✅ 50 MCQs with Answers & Explanations
6.1
Concept of Cybersecurity
Q1. Cybersecurity mainly focuses on
protecting:
i. Hardware only
ii. Computer systems, networks, and digital data ✅
iii. Only personal devices
iv. Applications only
Answer: ii.
Explanation: Cybersecurity protects all systems, networks, and data from
theft, damage, or attacks.
Q2. The three key objectives of
cybersecurity (CIA) are:
i. Confidentiality, Integrity, Availability ✅
ii. Control, Integration, Access
iii. Confidentiality, Internet, Applications
iv. Connection, Integrity, Access
Answer: i.
Explanation: CIA triad is the foundation of cybersecurity.
Q3. Which of the following ensures
information is not changed or altered?
i. Confidentiality
ii. Integrity ✅
iii. Availability
iv. Authentication
Answer: ii.
Explanation: Integrity means accuracy and trustworthiness of data.
Q4. Authentication in cybersecurity
means:
i. Encrypting data
ii. Verifying user identity ✅
iii. Blocking websites
iv. Securing Wi-Fi
Answer: ii.
Explanation: Authentication confirms that the user is genuine, usually
via username/password.
Q5. Which type of cybersecurity
protects Wi-Fi, routers, and servers?
i. Network Security ✅
ii. Application Security
iii. Information Security
iv. Operational Security
Answer: i.
Explanation: Network security prevents intruders from accessing or
attacking networks.
Q6. Malware includes all except:
i. Viruses
ii. Worms
iii. Ransomware
iv. Firewall ✅
Answer: iv.
Explanation: A firewall is a security tool, not malware.
Q7. A cyberattack where criminals
flood servers with traffic is called:
i. Phishing
ii. DoS/DDoS ✅
iii. Malware
iv. Social Engineering
Answer: ii.
Explanation: Denial of Service overloads servers to make them
unavailable.
Q8. Which cyberattack manipulates
humans into revealing secrets?
i. Man-in-the-middle
ii. Social Engineering ✅
iii. Worms
iv. Hacking
Answer: ii.
Explanation: Social engineering tricks people instead of breaking
technology.
Q9. Which of the following is a
protection method in cybersecurity?
i. Using weak passwords
ii. Strong authentication ✅
iii. Ignoring software updates
iv. Disabling antivirus
Answer: ii.
Explanation: Strong authentication prevents unauthorized access.
Q10. Why is cybersecurity important for
businesses?
i. To make systems faster
ii. To build trust with customers ✅
iii. To reduce power consumption
iv. To block social media use
Answer: ii.
Explanation: Cybersecurity builds trust by protecting customer data.
6.2
Concept of Cybercrime
Q11. Cybercrime means:
i. Legal use of internet
ii. Illegal activities using computers or networks ✅
iii. Only virus attacks
iv. Mobile phone usage
Answer: ii.
Explanation: Cybercrime is crime committed through digital means.
Q12. Which law in Nepal handles
cybercrime issues?
i. RTI Act
ii. Electronic Transaction Act (ETA), 2063 ✅
iii. IT Constitution Act
iv. Cyber Protection Law 2010
Answer: ii.
Explanation: ETA 2063 is Nepal’s cyber law.
Q13. Which of these is NOT a type of
cybercrime?
i. Hacking
ii. Phishing
iii. Identity theft
iv. Authentication ✅
Answer: iv.
Explanation: Authentication is a security measure, not a crime.
Q14. Stealing someone’s Aadhaar or bank
details is called:
i. Malware attack
ii. Identity theft ✅
iii. Phishing
iv. Cyberbullying
Answer: ii.
Explanation: Identity theft is stealing personal information.
Q15. Example of cyberbullying is:
i. Harassing people using fake social media accounts ✅
ii. Installing firewalls
iii. Encrypting data
iv. Using VPN
Answer: i.
Explanation: Cyberbullying uses digital platforms for harassment.
Q16. Which is an example of phishing?
i. Fake emails asking for bank login ✅
ii. A firewall alert
iii. Strong password use
iv. Social media posting
Answer: i.
Explanation: Phishing tricks people into sharing information.
Q17. Ransomware is a type of:
i. Phishing
ii. Malware ✅
iii. Firewall
iv. Authentication
Answer: ii.
Explanation: Ransomware locks files and demands money.
Q18. In Nepal, who handles cybercrime
complaints?
i. Local police stations
ii. Cyber Bureau of Nepal ✅
iii. Ministry of Education
iv. Nepal Telecom
Answer: ii.
