Welcome to my new article – Important QnA Internet Security IT 402. In this article, I am going to discuss some Important QnA Internet Security IT 402. Internet Security is one of the learning outcomes of Unit 4 Web Applications and security. So let’s here begin!
Topics Covered
Important QnA Internet Security IT 402
Let’s begin the article Important QnA Internet Security IT 402 with Objective Type Questions (OTQs) then we will see Subjective Types of Questions (STQs). So here we go!
Objective Type Questions (OTQs)
- _____________ is one of the main concern when we are sharing data online. (Ans. Security)
- ________refers to follow some rules and guideline to protect the data and information shared on the internet. (Ans. Security)
- Personal details like password, pin, or OTP cannot be tracked online. (True/False)
- Some website links may contain some dangerous malware links. (True/False)
- The ___________ is an online activity that demands sensitive information like passwords, pins, or OTPS through fake website links that look like a bank’s website and ask to enter data. (Ans. phishing)
- Which of the following activity performed to force the user to click on the fake link provided by email?
- email linking
- email spoofing
- email tracking
- email hijacking
- In which of the following security threat a third party is observing the communication happening between you and your partner?
- phishing
- email spoofing
- eavesdropping
- password attack
- Which of the following can be considered as a strong password?
- Your date of birth
- Your favourite colour name
- Anything which is a combination of letters, symbols and numbers
- Your mobile number
- You should change your password at regular interval. (True/False)
- The secure website can be identified by
- a lock icon at the beginning of URL and URL starts with HTTPS
- ask passwords to open
- send OTP to access the website
- ask to check your identity on the home page
- Which of the following can track your browsing data and transmit personal data from the computer?
- keylogger
- spyware
- malware
- adware
- The __________ can be installed on your computer, track and transmit every key that is pressed on a keyboard (keystrokes) to unauthorized users. (Ans. keylogger)
- The ___________ helps to real-time protection and monitoring for the changes made by malware. (Ans. antivirus/antispyware)
- To protect your system from recent threats you need to always purchase new antivirus. (True/False)
- The email which that promise jobs, lottery tickets or offering lucrative cash backs are considered as ________ emails. (Ans. spam)
- Cookies are meant for storing data based on your activity performed during your earlier visit such as login details, details of a shopping cart, visited pages in a website, etc. (True/False)
- Which of the following is a valid source of the new update for software or operating system?
- Any third party website
- respective vendor’s website
- directly from google
- All of these
- ________ analyze the network traffic and determine if the traffic should be allowed or not. (Ans. Firewall)
In the next section of important QnA Internet Security it 402, I am going to discuss Subjective type questions. So here we go!
Subjective Type Questions (STQs)
The subjective types questions from important QnA Internet Security it 402 consists of 2 and 4 marks questions from the topic. So let’s see now!
- What do you mean by internet security?
- Internet security refers to data protection from network access and from browser.
- The main objective of internet security is to define some rules and regulations to protect user’s data from prone attacks.
- Enlist some online security threats.
- Some online security threats are as following:
- phishing
- email spoofing
- chat spoofing
- eavesdropping
- DOS attack
- password attack
- viruses
- Some online security threats are as following:
- What do you mean by a strong password? How you can generate a strong password?
- A password that is a combination of letters, numbers and some special symbols as well as not easy to guess by hackers is known as a strong password.
- To generate a strong password follow these:
- Do not keep it so simple such as names,
- Keep password length appropriate (the standard password length can be more than 8 characters)
- Avoid using some popular words as a password
- Always use a good combination of numbers, letters and special characters
- Avoid using the same passwords for multiple accounts
- Avoid using something which is well known in public
- Enlist some best practices to reduce the potential online risks?
- You can follow these best practices to reduce the potential online risks:
- Use antivirus/antispyware software
- Configure and use a firewall
- Use strong passwords for accounts
- Download material from valid sources
- Do not share personal information on public platforms
- Clear Browser History and cookies
- Do not allow cookies on third party web sites
- Keep software and Operating Systems updates
- You can follow these best practices to reduce the potential online risks:
- How to clear data stores in browsers?
- Open your browser
- Now click on three dots on the address bar, a context menu appears
- Choose settings option
- A new will appear, scroll down
- Find the option, clear browsing data
- Select the option All time
- Click clear data
That’s all from the article important QnA Internet Security it 402. Like, share and feel free to ask your doubts in the comment section.
Thank you for reading this article important QnA QnA Internet Security it 402.
Follow this link to access all the contents of IT 402 like this article QnA Internet Security it 402 class 10: