1.
Which of these is not an internet safety issue?
Correct Answer
C. Cyber war
Explanation
Cyber war is not considered an internet safety issue because it refers to large-scale attacks between nations or organizations, rather than individual safety concerns. Internet safety issues typically involve personal data breaches, online scams, and phishing attempts, which aim to deceive individuals and steal their information. While cyber war can have broader implications for national security and infrastructure, it is not directly related to the safety of individual internet users.
2.
Which of these is not an information security breach?
Correct Answer
C. Cyber bully
Explanation
Cyber bullying is not considered an information security breach because it does not involve unauthorized access or disclosure of sensitive information. It refers to the act of harassing, intimidating, or threatening individuals online, usually through social media platforms. While cyber bullying can have serious emotional and psychological impacts, it does not directly compromise the security or confidentiality of information. On the other hand, phishing, spyware, and internet scams are all types of security breaches that involve attempts to steal personal information, install malicious software, or deceive individuals for financial gain.
3.
Which of these is when a scammer disguise as a trustworthy source to get private information?
Correct Answer
C. pHishing
Explanation
Phishing is when a scammer pretends to be a trustworthy source in order to deceive individuals into providing their private information. This is typically done through emails, text messages, or websites that appear legitimate but are actually fraudulent. The scammer uses various tactics to trick people into revealing sensitive information such as passwords, social security numbers, or credit card details. This information is then used for fraudulent purposes, such as identity theft or financial fraud.
4.
Which of these is a scheme to deceive a user and take advantage of them?
Correct Answer
A. Internet scam
Explanation
An internet scam refers to a scheme designed to deceive users and exploit them for personal gain. Scammers typically use various tactics such as fake websites, phishing emails, or fraudulent online transactions to trick individuals into providing sensitive information or money. They may pose as trustworthy entities or offer too-good-to-be-true deals to entice victims. Once the user falls for the scam, the scammer gains unauthorized access to their personal or financial information, leading to potential financial loss or identity theft.
5.
Which of these is a malicious software designed to collect private information?
Correct Answer
C. Spyware
Explanation
Spyware is a type of malicious software that is specifically designed to collect private information without the user's knowledge or consent. It infiltrates a user's device and secretly monitors their online activities, collects sensitive data such as passwords, credit card details, and personal information, and sends it to a third party. Spyware is a serious threat to privacy and can lead to identity theft, financial loss, and other harmful consequences.
6.
What is the use of internet to harass someone called?
Correct Answer
C. Cyberstalking
Explanation
Cyberstalking is the use of the internet to harass someone, which aligns with the question. Phishing refers to the act of tricking individuals into revealing personal information, while internet scam involves fraudulent activities online. Cyberbullying refers to the act of harassing or intimidating someone online, but it is not specifically related to the use of the internet to harass someone. Therefore, the correct answer is Cyberstalking.
7.
What is the act of engaging an underage minor in online sexual act?
Correct Answer
D. Online predation
Explanation
Online predation refers to the act of engaging an underage minor in online sexual activities. This can involve grooming, manipulation, and exploitation of the minor for sexual purposes. It is a form of child exploitation and is considered a serious crime. The term "online predation" encompasses various actions such as soliciting explicit images, engaging in sexual conversations, or arranging in-person meetings with the intent of sexual abuse. It is important to raise awareness about online predation and take measures to protect minors from such harmful activities.
8.
Which of these usually involve blackmail?
Correct Answer
B. Sextortion
Explanation
Sextortion usually involves blackmail, where a person is coerced into providing explicit images or engaging in sexual acts, and the blackmailer threatens to share the content publicly or with the victim's friends and family if they do not comply with their demands. This form of online extortion is a growing concern in the digital age, as it can have severe emotional and psychological consequences for the victims involved.
9.
Which of these is an attack on a person or individual?
Correct Answer
B. Cyberbullying
Explanation
Cyberbullying is an attack on a person or individual through the use of electronic communication, such as social media or messaging platforms. It involves repeated and intentional harassment, intimidation, or humiliation, often with the intention to harm or control the victim. This form of online aggression can have severe psychological and emotional effects on the victim, leading to anxiety, depression, and even suicide in extreme cases. It is important to address and combat cyberbullying to create a safe and inclusive online environment.
10.
Which of these the medium through extortion occurs?
Correct Answer
B. Webcam
Explanation
Extortion is the act of obtaining something, usually money, through force or threats. In the context of the question, the medium through which extortion occurs is the webcam. This suggests that the act of extortion is carried out by exploiting or threatening someone through their webcam, possibly by capturing compromising or sensitive images or videos and using them as leverage to extort money or other concessions from the victim.