Q51. What does ‘browser history’ refer to?
a) The list of websites visited by a user
b) The data stored on a user’s hard drive
c) The email messages sent and received
d) The files downloaded from the internet
Show Answer
Correct Answer: a) The list of websites visited by a user
Explanation: Browser history is a record of websites visited by a user, which can be accessed through the browser’s history feature. Clearing browser history can help protect privacy and security.
Q52. What is a common way to protect your smartphone from malware?
a) Installing apps from unknown sources
b) Using strong passwords and avoiding suspicious links
c) Disabling security updates
d) Ignoring app permissions
Show Answer
Correct Answer: b) Using strong passwords and avoiding suspicious links
Explanation: Using strong passwords and avoiding suspicious links helps protect a smartphone from malware by reducing the risk of downloading malicious software or falling victim to phishing attempts.
Q53. What is the purpose of using a VPN?
a) To improve network speed
b) To encrypt internet traffic and protect privacy
c) To increase storage capacity
d) To enhance device performance
Show Answer
Correct Answer: b) To encrypt internet traffic and protect privacy
Explanation: A VPN (Virtual Private Network) encrypts internet traffic and routes it through a secure server, protecting privacy and security by preventing unauthorized access to data and maintaining anonymity online.
Q54. What is the role of antivirus software?
a) To improve internet connectivity
b) To detect, remove, and prevent malicious software
c) To manage user files
d) To enhance device graphics
Show Answer
Correct Answer: b) To detect, remove, and prevent malicious software
Explanation: Antivirus software detects, removes, and prevents malicious software, such as viruses and malware, helping to protect the system from potential security threats and ensuring smooth operation.
Q55. How can you secure your browser’s cookies?
a) By clearing cookies regularly
b) By using multiple browsers
c) By sharing cookies with third-party sites
d) By disabling cookies entirely
Show Answer
Correct Answer: a) By clearing cookies regularly
Explanation: Clearing cookies regularly helps protect privacy by removing stored data that could be used to track browsing behavior. It also reduces the risk of cookies being exploited for malicious purposes.
Q56. What is ‘data encryption’?
a) A method of increasing data transfer speed
b) A process of converting data into a secure format
c) A technique for improving software performance
d) A tool for managing network traffic
Show Answer
Correct Answer: b) A process of converting data into a secure format
Explanation: Data encryption converts data into a secure format that is unreadable to unauthorized users. This process protects sensitive information during storage and transmission, ensuring confidentiality and integrity.
Q57. What is a ‘security breach’?
a) A software update
b) Unauthorized access to a system or data
c) A network optimization technique
d) A type of encryption algorithm
Show Answer
Correct Answer: b) Unauthorized access to a system or data
Explanation: A security breach occurs when unauthorized individuals gain access to a system or data, potentially leading to data theft, loss, or damage. It is a serious issue that requires immediate attention and remediation.
Q58. How can you protect your email from phishing attacks?
a) By using a simple password
b) By opening all email attachments
c) By verifying the sender’s email address and avoiding clicking on suspicious links
d) By sharing your email password with others
Show Answer
Correct Answer: c) By verifying the sender’s email address and avoiding clicking on suspicious links
Explanation: Verifying the sender’s email address and avoiding clicking on suspicious links helps protect against phishing attacks by reducing the risk of falling victim to fraudulent schemes aimed at stealing personal information.
Q59. What is a ‘firewall’?
a) A type of antivirus software
b) A network security device that monitors and controls incoming and outgoing traffic
c) A method of encrypting data
d) A tool for optimizing internet speed
Show Answer
Correct Answer: b) A network security device that monitors and controls incoming and outgoing traffic
Explanation: A firewall is a network security device that monitors and controls incoming and outgoing traffic based on predefined security rules. It helps protect systems from unauthorized access and cyber threats.
Q60. What is a ‘trojan horse’ in the context of cyber security?
a) A type of encryption tool
b) A legitimate software application
c) Malicious software disguised as a legitimate program
d) A network optimization technique
Show Answer
Correct Answer: c) Malicious software disguised as a legitimate program
Explanation: A trojan horse is malicious software that disguises itself as a legitimate program to trick users into installing it. Once installed, it can perform harmful actions such as stealing data or providing unauthorized access.