1. USB drives are popular for storing and
transporting data, but some of the characteristics
that make attackers convenient to introduce
security risks like,
O DDoS
O shoulder surfing
▶️ Malware delivered via USB
2. Mrs. Gupta received a call saying that her name
& number, has been shortlisted from the customers
who had shopped earlier that week from XYZ mal.
They said she has won a cash prize of Rs.15000/
and a cheque towards that amount will be sent over
to her with a special gift for her. They told her that
to encash that amount she has to pay a nominal
amount of Rs.1000/- towards processing fee and
gave her the details of the number where she pay
the amount. What are the facts that Mrs. Gupta
should think over and consider in the above
scenario?
O She should understand that any prize
amount/lottery/gift which asks for any fee as
upfront payment is fake.
O You cannot win a lottery/gift/contest/free gift
you did not enter or register.
O No legitimate contest issue a free cheque as
partial/full payment as post dated cheque
asking for some portion as repayment.
O All the above
▶️ All the above
3. Can mobile phone be used as a USB device and what is the use of connecting mobile as a USB
O Yes, it can be used as a storage device and takke
back of all data in the phone to an external
device
O Yes, for charging purpose only
O May be
▶️ may be
4. Mr. Prakash had connected to hotel network and
done a bank transaction of Rs. 4K to pay the hotel
bil. After one hour he got a message while
travelling back to airport that his bank account was
debited of another 5K without his knowledge. What
is the reason?
O Stranger around him had noted the details of his
card and later did the transaction on his behalf.
O His bank details was hacked because he had
used public WiF
O He had not used public WiFi but had enabled
auto connect features.
○ The loss could be due to any of the above
options
▶️His bank details was hacked because he had
used public WiF
5. How Does Temperature Affect The Performancee of Computer Components?
O Temperature may damage the hardware
components of computer
O Temperature may damage the hardware and
software of the computer
O i don’t think temperature will affect the
performance of computer
▶️ Temperature may damage the hardware
components of computer
6. Why You Should Never Use Airport USB
Charging Stations
O your data can be hacked
O your device can be corrupted
O your device can be stolen
▶️ your data can be hacked
7. How is it that you think that you can help the
senior citizens and elderly in your family and
community while handling the digital devices and
while communicating/transacting online?
O By extending necessary
guidance/support/training required for
operating digital devices and while
communicating/making online transactions.
O By providing them with user friendly device
enabled with safety and security features.
O Educating them appropriately about the online
dangers/threats and measures to be safe and
about importance of never sharing financial
information or making payment upfront.
O All the above
▶️ All the above
8. Wi-Fi, by its nature is open technology,.
ensures security of your data.
O Wi-Fi extender
O Wi-Fi password
O VPN encryption
▶️ VPN encryption
9. Smart devices are naturally vulnerable to
threats.
Sensors
O Heterogeneity
○ Security
O Connectivity
▶️ Security
10. Do you think all popular social media
platforms/websites offer two-factor
authentication?
OYes, mostly all the popular social media
platforms /websites offer 2FA
ONo, mostly all the popular social media
platforms /websites do not offer 2FA
11. Keshav got an email that appeared to be from
his bank saying that they have updated a software
in the bank and will need the customers to update
their data to enable them to continue using their
services without any technical issue. The mail also
mentioned that they have to do the needful before
evening to avoid deactivation of account. They had
given a link from where the customers can update
their details. What do you think Keshav should do
in the above scenario?
OKeshav should call up the phone number given
in the email and confirm about details given.
OHe should personally go to the bank and contact
the officials.
OHe should call up the authentic phone numbers
taken from original site of the bank and confirm
about the authenticity of mail.10. Do you think all popular social media
platforms/websites offer two-factor
authentication?
