All Exams  >   Class 10  >   Computer Application: Class 10  >   All Questions

All questions of Cyber Ethics for Class 10 Exam

It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______:
  • a)
    Antivirus
  • b)
    Firewall
  • c)
    Cookies
  • d)
    Malware
Correct answer is option 'B'. Can you explain this answer?

Meera Rana answered
There are two types of firewalls - software programs and hardware-based firewalls. These types of firewalls filter each and every data packet coming from the outside environment such as network; internet so that any kind of virus would not be able to enter in the user's system. In some cases where the firewall detects any suspicious data packet, it immediately burns or terminates that data packet. In short, we can also say that it is the first line of defense of the system to avoid several kinds of viruses.

Which one of the following is a type of antivirus program?
  • a)
    Quick heal
  • b)
    Mcafee
  • c)
    Kaspersky
  • d)
    All of the above
Correct answer is option 'D'. Can you explain this answer?

Rohit Sharma answered
Antivirus is a kind of software program that helps to detect and remove viruses form the user's computer and provides a safe environment for users to work on. There are several kinds of antivirus software are available in the market, such as Kaspersky, Mcafee, Quick Heal, Norton etc., so the correct answer is D.

Which of the following refers to the violation of the principle if a computer is no more accessible?
  • a)
    Access control
  • b)
    Confidentiality
  • c)
    Availability
  • d)
    All of the above
Correct answer is option 'C'. Can you explain this answer?

Kshitij goyal answered
Explanation:

Availability is the principle that ensures that a computer system or network is accessible and usable by authorized users when they need it. It refers to the accessibility of data, applications, and resources to authorized users, as well as the ability of the system to perform its intended functions.

Access control and confidentiality are related to security, but they do not necessarily ensure availability. Access control refers to the ability to restrict or grant access to specific resources or data based on user credentials or other criteria. Confidentiality refers to the protection of sensitive information from unauthorized disclosure or access.

If a computer system is no longer accessible, it means that the principle of availability has been violated. This can happen due to various reasons such as hardware or software failures, network outages, cyber-attacks, or other security incidents.

In conclusion, the correct answer is option C, availability, as it refers to the violation of the principle if a computer is no more accessible.

Which of the following is considered as the unsolicited commercial email?
  • a)
    Virus
  • b)
    Malware
  • c)
    Spam
  • d)
    All of the above
Correct answer is option 'C'. Can you explain this answer?

Meera Rana answered
It is a type of unsolicited email which is generally sent in bulk to an indiscriminate recipient list for commercial purpose. Generally, these types of mail are considered unwanted because most users don't want these emails at all.

Which one of the following is also referred to as malicious software?
  • a)
    Maliciousware
  • b)
    Badware
  • c)
    Ilegalware
  • d)
    Malware
Correct answer is option 'D'. Can you explain this answer?

Krishna Iyer answered
Malware is a kind of short program used by the hacker to gain access to sensitive data/ information. It is used to denote many kinds of viruses, worms, Trojans, and several other harmful programs. Sometimes malware is also known as malicious software.

Which of the following is considered as the first hacker's conference?
  • a)
    OSCON
  • b)
    DEVON
  • c)
    DEFCON
  • d)
    SECTION
Correct answer is option 'C'. Can you explain this answer?

Pooja Shah answered
DEFCON is one of the most popular and largest Hacker's as well as the security consultant's conference. It is always held once a year in Las Vegas, Nevada, where hackers of all types (such as black hats, gray hats, and white hat hackers), government agents as well as security professionals from around the world attend the conference attends this meeting.

Which one of the following systems cannot be considered as an example of the operating systems?
  • a)
    Windows 8
  • b)
    Red Hat Linux
  • c)
    BSD Linux
  • d)
    Microsoft Office
Correct answer is option 'D'. Can you explain this answer?

Vivek Rana answered
Microsoft office is a type of software used for creating and managing documents, which is one of the most famous products of the Microsoft organization. So the correct answer will be the D.

 Which one of the following can be considered as the class of computer threats?
  • a)
    Dos Attack
  • b)
    Phishing
  • c)
    Soliciting
  • d)
    Both A and C
Correct answer is option 'A'. Can you explain this answer?

Gauri iyer answered
Computer Threats

Computer threats are malicious programs or activities that can harm computer systems, steal data or compromise the security of the system. There are different types of computer threats, including viruses, malware, spyware, ransomware, and more.

