Organizer : Government Degree College, Baramulla
(Autonomous) , Post-Graduate Department of Computer Sciences, NAAC Re-Accredited Grade ‘A’ College with Potential for Excellence(CPE) status Khawaja Bagh, Baramulla, J&K, 193103, INDIA
The Online National Quiz on the “Cyber Security and Digital Literacy” has been designed as an instrument to measure and enhance participant’s knowledge in the field of cyber security and digital literacy in line with the Celebration of Digital India Week- 2023
National Level Online Quiz on “Cyber Security and Digital Literacy”
About the Quiz
- Date : 1st September, 2023 , 11:00 AM
- Free Participation
- The quiz comprises of 30 MCQs with the time duration of 30 Minutes
- All the registered participants who score above 60% will be awarded e-Certificates
Apply Link
What is the purpose of encryption?
1 point
To increase the speed of data transmission
To hide files on a computer
To encode data to prevent unauthorized access
To create secure Wi-Fi networks
What is the practice of using the same password for multiple accounts referred to as?
1 point
Multi-factor authentication
Password rotation
Password recycling
Password reuse
What is a digital footprint?
1 point
A physical representation of a person’s shoe size
The set of shoes a person owns
The traces of a person’s online activity and information they leave behind
A measure of a person’s online popularity
What is the main concern when using public Wi-Fi networks?
1 point
They are faster than private networks
They often require payment for usage
They are less secure and can expose your data to potential attackers
They have limited coverage area
Which of the following is a strong password?
1 point
123456
Password123
CorrectHorseBatteryStaple
MyName123
What does “IoT” stand for in the context of technology and security?
1 point
Internet of Technology
Internet over Things
Intranet of Things
Internet of Things
What should you do if you suspect a website you are about to enter your credit card information on might be fraudulent?
1 point
Proceed and enter your information, as the website seems legitimate
Ignore your suspicions and continue with the transaction
Exit the website and avoid entering any information
Ask a friend for advice before proceeding
Which of the following is a good practice for creating strong passwords?
1 point
Using easily guessable information like your birthday
Using the same password across multiple accounts
Mixing uppercase and lowercase letters, numbers, and symbols
Using short passwords to make them easier to remember
What is a strong password typically characterized by?
1 point
Being short and easy to remember
Containing only letters, no numbers or symbols
Being a common word found in the dictionary
Including a mix of upper and lower case letters, numbers, and symbols
What is the primary purpose of antivirus software?
1 point
Encrypting files on the computer
Cleaning physical dust from computer components
Protecting against viruses, malware, and other malicious software
Providing secure internet browsing
Which of the following is a way to avoid falling victim to phishing attacks?
1 point
Always click on links in emails, even if the sender is unfamiliar
Regularly share your personal information on social media
Verify the sender’s email address and be cautious of unsolicited requests for sensitive information
Only use public Wi-Fi networks for secure transactions
What does the term “phishing” refer to in the context of cyber security?
1 point
Catching harmful software
Stealing physical devices
Sending deceptive emails to obtain sensitive information
Enhancing network speed
What is a firewall used for in cyber security?
1 point
Protecting against physical theft
Encrypting data during transmission
Blocking unauthorized network access
Deleting malware from a system
What is the term for a malicious software that locks up your files until you pay a ransom?
1 point
Virus
Worm
Spyware
Ransomware
What is the first step you should take if you suspect your online account has been compromised?
1 point
Share your account information with friends for assistance
Delete the account and create a new one
Change the password and enable two-factor authentication if available
Ignore the situation and continue using the account as usual
What is the purpose of regular software updates on your devices?
1 point
To slow down the device
To free up storage space
To introduce new features
To fix security vulnerabilities and improve performance
Which of the following is an example of two-factor authentication (2FA)?
1 point
Using a long password
Providing your email address
Using a fingerprint and a password to access an account
Sharing your password with a trusted friend
What is the purpose of a virtual private network (VPN)?
1 point
Speed up internet connections
Share files with friends
Encrypt and secure internet connections
Block unwanted emails
What is the purpose of a privacy policy on a website?
1 point
To prevent users from accessing the website’s content
To inform users about the website’s physical location
To outline how the website collects, uses, and protects user data
To provide free software downloads
Which of the following is a common social engineering tactic?
1 point
Updating software regularly
Using strong passwords
Pretending to be a trusted individual to manipulate someone into sharing information
Installing antivirus software
What does “HTTPS” stand for?
1 point
High Email Transfer Protocol System
Hypertext Transfer Protocol Secure
Hyperlink Text System
Home Extension Transfer Protocol Service
What is malware?
1 point
A type of password
A hardware component
Malicious software designed to harm or exploit computers
A type of firewall
What is the purpose of a CAPTCHA?
1 point
To provide a detailed explanation of a website’s terms of service
To verify that the user is a human and not a computer program
To scan for malware on the user’s device
To protect against physical theft of devices
Which of the following is an example of personal information that should be kept private online?
1 point
Your favorite color
Your first name
Your home address
A public domain book title
What does the term “phishing” refer to?
1 point
Catching actual fish in the digital world
A cyber-attack that involves hacking into computer systems
Sending fraudulent emails to trick individuals into revealing sensitive information
Creating fake social media profiles
What is the potential danger of clicking on links or downloading attachments from unknown sources in emails?
1 point
It may lead to faster internet speed
It may result in a discounted online shopping experience
It can introduce malware or viruses to your device
It might reveal your personal preferences
What should you do if you receive an email asking for your personal information or login credentials?
1 point
Provide the information immediately
Click on any links provided in the email
Ignore the email and delete it
Reply with your information
What is a cookie in the context of web browsing?
1 point
A type of virus
A delicious treat for your computer
A small piece of data stored on a user’s device to track their online activity
A type of firewall