You are on page 1of 2

1.

a) Which of the below is a popular victim of cyber attackers looking to gain the IP address of a
target or victim user?

i. emails

ii. websites

iii. IP tracer

iv. web pages

e) Which of the below measures can help reduce the risk of data leakage?

i. Steganography

ii. Chorography

iii. Cryptography

iv. Authentication

c) An act to injure, corrupt, or threaten a system or network is characterised as which of the below?

i. Digital crime

ii. Threats

iii. System hijacking

iv. Cyber Attack

f) Which of the below implemented is not a good means of safeguarding privacy?

i. Biometric verification

ii. ID and password-based verification

iii. 2-factor authentication

iv. switching off the phone

d) Which of the below is an internet fraud in which a consumer is digitally persuaded to reveal personal
data by cybercriminals?

i. MiTM attack
ii. Phishing attack

iii. Website attack

iv. DoS attack

b) Which of the below does not qualify as a form of peer-to-peer cybercrime?

i. Trojans are implanted into a targeted device.

ii. On the deep web, payment information is leaked.

iii. mm

iv. Phishing

4. What are the elements of cybersecurity?

6. What are the steps to set up a firewall?

2. List out some of the common cyber-attack.

3. What is a response code? List them.

7. What steps will you take to secure a server?

5. What is the difference between Symmetric and Asymmetric encryption?

You might also like