Cyber Safety Quiz
Yaksas Cyber Safety is an initiative to create a more cyber aware society. You can join this group to learn how to keep yourself and your loved ones safe in the cyber world. You can also ask any cyber safety related questions.
WhatsApp Group Link: https://yks.red/cybersafety
Copyright 2023 Yaksas Security. All rights reserved.
1 / 15
Which is the real website of Gmail?
Option B looks similar but the ‘ɑ’ in gmɑil.com looks like an alphabet but it’s not. Such characters are called Homoglyphs. They are identical to letters. Such letters are often used in scam (phishing) mails to mislead people.
2 / 15
You received an email with an attached invoice for something you didn’t purchase. What should you NOT do?
A. Open the invoice fileB. Ask sender for more informationC. Click the link and make paymentD. Move it to spam
A, B and C. Such emails are usually bad and opening the attached file could install a virus on your machine. If you see such a mail, move it to spam.
3 / 15
People can know your exact location from the photos you share on social media.
True. Most cameras have a feature to embed location co-ordinates in the photo. When you upload a photo to social media this information also gets uploaded. It is possible to turn off this feature in cameras. It is also possible to auto-remove this information via the privacy settings.
4 / 15
A credit card issued in India can be used online for international purchases without an OTP?
True. You can, however, disable online international transactions and also set spend limit on them via the self-service portal provided by the credit card issuer. If required, they can be re-enabled using the same portal.
5 / 15
Mr. Z used a computer to transfer their black money to an offshore account. This is a cyber crime?
False. Any crime where a computer or the internet is used as a mere tool but not as a means to commit or a target of a crime is not considered a cyber crime.
6 / 15
One day Z found that all their data has been encrypted. Their computer screen is displaying a ransom note, asking crypto currency in exchange for decrypting their data. What measure can neutralise this attack?
Taking regular backup of data. These are called ransomware attacks. In these attacks, the data is held to ransom. However, paying the ransom does not guarantee that the attacker will decrypt the data or the attack won’t happen again. The best way to neutralise this attack is by taking regular backup of data.
7 / 15
In India, where can one report a cybercrime?A. National Cybercrime Reporting PortalB. Cybercrime helplineC. Nearest local Police stationD. Nodal cyber cell
All of the above.
A. https://cybercrime.gov.inB. Helpline number is 1930C. Nearest Police station - 112 / 100 Women helpline number is 181D. Nodal Cyber cell - https://www.rbi.org.in/commonman/Upload/English/Content/PDFs/LNA100112C_M.pdf
8 / 15
Z’s friend offered to install a pirated version of anti-virus software on their computer. Their friend promised that it will work exactly as the paid version. What can go wrong if Z agrees?A. The pirated version may itself be infectedB. It can stop working any timeC. It might not receive updates
A, B and C. The risk of using pirated software is that they might contain an embedded virus. The source of such software is usually unknown and therefore can’t be trusted. Many software vendors have mechanisms to identify pirated versions installed on computers and block them altogether or block updates for them. The price of antivirus software has come down significantly in recent years, so it is recommended to purchase a license and then use it.
9 / 15
The person Z used a VPN connection to access some content that is legally blocked in their country. Can using a VPN connection keep their identity safe from law enforcement agencies?
10 / 15
A person Z posted a picture on social media. They receive a negative comment on it and it upsets them. Select what they should not do:
It is not advised to respond to such comments when you are upset or angry as it may lead to further trolling and other people may also get involved. It is best to step away and cool down before deciding what to do next. A and C are also valid but they will be of little help to restore your peace of mind.
11 / 15
Solve the riddle: What is six of six digits / alphabets, not your birth date and must not be shared with anyone
PIN of the Mobile banking app
12 / 15
A citizen can arrest a person, if the person is found committing a non-bailable offence as per IPC and CrPC?
13 / 15
What is the name of the initiative by Indian government to detect and clean malware from end users computers?
Cyber Swachhta Kendra (https://www.csk.gov.in)
14 / 15
Z read a book. They liked it so much that they shared a PDF version of it on their social media profile. Did Z commit a cyber crime by sharing the digital version of the book?
Yes. The copyright of the book lies either with the publisher or the author of the book. Sharing such material without their consent amounts to copyright infringement which is a criminal offence. Since Z shared the digital version of the book over the internet it is also a cyber crime.
15 / 15
Z is planning to sell their old laptop. What measures, if any, should they take before handing it over to the new owner?
Normal / Zero format the storage. Degaussing is also the correct answer but degaussing equipment might not be readily available with everyone. All other options do not permanently remove the data from storage. Normal / Zero formatting overwrites the data with zeros or some other value. Hence, it’s slow but most effective when selling the storage equipment.
Your score is
Restart quiz
Please rate this quiz