All questions of Network Security for Class 10 Exam

Hacking a computer is always illegal and punishable by law.
  • a)
    false
  • b)
    true
Correct answer is option 'A'. Can you explain this answer?

Akshara Basu answered
While hacking itself isn't necessarily illegal, the act of hacking is punishable when it's attached to a more serious crime, or the potential to commit a more serious crime.

 When a person is harrassed repeatedly by being followed, called or be written to he / she is a target of
  • a)
    Bullying
  • b)
    Identity theft
  • c)
    Stalking
  • d)
    Phishing
Correct answer is option 'C'. Can you explain this answer?

Crafty Classes answered
Explanation:


  • Harassment: Harassment refers to the unwanted and repeated behavior that causes distress, fear, or intimidation. It can manifest in various forms, such as stalking, following, calling, or writing to a person repeatedly.

  • Stalking: Stalking is a form of harassment where an individual repeatedly and obsessively follows, monitors, or contacts another person without their consent. It can occur in person or through various means of communication.

  • Bullying: While bullying involves repeated aggressive behavior, it usually occurs in a different context, such as in schools or workplaces. Stalking, on the other hand, specifically refers to the repeated unwanted attention from an individual.

  • Identity theft: Identity theft involves the unauthorized use of someone's personal information for fraudulent purposes. It typically does not involve the act of following, calling, or writing to a person repeatedly.

  • Phishing: Phishing refers to the fraudulent attempt to obtain sensitive information, such as passwords or credit card details, by disguising as a trustworthy entity. It is usually carried out through deceptive emails, websites, or messages.


Therefore, the correct answer is Option C: Stalking.

With genetic and genomic research which of the following issues is of specific concern
  • a)
    Anonymity
  • b)
    Intellectual property
  • c)
    Software piracy
  • d)
    Concerns about biochip implants
Correct answer is option 'A'. Can you explain this answer?

Arun Yadav answered
Genetics and genomics are two terms that are often incorrectly used interchangeably. Genetics is the study of single genes and their role in the way traits or conditions are passed from one generation to the next. Genomics is a term that describes the study of all parts of an organism's genes.

It is a program or hardware device that filters the information coming through an internet connection to a network or computer system.
  • a)
    Anti virus
  • b)
    Firewall
  • c)
    Cookies
  • d)
    Cyber safety
Correct answer is option 'B'. Can you explain this answer?

Crafty Classes answered
Explanation:
A firewall is a program or hardware device that filters the information coming through an internet connection to a network or computer system. It acts as a barrier between the internal network and the external network (such as the internet) to protect the network from unauthorized access and potential threats. Here is a detailed explanation of how a firewall works:
1. Filtering:
- A firewall filters incoming and outgoing network traffic based on predetermined rules and policies.
- It examines the data packets and determines whether to allow or block them based on the defined criteria.
2. Network Security:
- Firewalls are an essential component of network security infrastructure.
- They help prevent unauthorized access to a network and protect against various threats such as hackers, malware, and viruses.
3. Types of Firewalls:
- There are different types of firewalls, including network firewalls, host-based firewalls, and application firewalls.
- Network firewalls are placed at the boundary between the internal network and the external network.
- Host-based firewalls are installed on individual devices to control their network connections.
- Application firewalls focus on specific applications and their communication.
4. Packet Inspection:
- Firewalls use packet inspection techniques to analyze the data packets traveling through the network.
- They examine the packet headers, source and destination IP addresses, ports, and other relevant information to determine whether the packet should be allowed or blocked.
5. Access Control:
- Firewalls enforce access control policies by allowing or denying traffic based on a set of rules.
- These rules can be based on IP addresses, port numbers, protocols, or application-specific criteria.
6. Logging and Monitoring:
- Firewalls provide logging and monitoring capabilities to track and analyze network traffic.
- They generate logs that contain information about blocked and allowed connections, which can be used for troubleshooting and security analysis.
In conclusion, a firewall is a crucial component of network security that filters and controls the flow of information between a network or computer system and the internet. It helps protect against unauthorized access, malicious activities, and potential threats.

Exploring appropriate and ethical behaviours related to online environments and digital media.
  • a)
    Cyber ethics
  • b)
    Cyber safety
  • c)
    Cyber security
  • d)
    Cyber law
Correct answer is option 'A'. Can you explain this answer?

