Act, 2000, deals with penalties for sending offensive messages through communication services?
*
Section 66A
Section 69
Section 43
Section 72
Which of the following is not covered under the IT Act, 2000?
*
Digital signatures
Cyber terrorism
Intellectual property rights
Electronic governance
Which among the following is not an organisation dealing with Cybercrime and Cyber security in India?
*
National Technical Research Organisation (NTRO)
Computer Emergency Response Team-India (CERT-In)
Central Bureau of Investigation (CBI)
Insurance Regulatory and Development Authority of India (IRDAI)
Which of the following is the most commonly used method to protect sensitive data during transmission over the internet?
*
Compression
Backups
Encryption
Archiving
What type of software is specifically designed to detect and remove malicious software like viruses and worms?
*
Firewall
Antivirus Software
Proxy Server
Browser
Multi-factor authentication (MFA) improves security by
*
Using only one password for all accounts
Requiring users to present multiple forms of verification
Providing multiple ways for users to access the system
Allowing access without verification
What type of cyber-attack does a firewall help to prevent?
*
Physical theft of data
Unauthorized access to a network
Hardware malfunction
Cyber laundering
What is the purpose of a Virtual Private Network (VPN) in cybersecurity?
*
To increase internet speed
To compress data files
To create a secure connection over public networks
To protect against phishing attacks
What does the term “patch management” refer to in cybersecurity?
*
Blocking user access to the network
Ensuring operating systems and software are updated with security patches
Limiting users to specific resources on a network
Encrypting files on the network
Which of the following describes “cyberbullying”?
*
Making positive comments on a post
Repeatedly sending or posting harmful, insulting, or threatening messages
Sharing educational content
Encouraging group discussions
Which law in India can penalize users for defamation through social media?
*
The Indian Penal Code (IPC), Section 499
IT Act, Section 66A
Indian Contract Act
Consumer Protection Act
Have a Blessed Thursday Afternoon to everyone and God Bless us all❤️❤️❤️