Dos Attack

A Denial of Service (DoS) attack is a type of cyber attack where the attacker floods the targeted computer or network with a huge amount of traffic, rendering it unavailable or slow. The attacker achieves this by sending multiple requests from different machines or networks, overloading the targeted system's resources. As a result, legitimate users are denied access to the service or website.

Phishing

Phishing is a type of social engineering attack where the attacker sends fraudulent emails or messages, pretending to be a trustworthy entity, to trick the recipient into revealing sensitive information such as usernames, passwords, and credit card details. The attacker can then use this information for malicious purposes, such as stealing money or identity theft.

Soliciting

Soliciting is a type of computer threat where the attacker tries to trick the user into downloading a malicious program or clicking on a malicious link by promising them something in return. For example, the attacker may offer free software or coupons in exchange for the user's personal information or clicking on a link.

Conclusion

Out of the given options, only DoS attack can be considered a class of computer threats. The other options, phishing and soliciting, are types of cyber attacks that fall under the broader category of social engineering attacks.

Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
  • a)
    Malware
  • b)
    Spyware
  • c)
    Adware
  • d)
    All of the above
Correct answer is option 'B'. Can you explain this answer?

Shubham Sharma answered
  • Spyware is a type of malicious software generally defined as the software designed to enter the target's device or computer system, gather all information, observe all user activities, and send this information to a third party.
  • Another important thing about spyware is that it works in the background sends all information without your permission.
  • Spyware is controversial because, even when it is installed for relatively innocuous reasons, it can violate the end user's privacy and has the potential to be abused
Hence, the correct answer is
Option B
You can learn Information & Computer Technology for Class 10 by going through the course:

In the CIA Triad, which one of the following is not involved?
  • a)
    Availability
  • b)
    Confidentiality
  • c)
    Authenticity
  • d)
    Integrity
Correct answer is option 'C'. Can you explain this answer?

Kiran Mehta answered
CIA refers to Confidentiality, Integrity, and Availability that are also considered as the CIA triad. However, the CIA triad does not involve Authenticity.

Which of the following port and IP address scanner famous among the users?
  • a)
    Cain and Abel
  • b)
    Angry IP Scanner
  • c)
    Snort
  • d)
    Ettercap
Correct answer is option 'B'. Can you explain this answer?

Avinash Patel answered
Angry IP Scanner is a type of hacking tool that is usually used by both white hat and black hat types of hackers. It is very famous among the users because it helps to find the weaknesses in the network devices.

Which of the following refers to stealing one's idea or invention of others and use it for their own benefits?
  • a)
    Piracy
  • b)
    Plagiarism
  • c)
    Intellectual property rights
  • d)
    All of the above
Correct answer is option 'D'. Can you explain this answer?

Avinash Patel answered
The stealing ideas or the invention of others and using them for their own profits can also be defined in several different ways, such as piracy, intellectual property rights, and plagiarism.

Hence Option (D) is correct

For detailed notes on Cyber Ethics click on the following link:

Which one of the following refers to the technique used for verifying the integrity of the message?
  • a)
    Digital signature
  • b)
    Decryption algorithm
  • c)
    Protocol
  • d)
    Message Digest
Correct answer is option 'D'. Can you explain this answer?

Avinash Patel answered
Message Digest is a type of cryptographic hash function that contains a string of digits that are created by the one-way hashing formula. It is also known as a type of technique used for verifying the integrity of the message, data or media, and to detect if any manipulations are made. Therefore the correct answer is D.

Which one of the following usually used in the process of Wi-Fi-hacking?
  • a)
    Aircrack-ng
  • b)
    Wireshark
  • c)
    Norton
  • d)
    All of the above
Correct answer is option 'A'. Can you explain this answer?

Aditya Shah answered
The Aircrack-ng is a kind of software program available in the Linux-based operating systems such as Parrot, kali etc. it is usually used by users while hacking the Wi-Fi-networks or finding vulnerabilities in the network to capture or monitor the data packets traveling in the network.

To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.
  • a)
    Antivirus
  • b)
    Firewall
  • c)
    Vlc player
  • d)
    Script
Correct answer is option 'B'. Can you explain this answer?

Radha Iyer answered
It is essential to always keep the firewall on in our computer system. It saves the computer system against hackers, viruses, and installing software form unknown sources. We can also consider it the first line of defense of the computer system.

