Saturday , July 27 2024
Breaking News

Cyber Hygiene Practitioner Quiz Answers – ISEA and MEITY

Here are the Questions and Answers of Cyber Hygiene Practitioner Quiz by ISEA:

  • i) and ii)
  • i) and iii)
  • ii) and iii)
  • i), ii) and iii)
  • Will not recommend anything as no security breach has happened.
  • Tell your friend to change the password regularly and use same password for all his account.
  • Tell your friend to change the password regularly and use different passwords for different accounts.
  • to secure your personal information only
  • to secure your financial information only
  • to secure all information available in the desktop
  • trojans, redirected malicious URLs
  • antivirus, patches
  • genuine software, redirected malicious URLs
  • malware, security patches
  • Yes
  • No
  • option i
  • option ii and iii
  • option i and ii
  • option i, ii and iii
  • the registration server
  • the wireless network
  • the default network
  • the home network
  • Disable unused USB ports
  • Plug-in USB “locks” to physically secure unused ports
  • Use data blocker
  • Yes
  • No
  • May be
  • Roshan should not download apps that ask for permission to access personal details which is unnecessary for the application, he should be wary of any third party apps. This is an unhygienic practice and can lead to safety/privacy breach causing security threats.
  • Roshan may only give the permissions and check the performance of the application and incase it is unsatisfactory he may delete it latter. Such minor apps do not pose any issues.
  • It is upto Roshan to download the app or not, as it is his mobile’s security at stake.
  • None of the above.
  • Firewall
  • VPN
  • Password
  • All of these
  • Temperature may damage the hardware components of computer
  • Temperature may damage the hardware and software of the computer
  • I don’t think temperature will affect the performance of computer
  • Universal Serial Bus (USB) drop attack, it can have malware infected files
  • Social engineering attack, to steal data
  • spyware to spy on your data
  • Yes, configuring the personal firewall is necessary
  • No, it is ok if you don’t configure your firewall, and use only antivirus
  • Yes
  • No
  • She can look at the kind of job being offered and if offer is lucrative she can immediately apply.
  • She can call the numbers given in the mail and cross verify with them reg. the offer.
  • She should check for possible signs of cyber fraud/scam like general addressing instead of her name, reference to the advt. Published in Newspapers, spelling mistakes, website id(https) etc., and then call up the specific bank (with contact no. fm original site) to confirm.
  • Their inaptness/difficulty in using the digital devices and handling online transactions/communication.
  • Not being aware of the various kinds of cyber threats/dangers that are possible during online transactions/communication and how to handle them.
  • Lack of knowledge of the new technology trends and their usage and lack of support or guidance to handle the technology and digital devices.
  • All the above.
  • Yes, it is safe
  • No, it is not safe
  • Never share your private and sensitive financial information like PIN/OTP/Password with anyone and never click on links or download attachments received from unknown sources.
  • It is better to avoid using digital devices for any financial transactions as it can be risky.
  • Visual Private Network
  • Virtual Protocol Network
  • Virtual Protocol Networking
  • Virtual Private Network
  • that vendor’s site
  • security solution site
  • malicious site
  • software downloading site
  • She should understand that any prize amount/lottery/gift which asks for any fee as upfront payment is fake.
  • You cannot win a lottery/gift/contest/free gift you did not enter or register.
  • No legitimate contest issue a free cheque as partial/full payment as post dated cheque asking for some portion as repayment.
  • All the above
  • No, it does not ensure safety
  • Yes it does ensure safety
  • Yes , I will give and ask him to access the personal laptop in-front of me
  • No I will politely reject
  • I will share without a second thought
  • VPN
  • Hotspot
  • Any network
  • The student’s network bandwidth is low due to which his/her audio quality is low.
  • The student’s credentials were not properly matched by the IT administrator as the student is a new joiner to that class, so he had an issue.
  • The student is lying because he is not interested in the class and watching some other video during the class.
  • Any one of the above.
  • Firewall
  • Antivirus
  • Incognito mode
  • VPN
  • He should give her the amount and see if she returns the amount in time.
  • He should give her only some part of the amount asked for.
  • He should block her account and not entertain her at all.
  • He should gracefully decline and as a policy not enter into any kind of financial transactions or exchange financial information with people online whose identity he is not sure of.
  • He can share the details with the bank official after confirming that he is from the bank.
  • He can share his details through SMS to the mobile number, from which he received the call.
  • He should never share the details of ATM card number or PIN number with any one claiming to be from bank or any other trusted source for any purpose.
  • No
  • Yes
  • May be
  • Depends on what security and privacy settings are set up for these apps and how the users use them.
  • only i
  • only ii
  • i,ii and iii
  • A straight, rigid back rest
  • Fixed armrests
  • A five-leg base with casters (rollers)
  • All of the above
  • They should discuss with children and set limits on the screen time, set priorities rightly, not allow gadgets during food, homework, sleep.
  • Enabling security and privacy features on the gadgets used by children.
  • Set up restrictions in usage of websites, downloading apps etc., using google safe search, using separate account with restrictions.
  • All the above.
  • It is important as it can pose threats to our digital devices and data
  • It is important as the files being downloaded may be infected with malware/spyware/virus etc., and can corrupt your system and data.
  • It is important because most of the time you receive these files from unknown people.
  • change passwords immediately and perform a remote wipe to the device
  • change passwords of all accounts
  • block the SIM immediately
