Question Title

* 1. Which of the following is the most secure password?

Question Title

* 2. Which of the following is an example of a “Phishing” attack?

Question Title

* 3. Hackers get into the system and encrypt all the personal files and data. The user is unable to access the system unless he pays the hacker to decrypt the data. What term describes this scenario?

Question Title

* 4. How many countries were affected by WannaCry ransomware attack?

Question Title

* 5. What process does a ransomware hacker perform to hack the user’s system?

Question Title

* 6. What does the “https://” at the beginning of a website’s URL denote?

Question Title

* 7. Is it safe to use public Wi-Fi to access sensitive information online, even if it is asking for password to access it?

Question Title

* 8. We should always click on the links received from unknown or suspicious email ids?

Question Title

* 9. What step you should perform to close an unwanted ad or pop-up on your system’s screen?

Question Title

* 10. What term refers to the network security system that monitors and controls the incoming and outgoing network traffic?

T