Why are the factors like Confidentiality, Integrity, Availability, and Authenticity considered as the fundamentals?
  • a)
    They help in understanding the hacking process
  • b)
    These are the main elements for any security breach
  • c)
    They help to understand the security and its components in a better manner
  • d)
    All of the above
Correct answer is option 'C'. Can you explain this answer?

Introduction:
Confidentiality, Integrity, Availability, and Authenticity are considered as the fundamentals of security. These factors play a crucial role in understanding the concept of security and its components.

Explanation:
1. Confidentiality:
- Confidentiality refers to protecting sensitive information from unauthorized access or disclosure.
- It ensures that only authorized individuals or systems can access or view the information.
- Confidentiality is important to maintain privacy and prevent data breaches.

2. Integrity:
- Integrity ensures that data remains accurate, consistent, and trustworthy throughout its lifecycle.
- It involves protecting data from unauthorized modification, deletion, or corruption.
- Maintaining data integrity is crucial to ensure the reliability and validity of information.

3. Availability:
- Availability refers to ensuring that data, systems, and services are accessible and usable when needed.
- It involves preventing disruptions, downtime, or unauthorized denial of service.
- Availability is essential for continuous operations and to meet users' needs.

4. Authenticity:
- Authenticity ensures that data, information, or resources are genuine and can be trusted.
- It involves verifying the identity of users, systems, or messages to prevent impersonation or tampering.
- Authenticity helps establish trust and confidence in the integrity of the data.

Why are these factors considered as fundamentals?
- These factors are considered as fundamentals because they form the core principles of security.
- They provide a comprehensive framework for understanding and evaluating the security of systems and information.
- Confidentiality, integrity, availability, and authenticity are interconnected and mutually dependent on each other.
- They help in establishing a strong security foundation by addressing different aspects of security.
- By considering these factors, organizations can develop robust security measures and strategies to protect their assets and mitigate risks.

Conclusion:
Confidentiality, integrity, availability, and authenticity are fundamental factors in understanding security and its components. They provide the necessary framework to protect sensitive information, ensure data accuracy, enable continuous operations, and establish trust. By considering these factors, individuals and organizations can enhance their security posture and effectively mitigate security risks.

Which type following UNIX account provides all types of privileges and rights which one can perform administrative functions?
  • a)
    Client
  • b)
    Guest
  • c)
    Root
  • d)
    Administrative
Correct answer is option 'D'. Can you explain this answer?

Gaurav Kumar answered
If a user uses the Root account of the UNIX operating system, he can carry out all types of administrative functions because it provides all necessary privileges and rights to a user.

Name of the Hacker who breaks the SIPRNET system?
  • a)
    John Draper
  • b)
    Kevin Mitnick
  • c)
    John von Neumann
  • d)
    Kevin Poulsen
Correct answer is option 'D'. Can you explain this answer?

Radha Iyer answered
The SIPRNET (or Advanced Research Project Agency Network) system was first hacked by Kevin Poulsen as he breaks into the Pentagon network.

Which one of the following is actually considered as the first computer virus?
  • a)
    Sasser
  • b)
    Blaster
  • c)
    Creeper
  • d)
    Both A and C
Correct answer is option 'C'. Can you explain this answer?

Rohit Sharma answered
The Creeper is called the first computer virus as it replicates itself (or clones itself) and spread from one system to another. It is created by Bob Thomas at BBN in early 1971 as an experimental computer program.

In ethical hacking and cyber security, there are _______ types of scanning:
  • a)
    1
  • b)
    2
  • c)
    3
  • d)
    4
Correct answer is option 'C'. Can you explain this answer?

Radha Iyer answered
There are usually three types of scanning in ethical hacking and cyber security. Therefore the correct answer is C.

Code Red is a type of ________
  • a)
    An Antivirus Program
  • b)
    A photo editing software
  • c)
    A computer virus
  • d)
    A video editing software
Correct answer is option 'C'. Can you explain this answer?

Radha Iyer answered
Cod Red is a type of Computer virus that was first discovered on 15 July in 2001 as it attacks the servers of Microsoft. In a couple of next days, it infects almost 300,000 servers.

In Wi-Fi Security, which of the following protocol is more used?
  • a)
    WPA
  • b)
    WPA2
  • c)
    WPS
  • d)
    Both A and C
Correct answer is option 'B'. Can you explain this answer?

