Safety and Security in the Cyber World
Chapter 7
Exercises
1. Fill in the blanks
a. ______________ often directs users to a fake website whose look and feel are almost identical to the actual website.
b. Undesired or illegal email messages are often known as ______________.
c. The protection of internet connected systems including hardware, software and data from cyber attacks is termed as _____________________.
d. A __________________ is a form of malicious software program which can corrupt or destroy systems or data.
2. Match the following
1 Malware a. Email
2 Spamming b. Virus
3 Cyber law c. Stealing data
4 Phishing d. Cyber crime
3. Identity whether the following statements are True or False
a. Hacking is a cybercrime.
b. Phishing is a type of attack which is capable of stealing your password or credit card number.
c. Social networking sites are used to share passwords and other secret information.
d. When you are receiving harmful messages on your computer, you may block or delete them.
Questions Type By: Himashree Bora.