Q21. What is the function of a ‘secure socket layer’ (SSL) certificate?
a) To enhance website design
b) To encrypt data transmitted between a web server and browser
c) To increase website traffic
d) To improve website loading speed
Show Answer
Correct Answer: b) To encrypt data transmitted between a web server and browser
Explanation: An SSL certificate encrypts data transmitted between a web server and browser, ensuring that sensitive information, such as login credentials and payment details, is protected from interception.
Q22. How can you ensure that your online transactions are secure?
a) By using public Wi-Fi
b) By using a secure payment gateway with encryption
c) By ignoring SSL certificates
d) By sharing payment details via email
Show Answer
Correct Answer: b) By using a secure payment gateway with encryption
Explanation: Using a secure payment gateway with encryption protects online transactions by ensuring that sensitive information is encrypted and secure during transmission.
Q23. Which of the following is a sign of a potential phishing attempt?
a) An email from a known sender
b) A request for personal information from a reputable company
c) A suspicious email with urgent requests and unexpected attachments
d) A notification from your bank about a routine transaction
Show Answer
Correct Answer: c) A suspicious email with urgent requests and unexpected attachments
Explanation: Phishing attempts often involve emails with urgent requests for personal information and unexpected attachments. These signs indicate potential fraudulent activity aimed at obtaining sensitive data.
Q24. What is the importance of using a strong password for online accounts?
a) To ensure easy access
b) To prevent unauthorized access and enhance security
c) To improve user interface
d) To increase account visibility
Show Answer
Correct Answer: b) To prevent unauthorized access and enhance security
Explanation: Using a strong password, which includes a mix of letters, numbers, and symbols, helps prevent unauthorized access and enhances security by making it difficult for attackers to guess or crack the password.
Q25. Which practice is recommended for securing your online accounts?
a) Using the same password for multiple accounts
b) Regularly changing passwords and using unique ones for each account
c) Sharing passwords with friends
d) Disabling account recovery options
Show Answer
Correct Answer: b) Regularly changing passwords and using unique ones for each account
Explanation: Regularly changing passwords and using unique passwords for each account helps protect against unauthorized access and reduces the risk of multiple account breaches if one password is compromised.
Q26. How does enabling two-factor authentication (2FA) enhance account security?
a) By reducing the need for passwords
b) By adding an additional layer of verification beyond just a password
c) By increasing password complexity
d) By providing a backup for lost passwords
Show Answer
Correct Answer: b) By adding an additional layer of verification beyond just a password
Explanation: Two-factor authentication (2FA) enhances security by requiring a second form of verification, such as a code sent to your phone, in addition to your password, making it harder for unauthorized users to gain access.
Q27. What is the purpose of a security update for software?
a) To enhance user interface design
b) To fix security vulnerabilities and improve performance
c) To increase storage capacity
d) To reduce software costs
Show Answer
Correct Answer: b) To fix security vulnerabilities and improve performance
Explanation: Security updates address vulnerabilities in software, fixing potential security flaws and improving performance. Regular updates are essential to protect against new threats and ensure the software remains secure.
Q28. What does a ‘malware’ refer to in the context of cyber security?
a) A type of hardware
b) A malicious software designed to damage or gain unauthorized access to systems
c) A form of encryption
d) A security policy
Show Answer
Correct Answer: b) A malicious software designed to damage or gain unauthorized access to systems
Explanation: Malware is a type of malicious software created to damage, disrupt, or gain unauthorized access to computer systems. It includes viruses, worms, trojans, and ransomware.
Q29. What is a common feature of phishing emails?
a) Professional language and format
b) Request for personal information or login credentials
c) Detailed information about the sender
d) No links or attachments
Show Answer
Correct Answer: b) Request for personal information or login credentials
Explanation: Phishing emails often request personal information or login credentials under the guise of a legitimate request. They may contain links or attachments that lead to malicious sites or malware.
Q30. What is a common way to protect your computer from viruses?
a) Using strong passwords
b) Installing antivirus software and keeping it updated
c) Using public Wi-Fi
d) Ignoring software updates
Show Answer
Correct Answer: b) Installing antivirus software and keeping it updated
Explanation: Installing and regularly updating antivirus software helps protect a computer from viruses and other malicious threats by detecting and removing malware that can compromise the system’s security.