Wednesday, September 24, 2025

50 MCQs - Concept of Cybersecurity - Grade IX Computer Science 2082

 



50 MCQs with Answers & Explanations


6.1 Concept of Cybersecurity

Q1. Cybersecurity mainly focuses on protecting:
i. Hardware only
ii. Computer systems, networks, and digital data

iii. Only personal devices
iv. Applications only

Answer: ii.
Explanation: Cybersecurity protects all systems, networks, and data from theft, damage, or attacks.


Q2. The three key objectives of cybersecurity (CIA) are:
i. Confidentiality, Integrity, Availability

ii. Control, Integration, Access
iii. Confidentiality, Internet, Applications
iv. Connection, Integrity, Access

Answer: i.
Explanation: CIA triad is the foundation of cybersecurity.


Q3. Which of the following ensures information is not changed or altered?
i. Confidentiality
ii. Integrity

iii. Availability
iv. Authentication

Answer: ii.
Explanation: Integrity means accuracy and trustworthiness of data.


Q4. Authentication in cybersecurity means:
i. Encrypting data
ii. Verifying user identity

iii. Blocking websites
iv. Securing Wi-Fi

Answer: ii.
Explanation: Authentication confirms that the user is genuine, usually via username/password.


Q5. Which type of cybersecurity protects Wi-Fi, routers, and servers?
i. Network Security

ii. Application Security
iii. Information Security
iv. Operational Security

Answer: i.
Explanation: Network security prevents intruders from accessing or attacking networks.


Q6. Malware includes all except:
i. Viruses
ii. Worms
iii. Ransomware
iv. Firewall

Answer: iv.
Explanation: A firewall is a security tool, not malware.


Q7. A cyberattack where criminals flood servers with traffic is called:
i. Phishing
ii. DoS/DDoS

iii. Malware
iv. Social Engineering

Answer: ii.
Explanation: Denial of Service overloads servers to make them unavailable.


Q8. Which cyberattack manipulates humans into revealing secrets?
i. Man-in-the-middle
ii. Social Engineering

iii. Worms
iv. Hacking

Answer: ii.
Explanation: Social engineering tricks people instead of breaking technology.


Q9. Which of the following is a protection method in cybersecurity?
i. Using weak passwords
ii. Strong authentication

iii. Ignoring software updates
iv. Disabling antivirus

Answer: ii.
Explanation: Strong authentication prevents unauthorized access.


Q10. Why is cybersecurity important for businesses?
i. To make systems faster
ii. To build trust with customers

iii. To reduce power consumption
iv. To block social media use

Answer: ii.
Explanation: Cybersecurity builds trust by protecting customer data.


6.2 Concept of Cybercrime

Q11. Cybercrime means:
i. Legal use of internet
ii. Illegal activities using computers or networks

iii. Only virus attacks
iv. Mobile phone usage

Answer: ii.
Explanation: Cybercrime is crime committed through digital means.


Q12. Which law in Nepal handles cybercrime issues?
i. RTI Act
ii. Electronic Transaction Act (ETA), 2063

iii. IT Constitution Act
iv. Cyber Protection Law 2010

Answer: ii.
Explanation: ETA 2063 is Nepal’s cyber law.


Q13. Which of these is NOT a type of cybercrime?
i. Hacking
ii. Phishing
iii. Identity theft
iv. Authentication

Answer: iv.
Explanation: Authentication is a security measure, not a crime.


Q14. Stealing someone’s Aadhaar or bank details is called:
i. Malware attack
ii. Identity theft

iii. Phishing
iv. Cyberbullying

Answer: ii.
Explanation: Identity theft is stealing personal information.


Q15. Example of cyberbullying is:
i. Harassing people using fake social media accounts

ii. Installing firewalls
iii. Encrypting data
iv. Using VPN

Answer: i.
Explanation: Cyberbullying uses digital platforms for harassment.


Q16. Which is an example of phishing?
i. Fake emails asking for bank login

ii. A firewall alert
iii. Strong password use
iv. Social media posting

Answer: i.
Explanation: Phishing tricks people into sharing information.


Q17. Ransomware is a type of:
i. Phishing
ii. Malware

iii. Firewall
iv. Authentication

Answer: ii.
Explanation: Ransomware locks files and demands money.


Q18. In Nepal, who handles cybercrime complaints?
i. Local police stations
ii. Cyber Bureau of Nepal

iii. Ministry of Education
iv. Nepal Telecom

Answer: ii.
Explanation: Cyber Bureau of Nepal investigates cybercrimes.


Q19. Which of the following is a virus attack example?
i. Sending abusive comments
ii. Malware infecting hospital systems demanding ransom

iii. Using VPN
iv. Installing updates

Answer: ii.
Explanation: This is ransomware (a type of malware).


Q20. Which is NOT an example of cybercrime?
i. Online fraud
ii. Hacking
iii. Encryption

iv. Cyberstalking

Answer: iii.
Explanation: Encryption is a protective method.


6.3 Prevention Methods from Cybercrime

Q21. Which is the strongest password?
i. 123456
ii. Password
iii. Ab@2025!

iv. abcd

Answer: iii.
Explanation: Strong passwords use numbers, symbols, and mixed letters.


Q22. Which of these should NOT be used in passwords?
i. Dictionary words

ii. Numbers and symbols
iii. Upper and lowercase letters
iv. Special characters

Answer: i.
Explanation: Simple words like “admin” or “password” are weak.


Q23. MFA stands for:
i. Multi-Factor Authentication

ii. Multiple File Access
iii. Main Frame Account
iv. Multi Function Action

Answer: i.
Explanation: MFA uses two or more verification steps.


