Diksha Portal Training Education

Cyber Hygiene Practices Diksha Quiz Solution Answers 2024

Cyber Hygiene Practices Diksha Quiz Solution Answers 2024
Written by Chetan Darji

Are you searching for – Cyber Hygiene Practices : Personal Digital Devices Diksha Quiz Solution Answers with Certificate 2024

Then you are at Right Place.

The Complete and Official Information of Cyber Hygiene Practices : Personal Digital Devices Diksha Quiz Solution Answers with Certificate 2024

Cyber Hygiene Practices : Personal Digital Devices Diksha Quiz Solution Answers with Certificate 2024

1. In which of the following situations, the Email attachments CANNOT be opened?

  • The e-mail attachment is from somebody you do not know, but it’s an executable file as attachment. – Answer
  • The e-mail attachment has “.doc, or .pdf” in the file name extension
  • The email just has a text saying ‘hi’ from unknown user
  • The e-mail is from someone you know who always forwards you jokes.

2. On most home computers, how often should you update your operating system and security software ?

  • Everyday
  • No Need to Update
  • Once a month
  • As in when update is received – Answer

3. Which of the following is an example of a biometric id?

  • OTP
  • Password
  • PIN
  • Fingerprint Answer

4. Ira, receives an email with the subject : “$5 million donation from Bill Gates” and in the email they ask her to provide her mobile number and banking details and also forward the mail to 25 friends to claim the money. What is the best action that should be performed by Ira ?

  • Report the email as spam and delete it – Answer
  • Reply with mobile number and banking details to claim the 5 million dollars
  • Reply with requested details and also forward the email to 25 friends
  • Do not provide the details but forward the email to 25 friends

5. In terms of security, what is the best way to protect data stored on your USB drive?

  • Encrypt the data – Answer
  • Back up the data on the drive
  • Hide the USB drive when it’s not in use
  • Use a strong password

6. ___________________ is a process where the user provides two different authentication factors to verify themselves to complete the transaction or login to an account ?

  • Use of user name and password to login
  • 2 – Factor authentication – Answer
  • Password
  • OTP

7. What action can help to get your device back if they get lost or stolen

  • Use Antivirus
  • Use VPN encryption
  • Enable device tracking – Answer
  • Enable privacy features

8. What is another term for a smart home?

  • Home Automation – Answer
  • Sci – Fi home
  • Robotic Home
  • Future Home

9. A ________ attack attempts to render a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

  • Denial of Service (DoS) – Answer
  • Distributed denial of service (DDoS)
  • SQL Injection
  • Permanent denial of service (PDoS)

10. Which of the following software programs would not help you in protecting your computer?

  • Firewall
  • Antivirus
  • Antispyware
  • Shopping Apps – Answer

11. Which option is not a good trait for your password?

  • Special characters in the password
  • Short password
  • Your name used as password – Answer
  • Long password

12. when you boot up your operating system or log on to your computer, some programs run automatically without any actions on your part. What are these programs called ?

  • Auto Updates
  • Patches
  • .exe programs
  • Start – up programs – Answer

13. Enable __________features to increase the security of all the devices that you use in your home.

  • Auto update
  • In cognito mode
  • Both Privacy and security – Answer
  • Privacy

14. Which of the following statements are true ?

  • Any information stored on a USB device should be backed up – Answer

Thanks to Beloved Readers

About the author

Chetan Darji

Hi, My name is Chetan Darji , and I am the owner and Founder of this website. I am 24 years old, Gujarat-based (India) blogger.
I started this blog on 20th January 2019.

Leave a Comment

Discover more from Stud Mentor - Where Learning Begins

Subscribe now to keep reading and get access to the full archive.

Continue reading