Organizer: Haryana Vidyut Prasaran Nigam Limited
About the Quiz
- National Cyber Security Awareness month October 2024
- Check your Cyber Security awareness level by Participating in the Quiz.
- Quiz Date : 6 October 2024
- Free Participants
- Open to All
- E-certificates will be issued to you through your provided email.
Apply Link
official website www.hvpn.org.in
What is the primary objective of implementing multi-factor authentication (MFA) in cybersecurity?
*
1 point
To secure data during transmission
To confirm a user’s identity through multiple verification methods
To protect against physical device theft
To filter out spam emails
Your company’s finance department receives an email that appears to be from the CEO, urgently requesting a transfer of rupee 50,000 to a new vendor account. The email looks legitimate, but something seems off. As a cybersecurity specialist, what steps would you take to handle this situation?
*
1 point
Immediately process the transfer to avoid delays.
Reply to the email to confirm the details.
Delete the email and ignore it.
Contact the CEO directly through a different communication channel to verify the request.
You are the IT manager of a medium-sized business. One morning, several employees report that they can no longer access their files, and there is a message on their screens demanding a ransom payment in Bitcoin to regain access. What should be your first course of action?
*
1 point
Disconnect all affected systems from the network to contain the spread.
Try to restore the files from the most recent backup.
Contact the attackers to negotiate the ransom.
Pay the ransom immediately to regain access to the files.
Your company recently discovered that a data breach occurred six months ago, and customer data was compromised. The breach has been contained, but as the cybersecurity manager, you need to decide on the next steps. What is the most appropriate course of action?
*
1 point
Update the company’s website with the breach details but take no further action.
Inform the affected customers and regulatory bodies immediately.
Keep the breach confidential to protect the company’s reputation.
Delete all evidence of the breach from the company’s systems.
Why is it vital to apply security patches in cybersecurity?
*
1 point
To encrypt data during transmission
To resolve software vulnerabilities or weaknesses
To prevent access to harmful websites
To identify and eliminate malware from a system
Which of the following protocols is deemed secure for internet connections?
*
1 point
SMTP
FTP
HTTP
HTTPS
Which activity should you avoid when using public Wi-Fi to lower the risk of cyber threats?
*
1 point
Conducting online banking transactions
Browsing social media
Watching YouTube videos
Streaming videos
What is the primary role of a firewall in network security?
*
1 point
To improve internet speed
To encrypt emails
To prevent unauthorized access to or from a network
To scan for viruses
What happens if you click a link or attachment in a phishing email?
*
1 point
None of the above.
An error page is displayed.
You may be redirected to a site that requests sensitive information or prompts you to download a file.
The browser or app closes unexpectedly.