CyberSecurity Tech Mahindra Foundation – Skill India Digital Hub Assessment Exam Answers
Assessment- Section 2
1. What is the main purpose of cybersecurity?
- To make the internet a faster place
- To protect personal and professional data from cybercriminals
- To increase online shopping opportunities
- To promote online learning
2. What are the three components of the CIA Triad in cybersecurity?
- Confidentiality, Availability, Authorization
- Security, Integrity, Accuracy
- Confidentiality, Integrity, Availability
- Privacy, Integrity, Data
3. How do fraudsters typically conduct KYC frauds?
- By sending fake SMS messages or fraudulent calls to impersonate bank representatives
- By hacking into government databases
- By using social engineering techniques
- By sending phishing emails
4. What is phishing in the context of cybersecurity?
- A type of fishing in the digital world
- Using physical bait to catch cybercriminals
- Deceptive emails, websites, or messages to steal sensitive information
- A method to prevent identity theft
5. What is the risk associated with using public charging ports for mobile devices?
- Risk of electric shock
- Risk of damaging the mobile device
- Risk of losing the charging cable
- Risk of malware installation through juice jacking
Assessment- Section 3
1. What is the primary objective of cyberstalking?
- To make financial gains
- To conduct identity theft
- To harass, threaten, or intimidate someone online
- To promote online shopping
2. Which of the following is a tactic used by cyberstalkers?
- Offering job opportunities
- Monitoring online activities of the victim
- Sending polite and friendly messages
- Sharing personal information with consent
3. Which of the following is not a type of gaming or shopping scam?
- Phishing
- Lottery scams
- Shopping fraud
- Malwares through Games
4. What is the primary intent of ethical hacking (white hat hacking)?
- To gain unauthorized access to computer systems
- To test and strengthen the security of computer systems
- To conduct illegal activities online
- To promote online shopping
5. What is the term used for the unauthorized use, reproduction, or distribution of someone’s creative work?
- Cyberstalking
- Phishing
- Copyright infringement
- Hacking through Malwares
Assessment- Section 4
1. Which of the following is NOT a recommended practice for preventing cybercrimes?
- Using strong and unique passwords
- Enabling Multi-Factor Authentication (MFA)
- Downloading attachments from unknown sources
- Securing home Wi-Fi networks
2. How can you verify the security of a website for online shopping?
- Look for the website’s social media page
- Share personal information freely
- Avoid the website entirely
- Check for https in the URL and a padlock icon in the address bar
3. What should you do if you encounter a cybercrime or suspicious activity in India?
- Ignore it and hope it goes away
- Share it on social media for awareness
- Report it to the relevant authorities or the cybercrime cell
- Confront the perpetrator directly
4. Which legal section in India deals with the offense of stalking a woman’s internet life?
- Section 292
- Section 507
- Section 509
- Section 354D
5. Which legal section addresses the transmission of sexually explicit messages or images with the intent to harass the victim?
- Section 292
- Section 67A of the IT Act
- Section 67B of the IT Act
- Section 66 E of IT Act
6. What is the primary goal of National Cyber Crime Reporting Portal and CYBER B.A.A.P. in India?
- Only to provide legal services
- Only to promote online shopping
- to create awareness and prevention of cyberbullying
- Only to report online harassment