Monday , March 4 2024
Breaking News

Free online Cyber Security Certificate | Free Online Course | Free Certificate

This Cyber Security Free Certificate is designed to help you assess your knowledge of the basic Cyber Security Quiz. This is also a useful resource for employers to examine the technical Cyber Security knowledge of the candidates during an interview or for applicants. If you pass this test with 80% or above (16 questions or more), it is likely that you have a pretty solid fundamental knowledge of Cyber Security.

Here are the questions and answers :

  1. Which of the following passwords is the strongest? *


  1. Suppose you find somebody’s USB drive at your workplace. What do you do? *

Pick it up and plug it in to try and find an indication of whom it belongs to, so you can return it.
Leave it where it is. It’s not your problem.
Hand it into reception for them to deal with.

Take it home and use it.

  1. Your computer has just been infected with Ransomware and the hacker is demanding some moneybefore releasing it. What do you do first? *

Send an email to the IT guy in the office.
Try your best to get rid of it before anyone finds out
Pay the ransom. You need your files back!
Disconnect your computer from the network.

  1. You’re signing up to the website of a new game. The Form asks for the following details: Full name, email address, home address, telephone number. What do you do? *

Give them all the details.
Report the game – personal information should be kept private and secure.
Check webpage for further details about why they need the information or ask an adult to help

Enter false information details

  1. You’re doing a school project on poetry and find a poem online that you really like. You want to useit in your project. What do you do? *

Add the poem to the project and pretend you wrote it yourself.
Message the poet asking permission to use it in your project but give up when they don’t reply.
Use the poem in the project but make sure you include the name of the person who wrote it

None of above

  1. Firewalls are to protect against *

Virus Attacks
Fire Attacks
Data Driven Attacks
Unauthorized Attacks

  1. Which of the following is private information? *

I like swimming
Dogs are my favorite
My address is 2524 Ashoka Vihar

Purple is the best color

  1. Anything you say or type online becomes public knowledge and stays online forever…even if you THINK you deleted it. *


  1. A new film comes out and you really want to watch it, but you don’t have enough money to pay for the cinema. You see a link to download it for free. What should you do? *

Go into ‘Incognito’ mode, then download it and delete it if it doesn’t work properly
Download it at your friend’s house
Wait until it’s released for DVD/online video rental
none of above

  1. A social media site is requesting you share personal information to go on your public profile. What information do you think is okay to add? *

Your address, but don’t include the house number
What school you go to
Your mobile phone number
None of the above

  1. Turning off the GPS function of your smartphone prevents any tracking of your phone’s location. *


  1. Snapchat has ‘location sharing’ options that can show your Snapchat ‘friends’ where you are. How can you stop this from happening? *

Uninstall Google Maps
Turn off your Bluetooth
Select ‘ghost mode’ in your Snapchat settings, or manage which apps can access your location in your phone’s settings

Don’t use Snapchat whilst connected to 4G

  1. What is the name of the agency that deals with Cyber security in India? *

National Cyber Coordination Centre (NCCC)

Defense Research and Development Organisation ( DRDO )
National Informatics Centre (NIC)
None of the above

  1. What does the “https://” at the beginning of a URL denote, as opposed to “http://” (without the “s”)? *

That the site has special high definition
That information entered into the site is encrypted
That the site is not accessible to certain computers
None of the above

  1. What exactly is a Botnet? *

It is a malicious program that attempts to hide itself, other files, or computer data so they cannot be found on a computer.
A group of computers running malicious programs that are remotely controlled by cybercriminals.

A type of cyber virus to delete data.
None of above

  1. Criminals access someone’s computer and encrypt the user’s personal files and data. The user is unable to access this data unless he/she pays the criminals to decrypt the files. This practice is called … *


17.Which one of the following is a type of antivirus program? *

Quick heal
All of the above

  1. What is Malware? *

New range of Tupperware for the 21st century
Software designed specifically to intercept and read personal information.
A virus protection for your computer and smart phones.
None of above

  1. Which one of the following refers to the technique used for verifying the integrity of the message? *

Digital signature
Decryption algorithm
Message Digest

  1. For Wi-Fi Security, which of the following protocol is mostly used? *

Both A and C


About Clear My Certification

Check Also


Google offers 29- No cost Courses for February 2024 – Check Complete Details

Take a leap into learning this February, and make the most of the extra day! …

Leave a Reply

Your email address will not be published. Required fields are marked *