Crafty Classes answered
Exploring appropriate and ethical behaviours related to online environments and digital media:
- Cyber ethics: Cyber ethics refers to the study of appropriate and ethical behaviors in online environments and digital media. It involves understanding and applying moral principles and values when using technology and the internet. Some key points related to cyber ethics include:
- Respecting the privacy and confidentiality of others.
- Avoiding cyberbullying and online harassment.
- Using technology responsibly, ethically, and legally.
- Respecting intellectual property rights and avoiding plagiarism.
- Practicing good digital citizenship by being respectful and responsible online.
- Cyber safety: Cyber safety focuses on protecting oneself and others from online threats and dangers. It involves adopting safety measures and strategies to ensure a secure online experience. Some key points related to cyber safety include:
- Using strong and unique passwords for online accounts.
- Being cautious while sharing personal information online.
- Avoiding clicking on suspicious links and downloading unknown files.
- Using reliable antivirus software and keeping it up to date.
- Educating oneself about common online scams and phishing attempts.
- Cyber security: Cyber security refers to the practice of protecting computer systems, networks, and data from unauthorized access, damage, or theft. It involves implementing measures to prevent and detect cyber attacks. Some key points related to cyber security include:
- Using firewalls and encryption to secure networks and data.
- Regularly updating software and operating systems to patch vulnerabilities.
- Implementing strong authentication methods, such as two-factor authentication.
- Conducting regular security audits and risk assessments.
- Training employees or users about best practices for cyber security.
- Cyber law: Cyber law encompasses legal issues and regulations related to the use of technology, the internet, and digital media. It governs activities and behaviors in cyberspace and helps address cybercrimes and online misconduct. Some key points related to cyber law include:
- Protecting intellectual property rights and copyrights online.
- Addressing cyberbullying, harassment, and online defamation.
- Defining and prosecuting cybercrimes, such as hacking and identity theft.
- Establishing regulations for online commerce and e-commerce transactions.
- Ensuring privacy and data protection in the digital realm.
Overall, exploring appropriate and ethical behaviors in online environments and digital media is crucial for maintaining a safe, secure, and respectful online presence. It involves understanding and following cyber ethics, practicing cyber safety measures, implementing cyber security practices, and complying with cyber laws and regulations.

A lincense allows a user to use copyrighted material.
  • a)
    In some situations this statement is correct 
  • b)
    This statement is not true at all.
  • c)
    In is not necessry to use license.
  • d)
    All the above statements are not applicable.
Correct answer is option 'A'. Can you explain this answer?

Rajiv Gupta answered
Examine the work itself to see if there is a copyright notice on it Search through the records of the Copyright Office Have the Copyright Office perform a search for you These are just a few of the many possible ways to determine if a work is copyrighted.

The next step in obtaining a license is to obtain the permission of the owner to use the material. The method for obtaining permission can vary with the type of work. Often, there are licensing organizations that either hold the copyrights or represent the copyright holders. You must contact these organizations to obtain a license for works they cover. If you know who the copyright owner is, you can contact him or her directly.
Creating a licensing agreement can be complex and difficult. An experienced intellectual property lawyer can help you draft a licensing agreement. An IP attorney can also represent you in court if you have a copyright dispute.

It allow a visited website to store its own information about a user on the user’s computer.?
  • a)
    Spam
  • b)
    Malware
  • c)
    Cookies
  • d)
    Adware
Correct answer is option 'C'. Can you explain this answer?

Explanation:
The correct answer is C: Cookies.
Definition:
Cookies are small text files that are stored on a user's computer by a website. They allow the website to store and retrieve information about the user's browsing habits and preferences. Cookies are created and stored by the website's server and are sent to the user's computer when they visit the website.
Functionality:
When a user visits a website, cookies are used to:
1. Remember login information: Cookies can store login credentials, so users don't have to enter their username and password every time they visit a website.
2. Personalize user experience: Cookies can be used to remember user preferences, such as language settings, font size, or theme preferences.
3. Track user activity: Cookies can track and store information about a user's browsing habits on a website. This information can be used for analytics and marketing purposes.
4. Targeted advertising: Cookies can be used to track user behavior and display personalized advertisements based on their interests and browsing history.
Types of Cookies:
1. Session cookies: These are temporary cookies that are stored in the user's computer's memory during a browsing session. They are deleted once the browser is closed.
2. Persistent cookies: These cookies are stored on the user's computer for a longer period. They can be used to remember user preferences and settings for future visits.
3. Third-party cookies: These cookies are set by third-party websites and are used for tracking and advertising purposes.
Conclusion:
Cookies play an important role in providing a personalized and seamless browsing experience for users. They allow websites to store and retrieve information about users, which can be used for various purposes such as personalization, analytics, and targeted advertising.