Q24. Which is an example of "Something you have" in MFA?
i. Password
ii. PIN
iii. OTP

iv. Face scan

Answer: iii.
Explanation: OTP is a code sent to your device.


Q25. Which is an example of "Something you are" in MFA?
i. Fingerprint

ii. OTP
iii. Password
iv. PIN

Answer: i.
Explanation: Biometrics like fingerprints and facial recognition fall here.


Q26. Software updates are important because they:
i. Slow down devices
ii. Fix security problems

iii. Delete data
iv. Increase storage

Answer: ii.
Explanation: Updates patch vulnerabilities.


Q27. Authentication is mainly done using:
i. Username and password

ii. VPN and proxy
iii. Cookies
iv. Browsers

Answer: i.
Explanation: Basic authentication relies on username/password.


Q28. A firewall is used to:
i. Send emails
ii. Filter network traffic and block unauthorized access

iii. Store passwords
iv. Increase internet speed

Answer: ii.
Explanation: Firewalls act as protective barriers.


Q29. Which is NOT a prevention method?
i. Strong passwords
ii. Firewalls
iii. Updating software
iv. Sharing personal data publicly

Answer: iv.
Explanation: Oversharing data increases cyber risks.


Q30. Which prevents viruses and malware from spreading?
i. Firewall
ii. Antivirus

iii. VPN
iv. Encryption

Answer: ii.
Explanation: Antivirus detects and removes malicious software.


6.4 Safe Web Browsing Techniques

Q31. Safe browsing means:
i. Using internet freely without care
ii. Using internet responsibly and securely

iii. Using only Wi-Fi
iv. Avoiding social media

Answer: ii.
Explanation: Safe browsing protects privacy and devices.


Q32. Which indicates a secure website?
i. http://
ii. https://

iii. www.
iv. ftp://

Answer: ii.
Explanation: HTTPS ensures encryption and security.


Q33. VPN stands for:
i. Virtual Private Network

ii. Virtual Personal Node
iii. Virtual Protected Net
iv. Verified Private Number

Answer: i.
Explanation: VPN secures internet connections.


Q34. A secure browser includes all except:
i. Private browsing
ii. Ad-blocking
iii. Tracking protection
iv. Weak passwords

Answer: iv.
Explanation: Weak passwords reduce security.


Q35. DuckDuckGo is an example of:
i. Secure search engine

ii. Antivirus
iii. Firewall
iv. Malware

Answer: i.
Explanation: DuckDuckGo prioritizes privacy.


Q36. Which protects against harmful sites in search results?
i. Secure search engine

ii. Malware
iii. Router
iv. Cookies

Answer: i.
Explanation: Secure search engines filter unsafe sites.


Q37. Which is an example of secure browsers?
i. Mozilla Firefox

ii. Malwarebytes
iii. Windows Defender
iv. MySQL

Answer: i.
Explanation: Firefox has privacy protection features.


Q38. Why use secure websites?
i. To improve speed
ii. To protect sensitive info and prevent identity theft

iii. To increase ads
iv. To save battery

Answer: ii.
Explanation: HTTPS websites protect user data.


Q39. Which feature shows if a site is secure?
i. Lock icon
🔒
ii. Big banner
iii. Cookies
iv. Username

Answer: i.
Explanation: Lock icon in browser = secure encryption.


Q40. Which of the following is NOT a safe browsing method?
i. Using HTTPS websites
ii. Logging out of accounts
iii. Clicking on random links

iv. Using updated browsers

Answer: iii.
Explanation: Random links may be malicious.


6.5 Digital Citizen

Q41. A digital citizen is:
i. A person using social media only
ii. Someone who uses the internet responsibly

iii. Only hackers
iv. A government officer

Answer: ii.
Explanation: Digital citizens act ethically online.


Q42. Which is NOT a guideline of good digital citizenship?
i. Think before posting
ii. Protect personal info
iii. Share passwords

iv. Report bad behavior

Answer: iii.
Explanation: Sharing passwords is unsafe.


Q43. Example of good digital citizenship is:
i. Plagiarizing online content
ii. Giving credit to original creators

iii. Spreading fake news
iv. Cyberbullying

Answer: ii.
Explanation: Respecting creators shows responsibility.


Q44. Which is an example of bad online behavior?
i. Reporting abuse
ii. Using polite language
iii. Spreading fake news

iv. Protecting privacy

Answer: iii.
Explanation: Fake news harms digital society.


Q45. Good digital citizens should:
i. Overshare personal data
ii. Change passwords regularly

iii. Ignore online rules
iv. Support cyberbullying

Answer: ii.
Explanation: Changing passwords protects accounts.


6.6 Netiquette & Online Behaviors

Q46. Netiquette means:
i. Internet ethics

ii. Online fraud
iii. Password manager
iv. Malware

Answer: i.
Explanation: Netiquette = rules of online manners.


Q47. Which of these is bad netiquette?
i. Respect privacy
ii. Spamming

iii. Think before posting
iv. Give credit

Answer: ii.
Explanation: Spamming annoys and harms online spaces.


Q48. Which guideline of netiquette avoids misunderstanding?
i. Use emojis carefully

ii. Overshare data
iii. Post fake memes
iv. Troll others

Answer: i.
Explanation: Emojis must be used wisely in communication.


Q49. Why is netiquette important?
i. To increase ads
ii. To maintain respect and safety online

iii. To download faster
iv. To bypass rules

Answer: ii.
Explanation: Netiquette = safe, respectful online community.


Q50. Which is an example of good online behavior?
i. Cyberbullying
ii. Reporting abuse

iii. Using hate speech
iv. Pirating content

Answer: ii.
Explanation: Reporting harmful acts supports digital society.

 


No comments:

Post a Comment