Class 10 Exam  >  Class 10 Tests  >  Test: Cyber Ethics - 2 - Class 10 MCQ

Test: Cyber Ethics - 2 - Class 10 MCQ


Test Description

20 Questions MCQ Test - Test: Cyber Ethics - 2

Test: Cyber Ethics - 2 for Class 10 2024 is part of Class 10 preparation. The Test: Cyber Ethics - 2 questions and answers have been prepared according to the Class 10 exam syllabus.The Test: Cyber Ethics - 2 MCQs are made for Class 10 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Test: Cyber Ethics - 2 below.
Solutions of Test: Cyber Ethics - 2 questions in English are available as part of our course for Class 10 & Test: Cyber Ethics - 2 solutions in Hindi for Class 10 course. Download more important topics, notes, lectures and mock test series for Class 10 Exam by signing up for free. Attempt Test: Cyber Ethics - 2 | 20 questions in 20 minutes | Mock test for Class 10 preparation | Free important questions MCQ to study for Class 10 Exam | Download free PDF with solutions
Test: Cyber Ethics - 2 - Question 1

_______ is a type of software designed to help the user's computer detect viruses and avoid them.

Detailed Solution for Test: Cyber Ethics - 2 - Question 1

An antivirus is a kind of software that is specially designed to help the user's computer to detect the virus as well as to avoid the harmful effect of them. In some cases where the virus already resides in the user's computer, it can be easily removed by scanning the entire system with antivirus help.

Test: Cyber Ethics - 2 - Question 2

Which one of the following is a type of antivirus program?

Detailed Solution for Test: Cyber Ethics - 2 - Question 2

Antivirus is a kind of software program that helps to detect and remove viruses form the user's computer and provides a safe environment for users to work on. There are several kinds of antivirus software are available in the market, such as Kaspersky, Mcafee, Quick Heal, Norton etc., so the correct answer is D.

1 Crore+ students have signed up on EduRev. Have you? Download the App
Test: Cyber Ethics - 2 - Question 3

It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______:

Detailed Solution for Test: Cyber Ethics - 2 - Question 3

There are two types of firewalls - software programs and hardware-based firewalls. These types of firewalls filter each and every data packet coming from the outside environment such as network; internet so that any kind of virus would not be able to enter in the user's system. In some cases where the firewall detects any suspicious data packet, it immediately burns or terminates that data packet. In short, we can also say that it is the first line of defense of the system to avoid several kinds of viruses.

Test: Cyber Ethics - 2 - Question 4

Which of the following refers to stealing one's idea or invention of others and use it for their own benefits?

Detailed Solution for Test: Cyber Ethics - 2 - Question 4

The stealing ideas or the invention of others and using them for their own profits can also be defined in several different ways, such as piracy, intellectual property rights, and plagiarism.

Test: Cyber Ethics - 2 - Question 5

Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?

Detailed Solution for Test: Cyber Ethics - 2 - Question 5

Cyber Ethics refers to exploring the appropriate, ethical behaviors related to online environments and digital media.

Test: Cyber Ethics - 2 - Question 6

Which of the following refers to the violation of the principle if a computer is no more accessible?

Detailed Solution for Test: Cyber Ethics - 2 - Question 6

Availability refers to the violation of principle, if the system is no more accessible.

Test: Cyber Ethics - 2 - Question 7

Which one of the following refers to the technique used for verifying the integrity of the message?

Detailed Solution for Test: Cyber Ethics - 2 - Question 7

Message Digest is a type of cryptographic hash function that contains a string of digits that are created by the one-way hashing formula. It is also known as a type of technique used for verifying the integrity of the message, data or media, and to detect if any manipulations are made. Therefore the correct answer is D.

Test: Cyber Ethics - 2 - Question 8

Which one of the following usually used in the process of Wi-Fi-hacking?

Detailed Solution for Test: Cyber Ethics - 2 - Question 8

The Aircrack-ng is a kind of software program available in the Linux-based operating systems such as Parrot, kali etc. it is usually used by users while hacking the Wi-Fi-networks or finding vulnerabilities in the network to capture or monitor the data packets traveling in the network.