 A lincense allows a user to use copyrighted material.
  • a)
    True
  • b)
    false
Correct answer is option 'A'. Can you explain this answer?

Crafty Classes answered
Explanation:

A license is a legal agreement between the owner of a copyrighted material and a user that grants the user specific rights to use the material. These rights can vary depending on the terms of the license agreement, but they generally include the right to use, copy, distribute, or modify the material.

When a user obtains a license, they are granted permission to use the copyrighted material in accordance with the terms and conditions set forth in the license agreement. This allows the user to legally use the material without infringing on the owner's rights.

Therefore, the statement "A license allows a user to use copyrighted material" is true.

Which of the following is a class of computer threat
  • a)
    Phishing
  • b)
    DoS attacks
  • c)
    Soliciting
  • d)
    Stalking
Correct answer is option 'B'. Can you explain this answer?

Class of Computer Threats

There are various classes of computer threats that can compromise the security and integrity of computer systems. One such class of computer threat is:

DoS attacks:

  • Denial of Service (DoS) attacks are malicious attempts to disrupt the normal functioning of a computer network or website.

  • These attacks overwhelm the targeted system with a flood of illegitimate requests or excessive traffic, causing the system to become unresponsive or crash.

  • DoS attacks can be executed using various techniques, such as flooding the network with excessive data packets or exploiting vulnerabilities in the network infrastructure.

  • The main objective of a DoS attack is to disrupt the availability of a targeted system or service, rendering it inaccessible to legitimate users.

  • DoS attacks can have severe consequences, especially for businesses and organizations that heavily rely on their online presence for operations.


While phishing, soliciting, and stalking can also pose security threats in different contexts, they are not classified as specific computer threats. Therefore, the correct answer to the question is B: DoS attacks.

Which of the following is not an external threat to a computer or a computer network
  • a)
    Ignorance
  • b)
    Trojan horses
  • c)
    Adware
  • d)
    Crackers
Correct answer is option 'A'. Can you explain this answer?

External Threats to a Computer or Computer Network

External threats to a computer or computer network refer to potential risks and vulnerabilities that may compromise the security and functionality of the system. These threats are typically caused by malicious individuals or software. The options provided are:

A: Ignorance
- Ignorance is not an external threat to a computer or computer network. It refers to a lack of knowledge or awareness about computer security practices, but it is not a direct threat itself.
B: Trojan horses
- Trojan horses are a type of malware that disguises itself as legitimate software to gain unauthorized access or control over a computer or network. They can cause significant damage by stealing sensitive information, modifying data, or allowing remote control by hackers.
C: Adware
- Adware is a type of software that displays unwanted advertisements on a user's computer. While it can be annoying and intrusive, it is not typically considered a severe external threat to the overall security of a computer or network.
D: Crackers
- Crackers, also known as malicious hackers, are individuals who exploit vulnerabilities in computer systems or networks for personal gain or malicious intent. They can engage in activities such as unauthorized access, data theft, or disruption of services.
Therefore, the correct answer is:

Answer: A: Ignorance
It is important for computer users to be aware of potential threats and to take appropriate security measures to protect their systems and data.

Chapter doubts & questions for Network Security - Information & Computer Technology (Class 10) - Notes & Video 2025 is part of Class 10 exam preparation. The chapters have been prepared according to the Class 10 exam syllabus. The Chapter doubts & questions, notes, tests & MCQs are made for Class 10 2025 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests here.

Chapter doubts & questions of Network Security - Information & Computer Technology (Class 10) - Notes & Video in English & Hindi are available as part of Class 10 exam. Download more important topics, notes, lectures and mock test series for Class 10 Exam by signing up for free.

Top Courses Class 10

Related Class 10 Content