Directions (1-10): Read the following paragraph. Some of the words have been highlighted in bold. Answer the questions based on this paragraph.
The internet has become the integral part of
today’s generation of people; from communicating through instant messages and
emails to banking, travelling, studying and shopping, internet has touched
every aspect of life. With the growing use of the internet by people,
protecting important information has become a necessity. A computer that is not having appropriate
security controls can be infected with malicious logic and thus any type of
information can be accessed in moments. Number of infected Web Pages and
malicious websites can be seen every day that infects the computer and allow
hackers to gain illegal access to other computer systems.
Hacking of important data, network outages,
computer viruses and other cyber related threats affect our lives that range
from minor inconvenience to serious incidents. Cyber threats can be caused due
to negligence and vulnerabilities, or unintentional accidents. The main
objectives of such type of system attackers or hackers are to steal
confidential information, to make illegal monetary transactions, to destroy or
to change data and the like. System attackers can be terrorists, crackers or
recreational hackers. They have a variety of tools that can harm or infect the
computer; usually they use malicious logic or virus to gain unauthorized access
to a computer. Opening email attachments that carry the virus, clicking
malicious links or websites or unintentionally downloading a dangerous program
are common ways through which a computer can be infected and data can be
stolen.
As the number of data networks, digital
applications, as well as internet and mobile users are growing, so do the
chances of cyber exploitation and cyber crimes. Even a small mistake in
securing data or bad social networking can prove to be extremely dangerous. If
accounts are not properly secured, it makes easier for hackers or unauthorized
users to spread viruses or social engineered attacks that are designed to steal
data and even money. Such types of issues highlight the need for cyber security
as an essential approach in protecting and preventing data from being used
inappropriately.
In simple language, Cyber Security or
Information technology security means protecting data, networks, programs and
other information from unauthorized or unintended access, destruction or
change. It encompasses all the mechanisms and processes that protect digital
equipment, information and records from illegal or unintended access,
manipulation or destruction.
In today’s dynamic environment, cyber security
has become vital for individuals and families, as well as organizations (such
as military, government, business houses, educational and financial
institutions, corporations and others) that collect and store a wide range of
confidential data on computers and transmit that to other computers across
different networks. For families, protection of children and family members from
cyber crime has become substantially important. For an individual, protecting
information
that could impact social life as well as
personal finance is essential. The internet has provided a wide array of
learning opportunities, but there are risks too. Photos, videos and other
personal information shared by an individual on social networking sites such as
Facebook, Twitter can be inappropriately used by others may lead to serious and
even life-threatening incidents. Social networking sites have become the most
popular medium for sharing information and connecting with other people. But
these sites have created varied opportunities for cybercrimes, compromised
personal identities and information leakage. Therefore, it is important for
individuals to understand how to protect against cyber threats, and must also
comprehend the difference between virtual and real world. One should learn how
to protect computers and personal information from being hacked and should
engage in appropriate online behaviour in order to eliminate changes of cyber
threats and thereby creating a safer online environment.
Q1. According to the author what does the cyber
security means?
(a) Cyber Security means the dispersion of
important data and devise a structural engineering that allow easy flow of
information
(b) Cyber Security means protecting data,
networks, programs and other information from unauthorized or unintended
access, destruction or change.
(c) Cyber Security means the blocking of all
the websites that are available in free domain
(d) Cyber Security means the Hacking of
important data, network outages, computer viruses and other cyber related
threats affect our lives that range from minor inconvenience to serious
incidents.
(e) None of the above
Q2. According to the author, what is the main
reasons behind cyber threats?
(a) the unknown person with malice
(b) due to intelligence, veneration and
intentional threats.
(c) due to negligence and vulnerabilities, or
unintentional accidents.
(d) by communicating through instant messages
and emails to banking, travelling, studying and shopping on internet
(e) None of the above
Q3. What is the downside of Social media,
according to the author?
(a) the long hours usage of social media could
affect an individual mentally and become the victim of depression
(b) by sharing sensitive information, one can
be vulnerable to sudden outburst of emotions
(c) information shared by an individual for
socializing purposes can be distorted and can be used for malignant purpose.
(d) the social media owners can steal the
information and sell this information for monetary purposes
(e) None of the above
Q4.
According to this passage, how the virus gets into the computers?
(a) by saving data and clicking on the desktop
(b) by opening a document file in the search
history
(c) by texting online and receiving files on
social media platforms
(d) Opening email attachments that carry the
virus, clicking malicious links or websites or unintentionally downloading a
dangerous program
(e) None of the above
Q5. What will be the apt title for this
passage?
(a) life hacks
(b) Cybercrime and hacking
(c) technology and its advantages
(d) technological advances
(e) The impact of social media
Q6. In the following question, find the word
that is most similar in the meaning to the word ‘malicious’?
(a) benefactor
(b) benign
(c) benevolent
(d) vitriolic
(e) vituperate
Q7. In the following question, find the word
that is most similar in the meaning to the word “illegal”?
(a) symposium
(b) chagrin
(c) chauvinistic
(d) Felonious
(e) charlatan
Q8. In the following question, find the word
that is opposite in the meaning to the word “unauthorized”?
(a) accredit
(b) unaccredited
(c) inadmissible
(d) increment
(e) liaison
Q9. In the following question, find the word
that is opposite in the meaning to the word “appropriate”?
(a) malapropos
(b) opportunely
(c) sequestrate
(d) usurp
(e) commandeer
Q10. In the following question, find the word
that is most similar in the meaning to the word “unintentional”?
(a) despotic
(b) harbinger
(c) fortuitously
(d) immaculate
(e) innocuous
Solutions:
S1. Ans.(b)
Sol. It is mentioned in the passage that Cyber
Security means protecting data, networks, programs and other information from
unauthorized or unintended access, destruction or change.
S2. Ans.(c)
Sol. The reason mentioned in the paragraph for
cyber threats is “due to negligence and vulnerabilities, or unintentional
accidents.”
S3. Ans.(c)
Sol. information shared by an individual for
socializing purposes can be distorted and can be used for malignant purpose.
S4. Ans.(d)
Sol. Opening email attachments that carry the
virus, clicking malicious links or websites or unintentionally downloading a
dangerous program
S5. Ans.(b)
Sol. The appropriate title for the given
passage would be ‘Cybercrime and hacking’.
S6. Ans.(d)
Sol. malicious- characterized by malice;
intending or intended to do harm.
vitriolic-filled with bitter criticism or
malice.
hence, these two words are synonyms to each
other.
S7. Ans.(d)
Sol. Felonious-relating to or involved in
crime.
hence illegal and Felonious are synonyms to
each other.
S8. Ans.(a)
Sol. accredit-(of an official body) give
authority or sanction to (someone or something) when recognized standards have
been met.
hence, accredit and unauthorized are antonyms
to each other.
S9. Ans.(a)
Sol. malapropos-in an inopportune or
inappropriate way.
hence, malapropos and appropriate are antonyms.
S10. Ans.(c)
Sol. fortuitously- Happening by accident or
chance. Hence, fortuitously and unintentional are synonyms to each other.
For more Updates & Notifications for bank exams like SBI PO, SBI CLERK, IBPS PO, IBPS RRB, IBPS CLERK, IBPS SO, NIACL, SSC CHSL, SSC CGL etc. like our facebook page at :
0 comments:
Post a Comment