Which of them is not an ideal way of spreading the virus?
Answer
Infected website
Emails
Official Antivirus CDs
USBs
Question 2
Question
_______________deals with the protection of an individual’s information which is implemented while using the Internet on any computer or personal device.
Answer
Digital agony
Digital privacy
Digital secrecy
Digital protection
Question 3
Question
______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information.
Answer
Phishing attack
DoS attack
Website attack
MiTM attack
Question 4
Question
In _______________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware.
Answer
URL Redirection
DoS
Phishing
MiTM attack
Question 5
Question
Which of the following type of data, phishers cannot steal from its target victims?
Answer
bank details
phone number
passwords
apps installed in the mobile
Question 6
Question
A license allows a user to use copyright material
Answer
True
False
Question 7
Question
Malware affects both Windows and Linux systems
Answer
True
False
Question 8
Question
Saving passwords in the browser is a good habit
Answer
True
False
Question 9
Question
Data protection is mainly about the privacy of data stored digitally
Answer
True
False
Question 10
Question
Trojan horses are very similar to virus in the matter that they are computer programs that replicate copies of themselves