Professional Documents
Culture Documents
Ite Reviewer
Ite Reviewer
Ite Reviewer
2. Which of the following media is/are used by social networking sites for
communication?
Video
Audio
Text
4. Find out the primary domain name from the example given below:
www.geeksforgeeks.org
Org
5. Expand URL.
Uniform Resource Locator
6. Expand WWW.
World Wide Web
25. Any system that uses the HTTP protocol is called _________
Web Server
30. Which of the following is the most viral section of the internet? ____ type of sites is
known as friend-of-a-friend site.
Social networking sites
32. Try to keep your passwords without meaning so that ______attack becomes almost
impossible to perform successfully.
password guessing
33. Increase your security for social media account by always ____________ as you step
away from the system.
logging out
34. Part of the social media sites are the various games & 3rd party applications which
helps ______________ to get access to your data.
cyber-criminals
35. Many social media sites and services provide _______________ for legitimate
account verification.
2-step verification
36. ________________ are unnecessary software which infiltrates user’s system, spy on
user’s activities, stealing internet usage data & sensitive information of that user.
Spyware
37. They spy on our digital habits and spy on which data is more sensitive or useful for
its creator. Who are ‘they’ referring to here?
Spyware
38. Spyware collects user’s personal data & spreads it to______________ data-firms, or
its creator.
advertisers
39. _____________ tracks your data and displays those products as ads for promotions.
Ad-based spyware
40. _________________ disguises them as legitimate software & appear as Java or Flash
Player updates. They will periodically collect your system data and send it to its
creator.
Spy-trojans
41. ____________ records all your key-strokes, chat-room dialogs, program run in your
system, and system details.
System Monitors
42. If you’ve accidentally clicked any pop-up which seems malicious, it is recommended
to take steps to remove it and proactively change your ________ and delete
browsing activities from web browser.
passwords
45. Phishers often develop ______________ websites for tricking users & filling their
personal data.
illegitimate
46. Which of the following type of data, phishers cannot steal from its target victims?
apps installed in the mobile
48. _____________ are unwanted software intended to pitch advertisements upon the
user’s screen, most often within a web browser.
Adware
49. Users might invite some bogus virus in his/her system by clicking the ____________
Adware
50. Creators of _____________ also sell your browsing behaviour & information to 3rd
parties.
Adware
51. Which among the following is not a symptom of your system compromised with
adware?
System takes restarts frequently
52. A ___________ consists of at least one bot server or controller and one or more
client-bots.
Botnet
53. A _____________ is a number of Internet-connected systems, where each of them is
running one or more bots.
Botnet
54. Infected computers and other systems within the botnet are called __________
zombies
57. Servers are computers that provide resources to other computers connected to a
Network
60. Which term identifies a specific computer on the web and the main page of the
entire site?
URL
62. The phrase ____ describe viruses, worms, Trojan horse attack applets and attack
scripts.
Malware
64. A person who uses his or her expertise to gain access to other people’s computers to
get information illegally or do damage is a
Hacker
66. A firewall
Separates a network into multiple domains
67. A program designed to destroy data on your computer which can travel to infect
other computers is called a _____
Virus
68. _____ are often delivered to PC through an E-mail attachment and are often
designed to do harm.
Spam
69. A hacker contacts your phone or E-mails and attempts to acquire your password is
called
Phishing