OYes, mostly all the popular social media
platforms /websites offer 2FA
O No, mostly all the popular social media
platforms /websites do not offer 2FA
▶️ No, mostly all the popular social media
platforms /websites do not offer 2FA
11. Keshav got an email that appeared to be from
his bank saying that they have updated a software
in the bank and will need the customers to update
their data to enable them to continue using their
services without any technical issue. The mail also mentioned that they have to do the needful before evening to avoid deactivation of account. They had given a link from where the customers can update
their details. What do you think Keshav should do
in the above scenario?
O Keshav should call up the phone number given
in the email and confirm about details given.
O He should personally go to the bank and contact
the officials.
O He should call up the authentic phone numbers
taken from original site of the bank and confirm
about the authenticity of mail.
▶️ He should call up the authentic phone numbers
taken from original site of the bank and confirm
about the authenticity of mail
12. Using email hacking, illicit hackers can send &
spread
viruses,
and spam
emails
O trojans, redirected malicious URLs
Oantivirus, patches
genuine software, redirected malicious URLs
Omalware, security patches
▶️ trojans, redirected malicious URL
13. How does 2FA work?
O by asking password recovery questions
O by giving password reset option
by asking your personal information and
confirming with previously provided responses.
▶️ by giving password reset option
by asking your personal information and
confirming with previously provided responses.
14. Which of the following are safe mode of
money transactions at shopping centers ? i) UPI
banking with limited amount in the wallet ii) Cash
transactions i) Using debit/credit card
i) and i)
i) and ii)
ii) and ii)
i), i) and ii)
▶️ i), i) and ii)
15. What will you recommend your friend who is
using one unique password for all his accounts from
many years, but still no security breach has
happened?
Will not recommend anything as no security breach
has happened.
Tell your friend to change the password regularly and
use same password for all his account.
Tell your friend to change the password regularly and
use different passwords for different accounts
▶️ Tell your friend to change the password regularly and
use different passwords for different accounts
16. What according to you is the main reason to
secure your personal desktop/laptop?
to secure your personal information only
to secure your financial information only
to secure all information available in the desktop
▶️ to secure all information available in the desktop
17. Using email hacking, ilicit hackers can send
&Ques spread, viruses,and spam emails.
trojans, redirected malicious URLs
antivirus, patches
genuine software, redirected malicious URLs
malware, security patches
▶️ trojans, redirected malicious URLs
18. Your personal hotspot is often a safer
alternative to free Wi-Fi.
Yes
No
▶️ Yes
19. How effective is one spam filter to protect
your e-mail from all kind of malicious emails ? i.
Spam emails may carry virus and attack your system
through e-mail, so using a spam filter can protect
your e-mail and also your system ii. spam emails fills
your inbox and make it difficult to find the genuine e
mails, spam filter will reduce the spam e-mails and
protect your email ii. spam emails will block email
bombing
option i
option ii and ii
option i and ii
option i, i and ii
▶️ option ii and ii
20. What information is conveyed by the SSID
that is configured on an smart device
the registration server
the wireless network
the default network
the home network
▶️ the wireless network
21. How to stop Data Leakage via USB devices
Disable unused USB ports
Plug-in USB “locks” to physically secure unused ports
Use data blocker
▶️Plug-in USB “locks” to physically secure unused ports
22. Can Mobile phone be hacked through
Bluetooth connectivity?
Yes
No
May be
▶️ may be
23. Roshan has downloaded an ‘mobile torch
app’ on his mobile, while installing the app. it was
required to give permissions to it to access to mobile
resources like location, contacts, gmail account etc.,
Do you think Roshan should download such an app,
that requires permissions? Why?
Roshan should not download apps that ask for
permission to access personal details which is
unnecessary for the application, he should be wary of
any third party apps. This is an unhygienic practice and
can lead to safety/privacy breach causing security
threats.
Roshan may only give the permissions and check the
performance of the application and incase it is
unsatisfactory he may delete it latter. Such minor
apps do not pose any issues.
It is upto Roshan to download the app or not, as it is
his mobile’s security at stake.
None of the above
▶️ Roshan may only give the permissions and check the
performance of the application and incase it is
unsatisfactory he may delete it latter. Such minor
apps do not pose any issues.
