Cyber Jagrookta Diwas Quiz

A digital illustration of a person studying cybersecurity concepts, surrounded by images of locks, computers, and network symbols in a vibrant, educational setting.

Cyber Jagrookta Diwas Quiz

Test your knowledge about cybersecurity in the Cyber Jagrookta Diwas Quiz! This engaging quiz covers various aspects of cybersecurity, from malware to password protection. Whether you're a beginner or looking to refresh your skills, this quiz is for you.

  • 25 challenging questions
  • Multiple choice format
  • Learn about important security practices
25 Questions6 MinutesCreated by SecureGuard101
1. Which one of the following is also referred to as malicious software ?
A) Maliciousware
B) Badware
C) Ilegalware
D) Malware
2. Which of the following would be the best password (hardest to crack) ?
A) Summ3r2017
B) t3chnologyRulz
C) 12345678
D) iLm!J@c)&dl^A
3. Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else ?
A) Malware
B) Spyware
C) Adware
D) All of the above
4. To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.
A) antivirus
B) firewall
C) vlc player
D) script
5. Code Red is a type of ________
A) An Antivirus Program
B) A photo editing software
C) A computer virus
D) A video editing software
6. Which one of the following describes spam ?
A) Gathering information about a person or organisation without knowledge.
B) Performing an unauthorised, usually malicious, action such as erasing files.
C) Putting unnecessary load on the network by making copies of files.
D) Sending unwanted bulk messages.
7. Which one of the following can protect a computer from the risk of unwanted emails ?
A) Anti-spam software.
B) Anti-virus software.
C) Anti-spyware software.
D) PC diagnostic software.
8. Which one of the following could lead to the spread of a malicious program ?
A) Using only software that has been checked for viruses.
B) Maintaining regularly updated anti-virus software.
C) Opening only virus-checked file attachments from known sources.
D) Using a USB Flash Drive from an unknown source to exchange data.
9. Which one of the following describes why it is important to update antivirus software regularly ?
A) To protect your computer from all known viruses.
B) To ensure the software identifies old viruses.
C) To protect your computer from unwanted bulk messages.
D) To prevent the spread of malicious programs on the Internet.
10. Which one of the following describes what you should do if you receive a chain letter email?
A) Forward the email.
B) Download it onto your system.
C) Delete the email.
D) Send a read receipt.
11. Which one of the following describes a computer hacker?
A) A skilled programmer who uses authorised access to exploit information available on a computer.
B) A skilled programmer who secretly invades computers without authorisation.
C) A skilled programmer who writes programs to train new employees.
D) A skilled programmer who helps in the installation of new software for an organisation.
12. Which one of the following describes why firewalls are used?
A) To prevent unauthorised access by incoming transmissions.
B) To prevent destruction of a computer in the event of a fire.
C) To enable easy downloading of data from web sites.
D) To detect and disable viruses already on a computer.
13. Which one of the following is MOST likely to be a hoax?
A) An email from a friend you have not seen recently.
B) An email with an attachment sent by a colleague using their personal email address.
C) An email asking you to go to a website for a free computer scan.
D) An email advertisement from a local shop you subscribe to.
14. Which one of the following is the reason that users should log on with a username and password?
A) To be aware of who is in the building.
B) To check up on the time-keeping of users.
C) To protect computers against unauthorised use.
D) To enable a personalised greeting for each user.
15. Which one of the following statements about a password is TRUE?
A) It must be changed only if it is compromised.
B) It cannot contain special character symbols.
C) It must be registered with the system administrator.
D) It should be changed regularly.
16. Which one of the following shows respect for the confidentiality of information?
A) Discussing confidential information over the telephone.
B) Disclosing confidential information only to authorised individuals.
C) Uploading confidential information to a shared web site.
D) Emailing confidential information to a colleague.
17. Which one of the following would be considered the BEST way to store a PIN number?
A) Keep a written note of it with you bank cards.
B) Store it on your computer.
C) Memorise it.
D) Keep a written note of it in your office drawer.
18. Which one of the following describes why users should lock their computer when leaving their desk?
A) To prevent unauthorised access to data.
B) To prevent a waste of electricity.
C) To prevent data from getting corrupted.
D) To prevent the computer from malfunctioning.
19. Which one of the following is an example of phishing?
A) An email warning the recipient of a computer virus threat.
B) An email directing the recipient to forward the email to friends.
C) An email directing the recipient to enter personal details on a fake website.
D) An email directing the recipient to download an attachment.
20. Which one of the following describes how confidential information should be sent using an unsecured network?
A) In an unsigned email.
B) In an encrypted format.
C) In a compressed format.
D) In an attachment.
21. Which one of the following describes why Bluetooth device settings should be adjusted?
A) To increase the range of the device.
B) To improve the quality of reception.
C) To prevent the risk of unauthorised access.
D) To reduce interference from other devices.
22. Which one of the following is actually considered as the first computer virus?
A) Sasser
B) Blaster
C) Creeper
D) Both A and C
23. What is ransomware?
A) Software that infects computer networks and mobile devices to hold your data hostage until you send the attackers money.
B) Computer equipment that criminals steal from you and won’t return until you pay them.
C) Software used to protect your computer or mobile device from harmful viruses.
D) A form of cryptocurrency.
24. An email from your boss asks for the name, addresses, and credit card information of the company’s top clients. The email says it’s urgent and to please reply right away. You should reply right away. True or False?
True
False
25. To be as safe as possible, what is the best account setting?
A) private (only you )
B) private ( only friends )
C) public ( friends of friends )
D) public ( everyone )
{"name":"Cyber Jagrookta Diwas Quiz", "url":"https://www.supersurvey.com/QPREVIEW","txt":"Test your knowledge about cybersecurity in the Cyber Jagrookta Diwas Quiz! This engaging quiz covers various aspects of cybersecurity, from malware to password protection. Whether you're a beginner or looking to refresh your skills, this quiz is for you.25 challenging questionsMultiple choice formatLearn about important security practices","img":"https:/images/course8.png"}
Make your own Survey
- it's free to start.