Home » Articles posted by Shraddha Khedkar

Author Archives: Shraddha Khedkar

News/Events@HB

International TPRM Alliance – 16th TPRM Roundtable 2025 – Post Summit Quiz

0%
31

The quiz has expired!

International TPRM Alliance – 14th TPRM Roundtable 2025 – Post Summit Quiz

0%
17

The quiz has expired!

International TPRM Alliance – 13th TPRM Roundtable 2025 – Post Summit Quiz

0%
20

The quiz has expired!

International TPRM Alliance – 12th TPRM Roundtable 2025 – Post Summit Quiz

0%
20

The quiz has expired!

International TPRM Alliance – 10th TPRM Roundtable 2024 – Post Summit Quiz

0%
8

The quiz has expired!

International TPRM Alliance – 9th TPRM Roundtable 2024 – Post Summit Quiz

0%
45

The quiz has expired!

20th National Cyber Security and Cyber Crime Awareness Session at RMDSMS, Pune

0%
713

You have 10 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security General Awareness

20th National Cyber Security and Cyber Crime Awareness Session at R. M. Dhariwal Sinhgad Management School, Kondhapuri, Pune

 

Please enter your full name and email address  for certificate/score-generations! You will receive only if you score above 70%.

1 / 20

Category: Cyber Security General Awareness

1. You receive a phone call from the bank that particular person is asking you for your account details for a vertification. Unfortunately, you give your details and your money and has been withdrawn. You have been victim of which cyber attack?

2 / 20

Category: Cyber Security General Awareness

2. Select the fullform of "DDoS"

3 / 20

Category: Cyber Security General Awareness

3. Which portal is used to report a cyber crime in India ?

4 / 20

Category: Cyber Security General Awareness

4. Is the following statement true or false? Reusing the same password across multiple sites is a good idea. It's very convenient after all.

5 / 20

Category: Cyber Security General Awareness

5. You receive a text message from an unknown number. The text says that if you click the link provided, it will redirect you to a site where you can watch the latest award-winning movie that is still in theatres. You see that the link referenced is from a popular URL shortening site. You should:

6 / 20

Category: Cyber Security General Awareness

6. Which of the following best describes a grandparent scam?

7 / 20

Category: Cyber Security General Awareness

7. Which of the following would be the best password (hardest to crack)?

8 / 20

Category: Cyber Security General Awareness

8. You fell victim to a scam, through which an attacker stole money from you. What should you do?

9 / 20

Category: Cyber Security General Awareness

9. What is the meaning of Encryption?

10 / 20

Category: Cyber Security General Awareness

10. Which computer virus records every movement you make on your computer?

11 / 20

Category: Cyber Security General Awareness

11. What is a person called when they try to hurt a group of people with the use of a computer?

12 / 20

Category: Cyber Security General Awareness

12. Is it generally considered safe to use Starbucks Public Wi-Fi network for performing an online banking operation?

13 / 20

Category: Cyber Security General Awareness

13. Which of the following should you NOT publish on social media sites?

14 / 20

Category: Cyber Security General Awareness

14. Is the following statement true or false. Because operating system updates are time consuming and may need to restart the machine it's a good idea to postpone them as long as possible.

15 / 20

Category: Cyber Security General Awareness

15. Mary downloaded a free software program from an unknown website. After installing the program, her computer started behaving strangely and her files were encrypted. What likely happened, and what should Mary do?

16 / 20

Category: Cyber Security General Awareness

16. Rahul sees an advertisement promising immediate job placements in reputable companies without requiring any prior qualifications. All he needs to do is provide his personal information. What should Rahul do?

17 / 20

Category: Cyber Security General Awareness

17. How was the event ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below

18 / 20

Category: Cyber Security General Awareness

Will you try sharing whatever you learnt today with your friends, relatives and neighbours ?

18. (We will be also interested to conduct an event in your friend's school or college, so that they are also cyber secure. If you are interested to nominate a school or a college, please email us at help@helpingbrainz.org or call us at 8921979187) 

An opportunity for you to give back to the community!

(Note: This question doesn't have a score)

19 / 20

Category: Cyber Security General Awareness

19. When visiting a website, you notice a lock 🔒 icon next to the web address. What does the lock 🔒 represent?

20 / 20

Category: 5th TPRM Roundtable 2024

20. Your esteemed feedback about the event ?

 

Your score is

0%

19th Cyber Security and Cyber Crime Awareness Session at Balagokulam Delhi NCR

0%
29

You have 10 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security General Awareness

Cyber Security and Cyber Crime Awareness Session at Balagokulam Delhi NCR

 

Please enter your full name and email address  for certificate/score-generations! You will receive only if you score above 70%.

1 / 20

Category: Cyber Security General Awareness

1. Which portal is used to report a cyber crime in India ?

2 / 20

Category: Cyber Security General Awareness

2. Is it generally considered safe to use Ambience Mall's(Gurugram) Public Wi-Fi network for performing an online banking operation?

3 / 20

Category: Cyber Security General Awareness

3. _______is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination.

