A. True
B. False
C.
D.
Explanation: Strangers can cause huge trouble if we connect to them or chat with them without knowing exact details or whether the account is genuine or not. The stranger may send infected links which you might click and will redirect you to infected sites.
A. Ethical hackers
B. Penetration testers
C. Security auditors
D. Cyber-criminals
Explanation: Part of the social media sites are the various games & 3rd party applications which help cyber criminals to get access to your data. In this way, they can compromise your account or grab your valuable & confidential data.
A. Retina scanning
B. Fingerprint scanning
C. Captcha
D. 2-step verification
Explanation: With 2-Step Verification (which is also known as 2-factor authentication), users can add an extra layer of security to your account. After login, it asks for your existing phone number to send an OTP for layer-2 verification.
A. True
B. False
C.
D.
Explanation: Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media. There are different website caches and bots that gets automatically downloaded to your system when you open different social-media sites and they store your sensitive data related to your social media account.
A. True
B. False
C.
D.
Explanation: Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security. Every user must use those links to educate themselves and learn various features towards social-media security.