Q61. What is ‘social media phishing’?
a) The use of social media for marketing purposes
b) Using social media platforms to gain unauthorized access to user accounts
c) Creating fake social media profiles for fun
d) Enhancing social media account visibility
Show Answer
Correct Answer: b) Using social media platforms to gain unauthorized access to user accounts
Explanation: Social media phishing involves using social media platforms to deceive users into providing personal information or login credentials, often through fake profiles or malicious links, to gain unauthorized access.
Q62. What is the function of a ‘security certificate’ on a website?
a) To enhance website design
b) To verify the website’s identity and encrypt data transmitted between the server and browser
c) To increase website traffic
d) To manage website content
Show Answer
Correct Answer: b) To verify the website’s identity and encrypt data transmitted between the server and browser
Explanation: A security certificate, such as an SSL/TLS certificate, verifies the website’s identity and encrypts data transmitted between the server and browser, ensuring a secure connection and protecting sensitive information.
Q63. What is a common sign of a malware infection on a computer?
a) The computer runs faster than usual
b) Frequent pop-up ads and unexpected system crashes
c) Enhanced system performance
d) Increased internet speed
Show Answer
Correct Answer: b) Frequent pop-up ads and unexpected system crashes
Explanation: Frequent pop-up ads and unexpected system crashes are common signs of malware infection, indicating that malicious software may be affecting the computer’s performance and stability.
Q64. What is a ‘keylogger’?
a) A tool for encrypting data
b) A type of antivirus software
c) Malicious software that records keystrokes to capture sensitive information
d) A network monitoring tool
Show Answer
Correct Answer: c) Malicious software that records keystrokes to capture sensitive information
Explanation: A keylogger is malicious software designed to record keystrokes on a computer, capturing sensitive information such as passwords and personal data, which can then be used for unauthorized access or identity theft.
Q65. What is the primary purpose of a password manager?
a) To increase the speed of internet connections
b) To store and manage multiple passwords securely
c) To enhance system performance
d) To create new user accounts
Show Answer
Correct Answer: b) To store and manage multiple passwords securely
Explanation: A password manager securely stores and manages multiple passwords, making it easier for users to keep track of their credentials and ensuring that passwords are strong and unique for each account.
Q66. How can you protect your computer from unauthorized access?
a) By using a default password
b) By enabling strong authentication methods, such as biometrics or strong passwords
c) By sharing passwords with family members
d) By disabling user accounts
Show Answer
Correct Answer: b) By enabling strong authentication methods, such as biometrics or strong passwords
Explanation: Enabling strong authentication methods, such as biometrics or strong passwords, helps protect a computer from unauthorized access by providing secure verification methods that are difficult to bypass.
Q67. What is ‘phishing’?
a) A legitimate method of contacting individuals
b) A technique used to gain unauthorized access to information through deceptive means
c) A type of encryption algorithm
d) A network performance optimization tool
Show Answer
Correct Answer: b) A technique used to gain unauthorized access to information through deceptive means
Explanation: Phishing is a deceptive technique used to gain unauthorized access to information, such as passwords and personal data, by tricking individuals into revealing sensitive information through fraudulent communications.
Q68. How does a ‘secure socket layer’ (SSL) certificate help protect online transactions?
a) By encrypting data transmitted between the server and client
b) By managing website traffic
c) By increasing website visibility
d) By optimizing server performance
Show Answer
Correct Answer: a) By encrypting data transmitted between the server and client
Explanation: An SSL certificate encrypts data transmitted between the server and client, ensuring that sensitive information, such as credit card details, remains secure and protected from interception during online transactions.
Q69. What is the purpose of ‘network segmentation’ in cyber security?
a) To increase network speed
b) To divide a network into smaller segments to improve security and manageability
c) To enhance device performance
d) To optimize network bandwidth
Show Answer
Correct Answer: b) To divide a network into smaller segments to improve security and manageability
Explanation: Network segmentation involves dividing a network into smaller segments to improve security and manageability by isolating sensitive data and reducing the impact of potential breaches or attacks.
Q70. What is a ‘ransomware attack’?
a) A type of encryption tool
b) A cyber attack where data is encrypted and held hostage until a ransom is paid
c) A technique for increasing network speed
d) A method of securing personal data
Show Answer
Correct Answer: b) A cyber attack where data is encrypted and held hostage until a ransom is paid
Explanation: A ransomware attack involves encrypting a victim’s data and demanding a ransom payment to decrypt and restore access to the data. It is a form of malicious attack that targets sensitive information.