It is upto Roshan to download the app or not, as it is
his mobile’s security at stake.
24. What is mostly used to protect the systemn
or network from malware, worms, and viruses?
Firewall
VPN
Password
All of these
▶️ Firewall
25. How Does Temperature Affect The
Performance of Computer Components?
Temperature may damage the hardware components
of computer
Temperature may damage the hardware and software
of the computer
I don’t think temperature will affect the performance of
computer
▶️ Temperature may damage the hardware components
of computer
26. Ccybercriminals leave USB devices for
people to find and plug into their computers. what is
this and what are the risk associated?
Universal Serial Bus (USB) drop attack, it can have
malware infected files
Social engineering attack, to steal data
spyware to spy on your data
▶️ Universal Serial Bus (USB) drop attack, it can have
malware infected files
27. If an attacker is able to gain administrative
access to your firewall of your personal computer, it is
considered your network security is ‘compromised’.
Your Antivirus cannot prevent unwanted access. Do
you agree to this ?
Yes,configuring the personal firewall is necessary
No, it is ok if you don’t configure your firewall, and
use only antivirus
▶️No, it is ok if you don’t configure your firewall, and
use only antivirus
28. Pallavi received an email from a popular
banking organization, that said that she has been
shortlisted for an interview and she needs to click the
link given in the mail and submit necessary details for
further processing as soon as possible ? What do you
think Pallavi should do once she reads the mail ?
She can look at the kind of job being offered and if
offer is lucrative she can immediately apply.
She can call the numbers given in the mail and cross
verify with them reg. the offer.
She should check for possible signs of cyber
fraud/scam like general addressing instead of her
name, reference to the advt. Published in
Newspapers, spelling mistakes, website id(https) etc.,
and then call up the specific bank (with contact no.
fm original site) to confirm.
▶️ She should check for possible signs of cyber
fraud/scam like general addressing instead of her
name, reference to the advt. Published in
Newspapers, spelling mistakes, website id(https) etc.,
and then call up the specific bank (with contact no.
fm original site) to confirm.
29. Ques 17. What are the factors that make the senior
citizens vulnerable to cyber threats ?
Their inaptness/difficulty in using the digital devices
and handling online transactions/communication.
Not being aware of the various kinds of cyber
threats/dangers that are possible during online
transactions/communication and how to handle them.
Lack of knowledge of the new technology trends and
their usage and lack of support or guidance to handle
the technology and digital devices
All the above
▶️ All the Above
30. While attending online sessions/classes, is
it advisable to use the class code shared by your
classmate, with outsiders also ?
Yes, it is safe
No, it is not safe
▶️ No, it is not safe
31. What is basic cyber hygiene practice that
you should be aware about to protect yourself from
social engineering techniques employed by
fraudsters?
Never share your private and sensitive financial
information like PIN/OTP/Password with anyone and
never click on links or download attachments
received from unknown sources.
It is better to avoid using digital devices for any
financial transactions as it can be risky.
▶️ Never share your private and sensitive financial
information like PIN/OTP/Password with anyone and
never click on links or download attachments
received from unknown sources.
32._ provides an isolated tunnel across a
public network for sending and receiving data
privately as if the computing devices were directly
connected to the private network.
Visual Private Network
Virtual Protocol Network
Virtual Protocol Networking
Virtual Private Network
▶️ Virtual Private Network
33. Clicking a link received through email from
an unknown source may redirect tothat
automatically installs malware in your system.
that vendor’s site
security solution site
malicious site
software downloading site
▶️ malicious site
34. Mrs. Gupta receiveda call saying that her
name& number, has been shortlisted from the
customers who had shopped earlier that week from
XYZ mall. They said she has won a cash prize of
Rs.15000/- and a cheque towards that amount will be
sent over to her with a special gift for her. They told
her that to encash that amount she has to pay a
nominal amount of Rs.1000/- towards processing fee
and gave her the details of the number where she pay
the amount. What are the facts that Mrs. Gupta
should think over and consider in the above scenario?
