Test: Cyber Ethics - 2


20 Questions MCQ Test Computer Application: Class 10 | Test: Cyber Ethics - 2


Description
This mock test of Test: Cyber Ethics - 2 for Class 10 helps you for every Class 10 entrance exam. This contains 20 Multiple Choice Questions for Class 10 Test: Cyber Ethics - 2 (mcq) to study with solutions a complete question bank. The solved questions answers in this Test: Cyber Ethics - 2 quiz give you a good mix of easy questions and tough questions. Class 10 students definitely take this Test: Cyber Ethics - 2 exercise for a better result in the exam. You can find other Test: Cyber Ethics - 2 extra questions, long questions & short questions for Class 10 on EduRev as well by searching above.
QUESTION: 1

_______ is a type of software designed to help the user's computer detect viruses and avoid them.

Solution:

An antivirus is a kind of software that is specially designed to help the user's computer to detect the virus as well as to avoid the harmful effect of them. In some cases where the virus already resides in the user's computer, it can be easily removed by scanning the entire system with antivirus help.

QUESTION: 2

Which one of the following is a type of antivirus program?

Solution:

Antivirus is a kind of software program that helps to detect and remove viruses form the user's computer and provides a safe environment for users to work on. There are several kinds of antivirus software are available in the market, such as Kaspersky, Mcafee, Quick Heal, Norton etc., so the correct answer is D.

QUESTION: 3

It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______:

Solution:

There are two types of firewalls - software programs and hardware-based firewalls. These types of firewalls filter each and every data packet coming from the outside environment such as network; internet so that any kind of virus would not be able to enter in the user's system. In some cases where the firewall detects any suspicious data packet, it immediately burns or terminates that data packet. In short, we can also say that it is the first line of defense of the system to avoid several kinds of viruses.

QUESTION: 4

Which of the following refers to stealing one's idea or invention of others and use it for their own benefits?

Solution:

The stealing ideas or the invention of others and using them for their own profits can also be defined in several different ways, such as piracy, intellectual property rights, and plagiarism.

QUESTION: 5

Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?

Solution:

Cyber Ethics refers to exploring the appropriate, ethical behaviors related to online environments and digital media.

QUESTION: 6

Which of the following refers to the violation of the principle if a computer is no more accessible?

Solution:

Availability refers to the violation of principle, if the system is no more accessible.

QUESTION: 7

Which one of the following refers to the technique used for verifying the integrity of the message?

Solution:

Message Digest is a type of cryptographic hash function that contains a string of digits that are created by the one-way hashing formula. It is also known as a type of technique used for verifying the integrity of the message, data or media, and to detect if any manipulations are made. Therefore the correct answer is D.

QUESTION: 8

Which one of the following usually used in the process of Wi-Fi-hacking?

Solution:

The Aircrack-ng is a kind of software program available in the Linux-based operating systems such as Parrot, kali etc. it is usually used by users while hacking the Wi-Fi-networks or finding vulnerabilities in the network to capture or monitor the data packets traveling in the network.

QUESTION: 9

Which of the following port and IP address scanner famous among the users?

Solution:

Angry IP Scanner is a type of hacking tool that is usually used by both white hat and black hat types of hackers. It is very famous among the users because it helps to find the weaknesses in the network devices.

QUESTION: 10

In ethical hacking and cyber security, there are _______ types of scanning:

Solution:

There are usually three types of scanning in ethical hacking and cyber security. Therefore the correct answer is C.

QUESTION: 11

Which of the following is not a type of scanning?

Solution:

Among the following-given options, the Cloud Scan is one, and only that is not a type of scanning.

QUESTION: 12

In system hacking, which of the following is the most crucial activity?

Solution:

While trying to hack a system, the most important thing is cracking the passwords.

QUESTION: 13

Which one of the following is actually considered as the first computer virus?

Solution:

The Creeper is called the first computer virus as it replicates itself (or clones itself) and spread from one system to another. It is created by Bob Thomas at BBN in early 1971 as an experimental computer program.

QUESTION: 14

To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.

Solution:

It is essential to always keep the firewall on in our computer system. It saves the computer system against hackers, viruses, and installing software form unknown sources. We can also consider it the first line of defense of the computer system.

QUESTION: 15

Code Red is a type of ________

Solution:

Cod Red is a type of Computer virus that was first discovered on 15 July in 2001 as it attacks the servers of Microsoft. In a couple of next days, it infects almost 300,000 servers.

QUESTION: 16

Which of the following can be considered as the elements of cyber security?

Solution:

Application security, operational security, network security all are the main and unforgettable elements of Cyber Security. Therefore the correct answer is D.

QUESTION: 17

Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user's system?

Solution:

DDoS (or denial of service), malware, drive-by downloads, phishing and password attacks are all some common and famous types of cyber-attacks used by hackers.

QUESTION: 18

Which one of the following is also referred to as malicious software?

Solution:

Malware is a kind of short program used by the hacker to gain access to sensitive data/ information. It is used to denote many kinds of viruses, worms, Trojans, and several other harmful programs. Sometimes malware is also known as malicious software.

QUESTION: 19

In Wi-Fi Security, which of the following protocol is more used?

Solution:

Nowadays, in Wi-Fi Security, the WPA2 is one of the most widely used protocols because it offers a more secure connection rather than the WPA. It is also known as the upgraded version of the WPA protocol.

QUESTION: 20

Which of the following factor of the network gets hugely impacted when the number of users exceeds the network's limit?

Solution:

When the numbers of users on a network get increased and exceed the network's limit, therefore the performance is one of the factors of the network that is hugely impacted by it.

Similar Content