0% found this document useful (0 votes)
2K views2 pages

Digital Literacy Question Bank With Answers

The document provides a series of short answers related to digital literacy and cyber security concepts. Key topics include definitions of cyber threats, vulnerabilities, security policies, and types of malware. It emphasizes the importance of data protection, recognizing phishing attempts, and understanding software licensing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views2 pages

Digital Literacy Question Bank With Answers

The document provides a series of short answers related to digital literacy and cyber security concepts. Key topics include definitions of cyber threats, vulnerabilities, security policies, and types of malware. It emphasizes the importance of data protection, recognizing phishing attempts, and understanding software licensing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Very short answer types question Based on Digital Literacy

1. What is a cyber threat?


A potential danger to data or systems.

2. Define vulnerability.
A weakness that can be exploited.

3. What is a control in cyber security?


A measure to reduce or prevent risks.

4. What does CIA triad stand for?


Confidentiality, Integrity, Availability.

5. What is confidentiality in cyber security?


Keeping data private and secure.

6. What ensures that data is accurate and unaltered?


Integrity.

7. Which aspect of CIA ensures systems are available when needed?


Availability.

8. What is risk in cyber security?


The potential loss or damage.

9. What is a security policy?


A document that defines rules for security.

10. Name a common security mechanism.


Firewall / Antivirus.

11. What does "HTTPS" stand for?


HyperText Transfer Protocol Secure.

12. What does the lock icon in a browser mean?


The website is secure.

13. What type of malware disguises as useful software?


Trojan Horse.

14. Which type of malware self-replicates without a host?


Worm.

15. What is spyware?


Malware that secretly gathers user data.
16. What is a strong password?
A password that is long, complex, and unique.

17. What is the purpose of 'In private' or 'Incognito' mode?


To browse without saving history.

18. What does clearing cookies do?


Removes stored data from websites.

19. Define phishing.


Tricking users into giving personal information.

20. What kind of email should be treated with suspicion?


Unsolicited or suspicious email.

21. What is netiquette?


Proper behavior on the internet.

22. Name one sign of a phishing attempt.


Urgent messages asking for personal info.

23. What is spam?


Unwanted or junk email.

24. What is malware?


Malicious software.

25. What is the primary law for cybercrime in India?


IT Act 2000.

26. What does software licensing regulate?


Use and distribution of software.

27. What type of license allows free use with limited rights?
Freeware.

28. What is the difference between virus and worm?


Virus needs a host; worm doesn't.

29. What is data protection?


Safeguarding data from loss or misuse.

30. Why is it important to recognize fraudulent emails?


To prevent data theft and fraud.

You might also like