SCSAG Shine Cyber Safety Awareness Genius Olympiad Exam

Shine Cyber Safety Awareness Genius is an initiative to spread awareness among teenagers and empower them to be cyber safety geniuses. This olympiad is specifically designed to be taken by teenagers in grades 9th and 10th by Graposs Connect for Shine Olympiad.

Download All Shine Olympiad Question Papers Here

SCSAG Shine Cyber Safety Awareness Genius Olympiad Exam Sample Question Paper

SCSAG Class 9 Sample Questions

Q.1 If your computer rebooting itself then it is likely that__
a. It has a virus
b. It does not have enough memory
c. There is no printer
d. There has been a power surge

Q.2 The term ‘Intellectual Property Rights’ covers
a.Copyrights
b.Know-how
c.Trade dress
d.All of the above

Q.3 Which of the following is not a typical characteristic of an ethical hacker?
a. Excellent knowledge of Windows
b. Understands the process of exploiting network vulnerabilities
c. Patience, Persistence and Perseverence
d. Has the highest level of security for the organization.

Q.4 Which of the following is not a typical characteristic of an ethical hacker?
a. Excellent knowledge of Windows
b. Understands the process of exploiting network vulnerabilities
c. Patience, Persistence and Perseverance
d. Has the highest level of security for the organization.

Q.5 ____________ means to prove the identity of the entity that tries to access the system’s resources.
a. Message authentication
b. Entity authentication
c. Message confidentiality
d. None of the above

Q.6 _____________ means that a sender must not be able to deny sending a message that he sent.
a. Confidentiality
b. Integrity
c. Authentication
d. Nonrepudiation

SCSAG Class 10 Sample Questions

Q.1 If your computer rebooting itself then it is likely that__
a. It has a virus
b. It does not have enough memory
c. There is no printer
d. There has been a power surge

Q.2 A ….. is a small program embeded inside of a GIF image.
a. web bug
b. cookie
c. spyware application
d. spam

Q.3 Junk E-mail is also called__
a. spam
b. spoof
c. sniffer script
d. spool

Q.4 A hacker contacts your phone or E-mails and attempts to acquire your password is called__
a. spoofing
b. phishing
c. spamming
d. buging

Q.5 The term ‘hacker’ was originally associated with which of the following?
a. A computer program
b. Virus
c. Computer professionals who solved complex computer problems
d. All options are correct

Q.6 A ….. is anything that can cause harm.
a. vulnerability
b. phishing
c. threat
d. spoof

Shine Olympiad Website
(Visited 2 times, 1 visits today)

Leave a Reply

Your email address will not be published. Required fields are marked *