She should understand that any prize
amount/lottery/gift which asks for any fee as upfront
payment is fake.
You cannot win a lottery/gift/contest/free gift you did
not enter or register.
No legitimate contest issue a free cheque as
partial/full payment as post dated cheque asking for
some portion as repayment.
All the above
▶️ All the Above
35. Does turning off your modem every night
ensure safety?
No, it does not ensure safety
Yes it does ensure safety
▶️Yes it does ensure safety
36. You are at an Airport waiting for your flight
and working on your personal laptop; a stranger
sitting near you requests you to use your personal
laptop citing some emergency. Will you give your
laptop and do you think it is wise to share your
personal laptop with strangers?
Yes,I will give and ask him to access the personal
laptop in-front of me
No I will politely reject
I will share without a second thought
▶️No I will politely reject
37. Once connected to public Wi-Fi, it is always
safe to use a– to ensure that your activity remains
private.
VPN
Hotspot
Any network
▶️ VPN
38. One of the student in online class complains
that he is unable to follow the lecture as he could not
hear properly, whereas all others could follow and
hear it. Why only one student has the issue.
The student’s network bandwidth is low due to which
his/her audio quality is low.
The student’s credentials were not properly matched
by the IT administrator as the student is a new joiner
to that class, so he had an issue.
The student is lying because he is not interested in the
class and watching some other video during the class.
Any one of the above.
▶️ Any one of the above.
39. Acan hide a user’s browsing activity.
Firewall
Antivirus
Incognito mode
VPN
▶️ Incognito mode
40. Mr. Verma was a retired person who lived
alone. He had recently started interacting with his old
friends and others through social media platforms to
engage himself online socially. He received a friend
request from one Mrs. Gupta, who claimed to be his
old school mate, from the same school. After some
interaction, she asked him if he could help her with
some amount, as she needs it for some urgent need
that will be returned within some time. What do you
think Mr. Verma Should do, in the above situation?
He should give her the amount and see if she returns
the amount in time.
He should give her only some part of the amount
asked for.
He should block her account and not entertain her at
all.
He should gracefully decline and as a policy not enter
into any kind of financial transactions or exchange
financial information with people online whose
identity he is not sure of.
▶️ He should gracefully decline and as a policy not enter
into any kind of financial transactions or exchange
financial information with people online whose
identity he is not sure of.
41. What do you mean by online identity theft, why is
it generally used?
Oldentity Theft basically is using personal/private
information/details without knowledge, to
commit fraud.
O It is using financial details of a person to
commit online theft.
Otis using the someone else’s photograph for
your profile.
Ans. It is using financial details of a person to
commit online theft.
42 . The salesman in the shopping centre tried to
swipe Ms. Priya’s contactless debit card which was
in her wallet, but failed to do so. What do you think
is the reason?
O She was not carrying her contactless card.
OShe had kept it safely in a metal card holder
shield in her wallet.
OShe had kept the wallet safely her handbag.
Oall the above.
▶️ All the Above
43. How to stop Data Leakage via USB devices
O Disable unused USB ports
O Plug-in USB “locks” to physically secure unused
ports
O Use data blocker
▶️ Plug-in USB “locks” to physically secure unused
ports
44. You are in a public place and your mother calls
you and asks for the credit card password, what do
you do?
OTell her the password over the mobile instantly
O You will send her an SMS over her personal
mobile and ask her to check the same without
sharing with anyone.
You will come a little away from the crowd and
then tell her the password.
▶️You will send her an SMS over her personal
mobile and ask her to check the same without
sharing with anyone.
45. What security threats do employee-owned
devices pose by storing corporate data and
accessing corporate networks?
OData loss
OMaking infrastructure vulnerable to malware
O Potential for noncompliance
O All of the above
▶️ All the Above
46. What security threats do employee-owned
devices pose by storing corporate data and
accessing corporate networks?
