About the Quiz
▶️Attempt the Quiz only once
▶️Score will be released only after
closing of the quiz.
▶️ If total marks scored is above 70% of the maximum marks , then E-
certificate will be emailed immediately.Or in 2minutes
▶️ Only 100 E – certificates will be
emailed per day.
100% Correct Answers Here
_____ is posting inflammatory messages or visuals about a person or organisation in an online community*
2 points
Memes
Social Trolling
Cyber stalking
Logging into online banking on public networks, such as internet cafes, libraries or public Wi-Fi is always safe.*
2 points
True
False
It is a malicious program that may be installed in the victim’s computer for recording computer user key strokes*
2 points
Skimmer
Cloner
Keylogger
Sending tormenting post, harassing messages,threatening contents to a minor to cause mental harassment and depressive or suicidal state of mind to the recipient of such messages*
2 points
Cyber stalking
Cyber Threatening
Cyber Bullying
A Backdoor is a means of*
2 points
access to a computer program that bypass security mechanisms
anti virus
website
What is phishing?*
2 points
Catching Barra off the back of a boat.
An identity thief that takes your personal information via fake emails or websites.
Sending a fake email or text to elicit a response and gain confidential details.
It is a type of malicious software that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid*
2 points
Ransomware
Back Doors
Hacking
When a photo or video is shared on the internet, who might be able to see it?*
2 points
Anyone
Just me, everything is automatically private on the internet.
Only the people who I choose.
It is a technique that is used to combine and superimpose new images and videos onto source images or videos.*
2 points
Morphing
Deep Fake
Editing
What is trolling?*
2 points
Harassing groups online in an inflammatory way for ‘fun’ and to seek attention.
Jumping out from under a bridge to scare billy goats.
Deliberately targeting an individual online in a vicious way to shame and intimidate.
The practice of spying or using spies to obtain information about the plans and activities especially of a foreign government or a competing company.
2 points
Stealing
Espionage
Spying
Information on the Internet can always be trusted to be factual. It wouldn’t be online if it wasn’t true.*
2 points
True
False
What is Malware?*
2 points
A new range of virus for the 21st century.
Software designed specifically to intercept and read personal information.
A virus protection for your computer and smart phones.
When was Indian Information Technology Act Introduced in India?*
2 points
2000
2008
1956
Anything I send in my private email, Instant Messenger or chat cannot be seen by others.
True
False
Apply Link