Test: Cyber Ethics - 2 - Question 9

Which of the following port and IP address scanner famous among the users?

Detailed Solution for Test: Cyber Ethics - 2 - Question 9

Angry IP Scanner is a type of hacking tool that is usually used by both white hat and black hat types of hackers. It is very famous among the users because it helps to find the weaknesses in the network devices.

Test: Cyber Ethics - 2 - Question 10

In ethical hacking and cyber security, there are _______ types of scanning:

Detailed Solution for Test: Cyber Ethics - 2 - Question 10

There are usually three types of scanning in ethical hacking and cyber security. Therefore the correct answer is C.

Test: Cyber Ethics - 2 - Question 11

Which of the following is not a type of scanning?

Detailed Solution for Test: Cyber Ethics - 2 - Question 11

Among the following-given options, the Cloud Scan is one, and only that is not a type of scanning.

Test: Cyber Ethics - 2 - Question 12

In system hacking, which of the following is the most crucial activity?

Detailed Solution for Test: Cyber Ethics - 2 - Question 12

While trying to hack a system, the most important thing is cracking the passwords.

Test: Cyber Ethics - 2 - Question 13

Which one of the following is actually considered as the first computer virus?

Detailed Solution for Test: Cyber Ethics - 2 - Question 13

The Creeper is called the first computer virus as it replicates itself (or clones itself) and spread from one system to another. It is created by Bob Thomas at BBN in early 1971 as an experimental computer program.

Test: Cyber Ethics - 2 - Question 14

To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.

Detailed Solution for Test: Cyber Ethics - 2 - Question 14

It is essential to always keep the firewall on in our computer system. It saves the computer system against hackers, viruses, and installing software form unknown sources. We can also consider it the first line of defense of the computer system.

Test: Cyber Ethics - 2 - Question 15

Code Red is a type of ________

Detailed Solution for Test: Cyber Ethics - 2 - Question 15

Cod Red is a type of Computer virus that was first discovered on 15 July in 2001 as it attacks the servers of Microsoft. In a couple of next days, it infects almost 300,000 servers.

Test: Cyber Ethics - 2 - Question 16

Which of the following can be considered as the elements of cyber security?

Detailed Solution for Test: Cyber Ethics - 2 - Question 16

Application security, operational security, network security all are the main and unforgettable elements of Cyber Security. Therefore the correct answer is D.

Test: Cyber Ethics - 2 - Question 17

Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user's system?

Detailed Solution for Test: Cyber Ethics - 2 - Question 17

DDoS (or denial of service), malware, drive-by downloads, phishing and password attacks are all some common and famous types of cyber-attacks used by hackers.

Test: Cyber Ethics - 2 - Question 18

Which one of the following is also referred to as malicious software?

Detailed Solution for Test: Cyber Ethics - 2 - Question 18

Malware is a kind of short program used by the hacker to gain access to sensitive data/ information. It is used to denote many kinds of viruses, worms, Trojans, and several other harmful programs. Sometimes malware is also known as malicious software.

Test: Cyber Ethics - 2 - Question 19

In Wi-Fi Security, which of the following protocol is more used?

Detailed Solution for Test: Cyber Ethics - 2 - Question 19

Nowadays, in Wi-Fi Security, the WPA2 is one of the most widely used protocols because it offers a more secure connection rather than the WPA. It is also known as the upgraded version of the WPA protocol.

Test: Cyber Ethics - 2 - Question 20

Which of the following factor of the network gets hugely impacted when the number of users exceeds the network's limit?

Detailed Solution for Test: Cyber Ethics - 2 - Question 20

When the numbers of users on a network get increased and exceed the network's limit, therefore the performance is one of the factors of the network that is hugely impacted by it.

Information about Test: Cyber Ethics - 2 Page
In this test you can find the Exam questions for Test: Cyber Ethics - 2 solved & explained in the simplest way possible. Besides giving Questions and answers for Test: Cyber Ethics - 2, EduRev gives you an ample number of Online tests for practice

Top Courses for Class 10

Download as PDF

Top Courses for Class 10