Chapter 9: Internet, Email, and Online Communication (Set-10)

If DNS cache stores a wrong IP for a domain, the quickest fix on a device is to

A Increase bandwidth
B Disable cookies
C Flush DNS cache
D Save new bookmark

When a browser uses HTTPS, which security mechanism most directly protects data in transit

A DNS caching
B TLS encryption
C Cookie policy
D Ad blocking

A phishing site can still show HTTPS because the certificate mainly proves

A Content truth
B No malware
C Official authority
D Domain control

Which browser feature most directly reduces tracking by advertising networks across sites

A Increase zoom level
B Clear bookmarks
C Block third-party cookies
D Change home page

If a web page looks updated on one device but not another, the most likely reason is different

A Screen resolution
B Cached content
C Keyboard layout
D Email settings

When many tabs slow down a browser, the most common resource being consumed is

A RAM memory
B DNS servers
C ISP quota
D POP3 storage

In advanced search, site:gov.in filetype:pdf is mainly used to

A Block unsafe links
B Increase search speed
C Find official PDFs
D Remove cookies

The intitle: operator is most useful when you want results where the keyword appears in the

A Image alt text
B Download folder
C Browser cache
D Page title

If you must exclude a word from search results, the most correct method is using

A OR operator
B Minus operator
C Quotes only
D Date filter

A reliable way to detect copied content in your notes is to check for

A Unchanged long phrases
B Short keywords only
C Extra bookmarks
D More cache files

In email security, SPF and DKIM checks mainly help reduce

A Browser pop-ups
B Cloud quota errors
C Video call lag
D Sender spoofing

Which email component is best for quickly detecting suspicious spoofing patterns

A Subject line
B Signature block
C Email headers
D Draft folder

A safe practice when emailing many external recipients is to use

A Reply All
B BCC field
C CAPS subject
D No subject

In netiquette, replying late without any update is considered unprofessional mainly because it

A Clears cache files
B Improves privacy
C Increases bandwidth
D Delays coordination

The best subject line improvement for “Important” is to make it

A Specific and action-based
B Longer than body
C All caps words
D Emoji filled

If you share a Drive link publicly by mistake, the fastest corrective action is to

A Delete your email
B Clear browser history
C Change link permissions
D Increase storage quota

A cloud “anyone with link” setting is risky because link access can be

A Encrypted always
B Forwarded easily
C Limited by ISP
D Locked to device

In cloud collaboration, the strongest protection against accidental edits is having

A More bookmarks
B Higher bandwidth
C Dark mode
D Version history

A sync conflict typically happens when the same document is edited

A Only on server
B Offline on two devices
C Only read online
D Printed to PDF

In video meetings, the biggest privacy risk of “share desktop” is exposing

A Bandwidth speed
B DNS settings
C Notifications and files
D Keyboard layout

Waiting rooms and passcodes are mainly designed to prevent

A Email spam
B Cache overflow
C Storage full
D Unauthorized joining

End-to-end encryption differs from normal encryption mainly because the provider

A Stores all messages
B Cannot read content
C Controls your device
D Removes spam

SMS OTP is sometimes weaker than app OTP mainly because SMS can be

A Hijacked via SIM swap
B Stored in cache
C Encrypted by browser
D Blocked by bookmarks

If an attacker knows your password, 2FA still helps because it requires

A Bigger mailbox
B Faster connection
C Second proof factor
D More bookmarks

A strong password policy for multiple accounts should focus on

A Same everywhere
B Only birthdays
C Short length
D Unique per site

The most effective way to avoid phishing from email links is to

A Click urgent link
B Type official URL
C Share OTP to verify
D Disable security checks

A browser warning about an invalid certificate is most risky because it may indicate

A More bandwidth
B Better privacy
C Man-in-middle risk
D Faster download

On public Wi-Fi, the safest general rule is to avoid

A Bookmarking sites
B Reading PDFs
C Using search filters
D Sensitive logins

A common sign of a malicious “download” button is that it installs an

A Verified store app
B Official update package
C Unknown extra installer
D PDF reader only

A browser extension is risky when it requests permission to

A Change font size
B Read all site data
C Add bookmarks
D Print pages

The main benefit of clearing browser cache during troubleshooting is to

A Force fresh files
B Save more bookmarks
C Increase RAM permanently
D Block all phishing

A digital footprint is hard to remove mainly because online data can be

A Cleared by refresh
B Blocked by ISP
C Deleted by cookies
D Copied and archived

The most professional response to a heated email thread is to

A Reply in caps
B Use insults
C Use calm tone
D Reply immediately

In email attachments, the highest risk file type to open from unknown senders is

A Image file
B Executable file
C Text document
D PDF file

A safe method to share sensitive documents for review is to

A Public link sharing
B Reply all with file
C Post on social
D Restricted cloud sharing

In cloud storage, emptying “trash” matters because it can

A Reduce latency
B Block spam
C Free quota space
D Encrypt links

In search results, the safest first step before trusting a medical or legal claim is to

A Trust top result
B Verify official sources
C Trust comments
D Share instantly

The best reason to avoid “Reply All” on a message with external recipients is to prevent

A Data leakage
B Faster response
C Email encryption
D Folder creation

If your cloud link is set to “editor,” the biggest risk is

A Slow downloads
B DNS failures
C Email spam
D Unauthorized changes

A simple way to reduce background data usage without blocking internet is to

A Enable auto-play
B Restrict background data
C Use highest quality
D Keep hotspot on

A meeting host should limit screen sharing to reduce risk of

A Higher bandwidth
B Longer emails
C Accidental exposure
D Better sound

When using a password manager, the biggest safety rule is protecting the

A Bookmark folder
B Email subject
C Cloud quota
D Master password

The safest behavior after receiving a “bank account locked” email is to

A Click given link
B Contact official support
C Share OTP quickly
D Reply with details

In cloud collaboration, “viewer” role prevents

A Editing content
B Downloading file
C Reading content
D Opening link

Using “incognito” mode does NOT prevent

A Local history saving
B Cookie retention
C Website server logs
D Form autofill saving

The most accurate benefit of ad-blockers is reducing

A Password theft always
B DNS failures
C Cloud storage
D Tracking scripts and ads

A reliable check to confirm a domain is official is comparing it with

A Random blog claim
B Official portal address
C Unverified screenshots
D Group forward message

If you must share a file but prevent recipients from seeing others’ emails, use

A CC field
B Reply all
C BCC field
D Subject line

The best reason to use cloud links instead of email attachments in a team is that links

A Remove need internet
B Encrypt all devices
C Block spam mails
D Keep one latest version

When a browser asks to allow notifications on an unknown site, the safest choice is

A Allow always
B Allow temporarily
C Block or deny
D Disable antivirus

Leave a Reply

Your email address will not be published. Required fields are marked *