 

4 / 20

Category: Cyber Security General Awareness

4. What are the characteristics of a strong password?

5 / 20

Category: Cyber Security General Awareness

5. The technique used in whaling attack is similar to

6 / 20

Category: Cyber Security General Awareness

6. Never give this out over the phone, or through or email or on the Internet.

7 / 20

Category: Cyber Security General Awareness

7. What does 's' in https stand for?

8 / 20

Category: Cyber Security General Awareness

8. When visiting a website, you notice a lock 🔒 icon next to the web address. What does the lock 🔒 represent?

9 / 20

Category: Cyber Security General Awareness

9. Extracting information over the phone by tricking someone is:

10 / 20

Category: Cyber Security General Awareness

10. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______

11 / 20

Category: Cyber Security General Awareness

11. Which among the following is the safest password ?

12 / 20

Category: Cyber Security General Awareness

12. Who are the targets of modern day hackers?

13 / 20

Category: Cyber Security General Awareness

13. You receive an email from 'hajhsyye@sound.ocn.ne.jp' that urges you to reset your Hyundai password. What should you do?

14 / 20

Category: Cyber Security General Awareness

14. Which is the phishing capital of India ?

15 / 20

Category: Cyber Security General Awareness

15. Which of the following should you do to restrict access to your files and devices?

16 / 20

Category: Cyber Security General Awareness

16. Which of the following is not a cybercrime ?

17 / 20

Category: Cyber Security General Awareness

17. How can a person executing a phishing attack steal someone's identity?

18 / 20

Category: Cyber Security General Awareness

18. How was the event ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below

19 / 20

Category: Cyber Security General Awareness

Will you try sharing whatever you learnt today with your friends, relatives and neighbours ?

19. (We will be also interested to conduct an event in your friend's school or college, so that they are also cyber secure. If you are interested to nominate a school or a college, please email us at help@helpingbrainz.org or call us at 8921979187) 

An opportunity for you to give back to the community!

(Note: This question doesn't have a score)

20 / 20

Category: 5th TPRM Roundtable 2024

20. Your esteemed feedback about the event ?

 

Your score is

0%

Cyber Security Awareness Quiz

This is an initiative by Helping Brainz to spread cyber awareness.

0%
9

You have 5 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security Awareness Month

Cyber Security Awareness Quiz by Helping Brainz

 

Please enter your full name, email address and location for certificate/score-generations! You will receive only if you score above 50%.

1 / 1

Category: Cyber Security Awareness Month

1. Who are the targets of whaling phishing attacks?

Your score is

0%

Music credits: bensound.com

18th Cyber Security and Cyber Crime Awareness Session at SVIMS, Pune

0%
49

You have 10 mins to complete this QUIZ! Wish you all the best!

Time is UP!


Cyber Security General Awareness

Cyber Security and Cyber Crime Awareness Session at Sadhu Vaswani Institute of Management Studies for Girls, Pune

 

Please enter your full name and email address  for certificate/score-generations! You will receive only if you score above 70%.

1 / 20

Category: Cyber Security General Awareness

1. Which portal is used to report a cyber crime in India ?

2 / 20

Category: Cyber Security General Awareness

2. Is it generally considered safe to use Ambience Mall's(Gurugram) Public Wi-Fi network for performing an online banking operation?

3 / 20

Category: Cyber Security General Awareness

3. _______is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination.

 

4 / 20

Category: Cyber Security General Awareness

4. What are the characteristics of a strong password?

5 / 20

Category: Cyber Security General Awareness

5. The technique used in whaling attack is similar to

6 / 20

Category: Cyber Security General Awareness

6. Never give this out over the phone, or through or email or on the Internet.

7 / 20

Category: Cyber Security General Awareness

7. What does 's' in https stand for?

8 / 20

Category: Cyber Security General Awareness

8. When visiting a website, you notice a lock 🔒 icon next to the web address. What does the lock 🔒 represent?

9 / 20

Category: Cyber Security General Awareness

9. Extracting information over the phone by tricking someone is:

10 / 20

Category: Cyber Security General Awareness

10. Governments hired some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as _______

11 / 20

Category: Cyber Security General Awareness

11. Which among the following is the safest password ?

12 / 20

Category: Cyber Security General Awareness

12. Who are the targets of modern day hackers?

13 / 20

Category: Cyber Security General Awareness

13. You receive an email from 'hajhsyye@sound.ocn.ne.jp' that urges you to reset your Hyundai password. What should you do?

14 / 20

Category: Cyber Security General Awareness

14. Which is the phishing capital of India ?

15 / 20

Category: Cyber Security General Awareness

15. Which of the following should you do to restrict access to your files and devices?

16 / 20

Category: Cyber Security General Awareness

16. Which of the following is not a cybercrime ?

17 / 20

Category: Cyber Security General Awareness

17. Shweta Kumari is a MBA student who is a young aspiring volleyball player. Shweta received an email from the Principal of The Sadhu Vaswani Institute of Management Studies (SVIMS) for Girls, Pune asking her to nominate herself for the trails happening for college's volleyball team. Here she is supposed to submit an online form which she received through the email.

As Shweta attended the Cybercrime Awareness session by Helping Brainz, she was aware about the fact that she needs to check the domain and the URL. Which among the below (e-mail) is the correct one?

18 / 20

Category: Cyber Security General Awareness

18. How was the event ?

(a) Interesting

(b) Boring

(c) Informative

(d) Lengthy

Please mention the option in the answer-box below

19 / 20

Category: Cyber Security General Awareness

Will you try sharing whatever you learnt today with your friends, relatives and neighbours ?

19. (We will be also interested to conduct an event in your friend's school or college, so that they are also cyber secure. If you are interested to nominate a school or a college, please email us at help@helpingbrainz.org or call us at 8921979187) 

An opportunity for you to give back to the community!

(Note: This question doesn't have a score)

20 / 20

Category: 5th TPRM Roundtable 2024

20. Your esteemed feedback about the event ?

 

Your score is

0%