100% found this document useful (3 votes)
214 views2 pages

Cybersafety Quiz: Malware & Cybercrime

The document is a worksheet on cybersafety, featuring multiple choice questions, fill-in-the-blank exercises, true or false statements, and open-ended questions. It covers topics such as malware, antivirus software, cyberstalking, cybercrime, and tips for avoiding viruses. The worksheet is designed to assess knowledge and understanding of internet safety and security.

Uploaded by

Vasu Kumari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
214 views2 pages

Cybersafety Quiz: Malware & Cybercrime

The document is a worksheet on cybersafety, featuring multiple choice questions, fill-in-the-blank exercises, true or false statements, and open-ended questions. It covers topics such as malware, antivirus software, cyberstalking, cybercrime, and tips for avoiding viruses. The worksheet is designed to assess knowledge and understanding of internet safety and security.

Uploaded by

Vasu Kumari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Name: ____________________________ VII ____ Roll.

No______ Date: ____________

Chapter 4 - Cybersafety
Multiple Choice Questions
1. A malicious software program that is disguised as a useful program is called.
A.​ Worm B. malware C. Trojan

2. Which of the following is not malware?

A.​ Melissa B. McAfee C. Code Red

3. An antivirus is a software program that _________________

A.​ Corrupts files on a computer system


B.​ Protects a computer from computer viruses and other malware
C.​ Prevents users from accessing data on a private network

4. Which of the following statements is correct?

A.​ You should keep your password short


B.​ You should keep the same password for all your accounts.
C.​ You should use more than one password wherever possible.

5. The use of the internet to harass, stalk, or threaten someone is _________

A.​ Cyberstalking B. Hacking C. Phishing


6. Unlawful activity in cyberspace is ____________
A.​ Cyberbullying B. Cybercrime C. Cyberstalking

Fill in the blanks


1.​ ___________ is an act of sending deceptive email messages and gaining sensitive information
from people.
2.​ ____________ is a malicious software program that replicates itself and infects other files on the
computer system.
3.​ A _________ is a person who gains unauthorized access to another person’s computer system.
4.​ ________ is a software program that copies itself from one computer to another without any
human action.
5.​ A __________ is a computer program that detects and destroys computer viruses and other
malware.

State true or false.


1.​ A firewall is a software program or a piece of hardware that helps prevent unauthorized access to a
private network connected to the internet.
2.​ The term ‘spam’ refers to unsolicited bulk emails.
3.​ To avoid viruses don’t scan all CDs or pendrive before using them.
4.​ DoS stands for denial-of-server attack.
5.​ Identity theft occurs when someone’s personal information is stolen for the purpose of committing a
fraud.
Answer the following questions

1.​ Define Virus. Mention three types of computer viruses.


_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

2.​ Write any three tips to avoid Viruses.


_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

3.​ Define cybercrime. List any four cybercrimes.

_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

Common questions

Powered by AI

Spyware is a type of malware designed to secretly monitor and collect information about a user's activities without their consent. Unlike adware, which primarily aims to display unwanted ads based on user activity, spyware is more insidious, often intending to gather sensitive data, such as login credentials. Ransomware, in contrast, encrypts users' data and demands a ransom for decryption . The primary difference lies in spyware's focus on stealthy data collection, whereas adware is more overt in its operations, and ransomware seeks direct monetary gain.

When combating cybercrime, ethical considerations include ensuring privacy rights, avoiding discrimination while profiling, and upholding user rights during investigations. These considerations impact legal frameworks by necessitating the balance between security and civil liberties, guiding the creation of laws that prevent abuse of surveillance technologies and encourage transparency in cybersecurity measures . Ethical guidelines ensure that actions taken do not overly infringe upon individual freedoms while maintaining robust defenses against cyber threats.

To ensure cybersafety, it is advised to use more than one password across different accounts, avoiding the use of a single password for all accounts . This reduces the risk of multiple accounts being compromised if one password is exposed. It is also best to keep passwords lengthy and complex to increase their security.

Antivirus software protects a computer by detecting and destroying computer viruses and other types of malware, thus preventing infections that could corrupt files or disrupt system operations . However, its limitations include the inability to provide complete protection against new or unknown malware variants until they are identified and signatures are updated. Also, aggressive antivirus settings might disrupt non-malicious applications.

A firewall is a software program or hardware device that helps in preventing unauthorized access to a private network connected to the internet . It monitors and controls incoming and outgoing network traffic based on predetermined security rules. A common misconception is that a firewall can prevent all malware attacks; however, it primarily filters traffic and cannot detect infections within allowed traffic or prevent all types of cyber threats.

Cyber laws play a critical role in shaping internet behavior by establishing legal boundaries and sanctions for actions in cyberspace, aiming to protect users from cybercrime . By defining offenses and prescribing penalties, these laws deter potential criminals and provide a framework for prosecuting offenders. Cyber laws also promote ethical online behavior and encourage the development of standards for digital practices. They are pivotal in creating an environment of trust and safety for internet users.

A Trojan horse is a type of malicious software that disguises itself as a useful program but misleads users of its true intent . It does not replicate itself but might open a backdoor for other malware. A worm is a standalone malware that replicates itself to spread to other computers without human intervention, potentially using up resources and causing network slowdowns . A virus attaches itself to legitimate programs and replicates when programs run, corrupting files and causing varying levels of damage depending on its payload. Each differs in propagation method and system impact.

Different cybersecurity measures, such as firewalls, VPNs, intrusion detection systems, and multi-factor authentication, vary in effectiveness against unauthorized access. Firewalls control traffic but can only filter known threats . VPNs secure data transmission but do not prevent access from compromised endpoints. Intrusion detection systems are effective in monitoring and alerting but require constant updates to be effective. Multi-factor authentication adds a layer of security beyond passwords, significantly reducing access from unauthorized users by requiring additional verification steps.

Cyberstalking can lead to psychological distress, anxiety, and fear for personal safety among victims . It often involves the offender using the internet to harass, threaten, or intimidate victims. Preventive measures include strong security settings on social media, reporting stalkers to authorities, and using technologies like privacy-focused tools to reduce exposure. Support systems involve counseling and liaising with law enforcement to ensure victim protection.

Phishing is conducted by sending deceptive emails that appear genuine, luring individuals to disclose sensitive information such as passwords and credit card numbers . For individuals, this can lead to identity theft and financial loss. For organizations, successful phishing attacks can result in data breaches, financial liabilities, and reputational damage as attackers might gain unauthorized access to sensitive corporate systems.

You might also like