Meera Rana answered
Nowadays, in Wi-Fi Security, the WPA2 is one of the most widely used protocols because it offers a more secure connection rather than the WPA. It is also known as the upgraded version of the WPA protocol.

 In which of the following, a person is constantly followed/chased by another person or group of several peoples?
  • a)
    Phishing
  • b)
    Bulling
  • c)
    Stalking
  • d)
    Identity theft
Correct answer is option 'C'. Can you explain this answer?

Vivek Rana answered
  • In general, Stalking refers to continuous surveillance on the target (or person) done by a group of people or by the individual person.
  • Cyber Stalking is a type of cybercrime in which a person (or victim) is being followed continuously by another person or group of several people through electronic means to harass the victim. We can also say that the primary goal of Stalking is to observe or monitor each victim's actions to get the essential information that can be further used for threatening, harassing, etc.

DNS translates a Domain name into _________
  • a)
    Hex
  • b)
    Binary
  • c)
    IP
  • d)
    URL
Correct answer is option 'D'. Can you explain this answer?

Avinash Patel answered
DNS stands for the Domain name system; the main work of a DNS is to translate the Domain name into an IP address that is understandable to the computers.

_______ is a type of software designed to help the user's computer detect viruses and avoid them.
  • a)
    Malware
  • b)
    Adware
  • c)
    Antivirus
  • d)
    Both B and C
Correct answer is option 'C'. Can you explain this answer?

Raghav Bansal answered
An antivirus is a kind of software that is specially designed to help the user's computer to detect the virus as well as to avoid the harmful effect of them. In some cases where the virus already resides in the user's computer, it can be easily removed by scanning the entire system with antivirus help.

Which of the following factor of the network gets hugely impacted when the number of users exceeds the network's limit?
  • a)
    Reliability
  • b)
    Performance
  • c)
    Security
  • d)
    Longevity
Correct answer is option 'D'. Can you explain this answer?

Naina Sharma answered
When the numbers of users on a network get increased and exceed the network's limit, therefore the performance is one of the factors of the network that is hugely impacted by it.

In order to ensure the security of the data/ information, we need to ____________ the data:
  • a)
    Encrypt
  • b)
    Decrypt
  • c)
    Delete
  • d)
    None of the above
Correct answer is option 'A'. Can you explain this answer?

Kiran Mehta answered
Data encryption is a type of method in which the plain text is converted into ciphertext, and only the authorized users can decrypt it back to plain text by using the right key. This preserves the Confidentiality of the Data.

In an any organization, company or firm the policies of information security come under__________
  • a)
    CIA Triad
  • b)
    Confidentiality
  • c)
    Authenticity
  • d)
    None of the above
Correct answer is option 'A'. Can you explain this answer?

Confidentiality, Integrity, Availability are the three main principles. In Short, these three principles are also known as the CIA triad and plays a vital role as the cornerstone of the security structure of any organization.

Which of the following can be considered as the elements of cyber security?
  • a)
    Application Security
  • b)
    Operational Security
  • c)
    Network Security
  • d)
    All of the above
Correct answer is option 'D'. Can you explain this answer?

Aditya Shah answered
Application security, operational security, network security all are the main and unforgettable elements of Cyber Security. Therefore the correct answer is D.

Which one of the following is considered as the most secure Linux operating system that also provides anonymity and the incognito option for securing the user's information?
  • a)
    Ubuntu
  • b)
    Tails
  • c)
    Fedora
  • d)
    All of the above
Correct answer is option 'B'. Can you explain this answer?

Tails is a type of Linux-based operating system that is considered to be one of the most secure operating systems in the world. It also provides many features such as anonymity and incognito options to insure that user information is always protected. The main reason why the tails operating system is famous among the user is that it is almost untraceable, which keep your privacy secure.

Chapter doubts & questions for Cyber Ethics - Computer Application: Class 10 2025 is part of Class 10 exam preparation. The chapters have been prepared according to the Class 10 exam syllabus. The Chapter doubts & questions, notes, tests & MCQs are made for Class 10 2025 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests here.

Chapter doubts & questions of Cyber Ethics - Computer Application: Class 10 in English & Hindi are available as part of Class 10 exam. Download more important topics, notes, lectures and mock test series for Class 10 Exam by signing up for free.

Top Courses Class 10

Related Class 10 Content