OData loss
Making infrastructure vulnerable to malware
OPotential for noncompliance
OAll of the above
▶️ All the Above
47. Your neighbour/friend wants to set up a Wi-Fi
network for the first time. What network encryption
would you recommend for configuring a Wi-Fi
router?
OWired Equivalent Privacy (WEP)
OWi-Fi Protected Access (WPA)
Wi-Fi Protected Access Version 2 (WPA2)
▶️ Wi-Fi Protected Access Version 2 (WPA2)
48. What is basic cyber hygiene practice that you
should be aware about to protect yourself from
social engineering techniques employed by
fraudsters?
ONever share your private and sensitive financial
information like PIN/OTP/Password with
anyone and never click on links or download
attachments received from unknown sources
OIt is better to avoid using digital devices for any
financial transactions as it can be risky.
▶️ ONever share your private and sensitive financial
information like PIN/OTP/Password with
anyone and never click on links or download
attachments received from unknown sources
49. Keep your computer’s
up-to-date to
protect your system from malware, ransomware
attacks
O Operating system
OHardware
Both
None of above
▶️ Both
50. Which of the following are safe mode of money
transactions at shopping centers? i) UPI banking
with limited amount in the wallet i) Cash
transactions ii) Using debit/credit card
O) and i)
Oi) and ii)
i) and ii)
O i), i) and ii)
▶️ ¡) and ¡¡)
51. What do you think is a social engineering
threat?
OManipulation by fraudsters to get access to your
private and sensitive information for committing
frauds.
OFraudsters making a scheme or plan to commit
financial frauds.
OFraudsters socially cheating general public by
stealing their money.
▶️ OManipulation by fraudsters to get access to your
private and sensitive information for committing
frauds.
52 . On most home computers, how often should
you update your operating system and security
software??
OOnce a month
OEvery day
No Need to Update
OAs in when update is received
▶️ Once a month
53. 36. Ensure your Mobile device is protected with a
to ensure security
O OTP
OPIN/Password
OCRN
Ocvv
▶️ PIN/ Password
54. Varun got an email that apPpeared to be from Income Tax Department, saying ‘due to COVID 19
pandemic the government has decided to refund
the tax amount paid’, they had provided him a link
and asked him to follow the link refund of the
amount. What do you think Varun should do in the
above case?
OFollow the link and give the details as it can give
him some financial benefit.
O He should be wary of such offers and
immediately delete the mail.
OHe should try to check the authenticity of mails
carefully and ensure that he does not divulge
any kind of financial details or click suspicious
links attachments from unknown sourcesS.
▶️ Follow the link and give the details as it can give
him some financial benefit.
55.
is a facility introduced by banks to
use money for commercial transactions
OAPY
OMutual funds
OE wallet
PMAY
▶️ Mutual Funds
56. When someone’s personal information is used
without permission, what is it known as?
Identity Theft
OCredit Fraud
O Communication Fraud
OInvestment Fraud
▶️ Identity Theft
57. Ms. Shilpa had asked her train friend to take
care of her laptop and mobile device when she
went for rest room. Is it safe to do so?
ONo, never leave your devices unattended.
OYes, because she had protected them with
strong password.
ONo, the train friend can connect malicious pen
drive without her knowledge which can inject
malicious software.
OFollow both option1 and option3.
▶️ Follow both option1 and option3.
58. 45. It is possible to erase the data from your
mobile device remotely using apps
OYes
ONo
▶️ Yes
59. Smart devices are naturally vulnerable to
threats.
OSensors
O Heterogeneity
OSecurity
O Connectivity
▶️ Security
60. What do you suggest your neighbour who
complaints that their child is watching age
inappropriate content while browsing internet.
OSet boundaries for how long your child can
spend online and what they can do after the
online classes.
Keep computers in a common area and monitor
your child’s activity.
OAdjust parental controls to the website channels
that suit your child’s age and maturity.
O All the above
▶️ ALL the Above
https://youtu.be/Uwkll2C27D8