| Osi Model Security 1 | Social Networking Security |
| Network Security |
A. Chat messenger
B. Social networking sites
C. Tutorial sites
D. Chat-rooms
Explanation: Social networking sites are the most used sites and the most viral section of the internet. So users must keep their accounts secure and safe from getting into wrong hands.
A. Chat messenger
B. Social networking sites
C. Tutorial sites
D. Chat-rooms
Explanation: Social networking sites are the most used site which acts to connect people for social interaction. So users must keep their accounts secure & safe from getting into wrong hands.
A. Strong passwords
B. Link your account with a phone number
C. Never write your password anywhere
D. Always maintain a soft copy of all your passwords in your pc
Explanation: ‘Always maintain a soft copy of all your passwords in your PC’ is not an appropriate measure for securing your online accounts because, if your system got accessed by anyone or anybody put spyware or screen-recording malware, then all your passwords will get revealed.
A. Never keep your password with any relevant names
B. Keep written records of your passwords
C. Keep records of your password in audio format in your personal cell-phone
D. Passwords are kept smaller in size to remember
Explanation: Never keep your password with any relevant names because there are different types of hackers who either use password guessing techniques or some of them are hard-working and they do social engineering and research on different data associated to the victim.
A. True
B. False
C.
D.
Explanation: Yes, there are script-kiddies or young-hackers who start their hacking career by cracking simple & weak passwords to enlighten their skills to others. These hackers may gain access to your social media accounts & can do some illicit or shameless act on behalf of your name to degrade your reputation.
A. Fader
B. Blur
C. Social-media blocker
D. Ad-blocker
Explanation: Blur is a free browser extension and a popular tool used to block social-media websites to track your browsing activities & prevent users from these surfing pattern stealers.
A. Social engineering
B. Phishing
C. Password guessing
D. Brute force
Explanation: Try to keep your passwords without meaning so that password guessing attack becomes almost impossible to perform successfully. This will reduce the potential to do both passwords guessing as well as dictionary attacks.
A. True
B. False
C.
D.
Explanation: Keeping the password by the name of your pet is not at all a good choice. Because they do social engineering & research on different data associated with you as a victim and will perform password guessing techniques.
A. Signing in
B. Logging out
C. Signing up
D. Logging in
Explanation: Increase your security for social media account by always logging out as you step away from the system. This will reduce both remote hacking as well as physical hacking.
A. True
B. False
C.
D.
Explanation: Clicking on enticing Ads can cause trouble. Viruses & malware frequently find their mode of entering onto the victim computer through these annoying & enticing ads.