  • Securing Information on a network
  • Securing Viruses
  • Deleting applications
  • Hacking Passwords
  • No, Preeti should not accept friend request as it might be a a fake request from online predator with wrong intentions.
  • Preeti can accept the request only after thoroughly verifying about Shruti by- checking her profile, by finding about her among friends if they know her personally. As this will ensure that she is making online friend with the right person.
  • Preeti can accept the friend request based on the facevalue of the request request sent to her, as it can be a false request.
  • He should give his bank account details and ask them to deposit the amount and thank them for making the process convenient for him.
  • He should immediately hang up the phone and block the number from which he received the call.
  • He should not share any details and tell them he will get back latter if required & hangup. Latter he should cross verify with the insurance company about details and if required take help of member of family for any online banking transaction or do it himself.
  • Content Filtering
  • Screen time
  • Password
  • None of the above
  • disable voice enabled purchasing
  • app eanbled purchasing
  • in app purchases
  • Yes, it is a hygienic computer usage practice. It will help him and his family members in easily & conveniently accessing wifi while at home.
  • No, it is not a hygienic computer usage practice, as it will make his home network quite vulnerable for attacks from cyber attackers which can put his data and computers at risk.
  • When the e-mail is from someone you know who always forwards you jokes.
  • The e-mail attachment is from somebody you do not know, but is a executable file as attachment.
  • The e-mail attachment has “.doc, .exe, or .pdf” in the file name extension.
  • None of the above.
  • Change the default password to unique strong password.
  • Change the configuration from public to private.
  • Change the default network name and keep your name.
  • Both option1 and option 2 must be followed.
  • Meenu should immediately inform her parents about it, and block this friend. It is quite possible that it is a online predator who is trying to contact her.
  • Meenu can reject sending her photographs and tell her she is not interested to continue chatting with her, as she is not comfortable with her requests.
  • Meenu can send her the pics and ask her to keep it safe and not share it with any one.
  • She was not carrying her contactless card.
  • She had kept it safely in a metal card holder shield in her wallet.
  • She had kept the wallet safely her handbag.
  • all the above.
  • Manipulation by fraudsters to get access to your private and sensitive information for committing frauds.
  • Fraudsters making a scheme or plan to commit financial frauds.
  • Fraudsters socially cheating general public by stealing their money.
  • Set boundaries for how long your child can spend online and what they can do after the online classes.
  • Keep computers in a common area and monitor your child’s activity.
  • Adjust parental controls to the website channels that suit your child’s age and maturity.
  • All the above.
  • Immediately take her to eye specialist for check up.
  • Ask her to attend the classes using laptop for two days and if she still complaints the same, visit the doctor.
  • Change the smartphone with a different one to check if it a problem with the smartphone itself.
  • Ask her not to attend the classes for next one week so that her eyes are relaxed.
  • i) and ii)
  • ii) and iii)
  • i) and iii)
  • i), ii) and iii)
  • Yes, it requires extra protective measures.
  • Yes, it need similar measures as other digital devices.
  • Secuirty is inbuilt.
  • No it is not required as we control these devices.
  • Enabling biometric authentication; not storing critical information related debit/cards and activating SIM locks can be helpful security measures.
  • Encrypting the data on your mobile and not saving any personal/private/critical data on mobile.
  • Locking all the apps and having strong password.
  • All the above.
  • Antivirus
  • OS
  • Applications
  • Use anti slippery mats so that the devices will not slip while travelling
  • Secure them in safe pouches or bags
  • Use devise holders or stands in the car to place them.
  • All the above options need to be followed
  • Password protect the file itself and send. Share the password securely to the recipient or encrypt the file attachment and send.
  • There is no need of encryption since sending file via email is already secure.
  • Send it as Google doc file.
  • Yes, vulnerabilities in hardware & software
  • Yes, Threats that can effect through mobile connectivity
  • No
  • True
  • False
  • Follow the link and give the details as it can give him some financial benefit.
  • He should be wary of such offers and immediately delete the mail.
  • He should try to check the authenticity of mails carefully and ensure that he does not divulge any kind of financial details or click suspicious links / attachments from unknown sources.
  • As it is a good offer, there is no harm if Raghu clicks the link to check if he can claim the gift.
  • He can call up the Jewellery store and confirm if they have sent the link.
  • He should never click on the links sent from unknown as they can be phihsing links or links that can download malware on to your system.
  • They can suspect some issues like cyber bullying, that Anu might be facing at her new school. They should sit with her and try to understand the issue and help her in resolving it appropriately by speaking to teachers, students and school authorities.
  • They can suspect that Anu is not able to adjust to the new location and try to arrange to send her back to her old school.
  • They can suspect adjustment issues with new place and school and can just wait and watch, to see Anu can over come the issue by tackling it by herself.
  • Tell her the password over the mobile instantly
  • You will send her an SMS over her personal mobile and ask her to check the same without sharing with anyone.
  • You will come a little away from the crowd and then tell her the password.

About Clear My Certification

Check Also

ISRO

ISRO Launched 2 New Certification Courses for July 2024 – Check Complete details

ISRO Launched 2 New Certification Courses for July 2024 – Check Complete details About IIRS …

Leave a Reply

Your email address will not be published. Required fields are marked *