Maha Cyber Jaagrukta Diwas 10 Jan 2024
CyberJaagrukta10jan24
1.
Which action is considered a best practice to avoid falling victim to a phishing attack?
Clicking on links from unknown sources to verify authenticity
Providing personal information when requested urgently
Verifying the legitimacy of the sender before responding
Disabling spam filters to receive all incoming emails
2.
Which of the following is a common method used in email phishing attacks?
Sending postcards with malicious links
Making phone calls to request personal information
Sending deceptive emails to gather sensitive data
Distributing flyers with fraudulent offers
3.
What is the primary objective of a smishing attack?
Gathering sensitive information through phone calls
Exploiting vulnerabilities in email systems
Stealing data using fraudulent text messages
Targeting specific organizations through tailored emails
4.
Which of the following best defines privacy risk?
The likelihood of losing personal devices
Potential exposure of sensitive information to unauthorized parties
The risk of encountering computer viruses
The possibility of physical harm due to online activities
5.
How do cybercriminals often create a sense of urgency in phishing emails?
By using proper grammar and professional language
By offering rewards or prizes for responding quickly
By providing detailed information about the company's history
By avoiding direct requests for personal information
6.
Which action increases privacy risks on social media platforms?
Limiting the information shared in profile settings
Accepting friend requests only from known individuals
Sharing personal details and location in public posts
Using privacy-enhancing features provided by the platform
7.
What is a typical characteristic of a phishing website?
Secure HTTPS connection
Verified SSL certificate
Misspelled domain names or URLs
Direct access to sensitive information
8.
Which governmental agency or institution in India issued warnings and guidelines to the public after a surge in phishing incidents?
Reserve Bank of India (RBI)
Securities and Exchange Board of India (SEBI)
National Cyber Security Coordinator (NCSC)
Ministry of Home Affairs (MHA)
9.
How do phishing attacks typically rely on social engineering?
By exploiting vulnerabilities in software
By tricking individuals into divulging sensitive information
By using encryption to hide information
By launching distributed denial-of-service attacks
10.
Which action can increase the risk of privacy breaches?
Using strong and unique passwords for different accounts
Regularly updating antivirus software
Sharing personal information on unsecured websites
Enabling multi-factor authentication
Submit