Free Quiz on Cybersecurity with E-Certificate | Cyber Security Free Certification

Table of Contents

About the Quiz

▶️Attempt the Quiz only once
▶️Score will be released only after
closing of the quiz.
▶️ If total marks scored is above 70% of the maximum marks , then E-
certificate will be emailed immediately.Or in 2minutes
▶️ Only 100 E – certificates will be
emailed per day.
100% Correct Answers Here

_____ is posting inflammatory messages or visuals about a person or organisation in an online community*

2 points

Memes

Social Trolling

Cyber stalking

Logging into online banking on public networks, such as internet cafes, libraries or public Wi-Fi is always safe.*

2 points

True

False

It is a malicious program that may be installed in the victim’s computer for recording computer user key strokes*

2 points

Skimmer

Cloner

Keylogger

Sending tormenting post, harassing messages,threatening contents to a minor to cause mental harassment and depressive or suicidal state of mind to the recipient of such messages*

2 points

Cyber stalking

Cyber Threatening

Cyber Bullying

A Backdoor is a means of*

2 points

access to a computer program that bypass security mechanisms

anti virus

website

What is phishing?*

2 points

Catching Barra off the back of a boat.

An identity thief that takes your personal information via fake emails or websites.

Sending a fake email or text to elicit a response and gain confidential details.

It is a type of malicious software that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid*

2 points

Ransomware

Back Doors

Hacking

When a photo or video is shared on the internet, who might be able to see it?*

2 points

Anyone

Just me, everything is automatically private on the internet.

Only the people who I choose.

It is a technique that is used to combine and superimpose new images and videos onto source images or videos.*

2 points

Morphing

Deep Fake

Editing

What is trolling?*

2 points

Harassing groups online in an inflammatory way for ‘fun’ and to seek attention.

Jumping out from under a bridge to scare billy goats.

Deliberately targeting an individual online in a vicious way to shame and intimidate.

The practice of spying or using spies to obtain information about the plans and activities especially of a foreign government or a competing company.

2 points

Stealing

Espionage

Spying

Information on the Internet can always be trusted to be factual. It wouldn’t be online if it wasn’t true.*

2 points

True

False

What is Malware?*

2 points

A new range of virus for the 21st century.

Software designed specifically to intercept and read personal information.

A virus protection for your computer and smart phones.

When was Indian Information Technology Act Introduced in India?*

2 points

2000

2008

1956

Anything I send in my private email, Instant Messenger or chat cannot be seen by others.

True
False

Apply Link

 

 

error: Content is protected !!
Scroll to Top