Maha Cyber Jaagrukta Diwas 10 Jan 2024
How can individuals contribute positively to online communities and discussions on social media?
Spreading rumors and unverified information
Engaging in respectful and constructive dialogue
Ignoring different perspectives and opinions
Sharing personal anecdotes without context
What does "vishing" refer to in the context of cyber threats?
Phishing attacks via voicemail messages
Phishing attacks via video calls
Phishing attacks via virtual reality simulations
Phishing attacks via voice-based communications
In the context of privacy risks, what is the significance of "phishing"?
Protecting personal data from unauthorized access
Sharing sensitive information via encrypted channels
Attempting to trick individuals into revealing personal information
Implementing strict security measures in software development
Which of the following is a common method used in email phishing attacks?
Sending postcards with malicious links
Making phone calls to request personal information
Sending deceptive emails to gather sensitive data
Distributing flyers with fraudulent offers
How does password sharing violate most online service provider's terms of service?
It encourages collaboration and teamwork
It enhances the security of shared accounts
It compromises the security and integrity of user accounts
It promotes transparency and accountability
Which action is considered a best practice to avoid falling victim to a phishing attack?
Clicking on links from unknown sources to verify authenticity
Providing personal information when requested urgently
Verifying the legitimacy of the sender before responding
Disabling spam filters to receive all incoming emails
What is the primary objective of a smishing attack?
Gathering sensitive information through phone calls
Exploiting vulnerabilities in email systems
Stealing data using fraudulent text messages
Targeting specific organizations through tailored emails
Which measure can help mitigate privacy risks when using public Wi-Fi networks?
Disabling firewalls for better connectivity
Avoiding any online transactions or sensitive activities
Sharing personal information freely to establish trust
Using the same password across multiple accounts for convenience
You receive a call from someone claiming to be from a tech company, stating your computer has a virus and asking for remote access to fix it. What's the right course of action?
Provide them access to your computer to resolve the issue.
Hang up; it's a common tactic used in tech support scams.
Engage with them and negotiate a better deal for the service.
Ask for their company's address to visit them personally.
Which governmental agency or institution in India issued warnings and guidelines to the public after a surge in phishing incidents?
Reserve Bank of India (RBI)
Securities and Exchange Board of India (SEBI)
National Cyber Security Coordinator (NCSC)
Ministry of Home Affairs (MHA)
© 2022 Bank of Maharashtra. All Rights Reserved.