Explanation: Cyber Bureau of Nepal investigates cybercrimes.
Q19. Which of the following is a virus
attack example?
i. Sending abusive comments
ii. Malware infecting hospital systems demanding ransom ✅
iii. Using VPN
iv. Installing updates
Answer: ii.
Explanation: This is ransomware (a type of malware).
Q20. Which is NOT an example of
cybercrime?
i. Online fraud
ii. Hacking
iii. Encryption ✅
iv. Cyberstalking
Answer: iii.
Explanation: Encryption is a protective method.
6.3
Prevention Methods from Cybercrime
Q21. Which is the strongest password?
i. 123456
ii. Password
iii. Ab@2025! ✅
iv. abcd
Answer: iii.
Explanation: Strong passwords use numbers, symbols, and mixed letters.
Q22. Which of these should NOT be used
in passwords?
i. Dictionary words ✅
ii. Numbers and symbols
iii. Upper and lowercase letters
iv. Special characters
Answer: i.
Explanation: Simple words like “admin” or “password” are weak.
Q23. MFA stands for:
i. Multi-Factor Authentication ✅
ii. Multiple File Access
iii. Main Frame Account
iv. Multi Function Action
Answer: i.
Explanation: MFA uses two or more verification steps.
Q24. Which is an example of
"Something you have" in MFA?
i. Password
ii. PIN
iii. OTP ✅
iv. Face scan
Answer: iii.
Explanation: OTP is a code sent to your device.
Q25. Which is an example of
"Something you are" in MFA?
i. Fingerprint ✅
ii. OTP
iii. Password
iv. PIN
Answer: i.
Explanation: Biometrics like fingerprints and facial recognition fall
here.
Q26. Software updates are important
because they:
i. Slow down devices
ii. Fix security problems ✅
iii. Delete data
iv. Increase storage
Answer: ii.
Explanation: Updates patch vulnerabilities.
Q27. Authentication is mainly done
using:
i. Username and password ✅
ii. VPN and proxy
iii. Cookies
iv. Browsers
Answer: i.
Explanation: Basic authentication relies on username/password.
Q28. A firewall is used to:
i. Send emails
ii. Filter network traffic and block unauthorized access ✅
iii. Store passwords
iv. Increase internet speed
Answer: ii.
Explanation: Firewalls act as protective barriers.
Q29. Which is NOT a prevention method?
i. Strong passwords
ii. Firewalls
iii. Updating software
iv. Sharing personal data publicly ✅
Answer: iv.
Explanation: Oversharing data increases cyber risks.
Q30. Which prevents viruses and malware
from spreading?
i. Firewall
ii. Antivirus ✅
iii. VPN
iv. Encryption
Answer: ii.
Explanation: Antivirus detects and removes malicious software.
6.4
Safe Web Browsing Techniques
Q31. Safe browsing means:
i. Using internet freely without care
ii. Using internet responsibly and securely ✅
iii. Using only Wi-Fi
iv. Avoiding social media
Answer: ii.
Explanation: Safe browsing protects privacy and devices.
Q32. Which indicates a secure website?
i. http://
ii. https:// ✅
iii. www.
iv. ftp://
Answer: ii.
Explanation: HTTPS ensures encryption and security.
Q33. VPN stands for:
i. Virtual Private Network ✅
ii. Virtual Personal Node
iii. Virtual Protected Net
iv. Verified Private Number
Answer: i.
Explanation: VPN secures internet connections.
Q34. A secure browser includes all
except:
i. Private browsing
ii. Ad-blocking
iii. Tracking protection
iv. Weak passwords ✅
Answer: iv.
Explanation: Weak passwords reduce security.
Q35. DuckDuckGo is an example of:
i. Secure search engine ✅
ii. Antivirus
iii. Firewall
iv. Malware
Answer: i.
Explanation: DuckDuckGo prioritizes privacy.
Q36. Which protects against harmful
sites in search results?
i. Secure search engine ✅
ii. Malware
iii. Router
iv. Cookies
Answer: i.
Explanation: Secure search engines filter unsafe sites.
Q37. Which is an example of secure
browsers?
i. Mozilla Firefox ✅
ii. Malwarebytes
iii. Windows Defender
iv. MySQL
Answer: i.
Explanation: Firefox has privacy protection features.
Q38. Why use secure websites?
i. To improve speed
ii. To protect sensitive info and prevent identity theft ✅
iii. To increase ads
iv. To save battery
Answer: ii.
Explanation: HTTPS websites protect user data.
Q39. Which feature shows if a site is
secure?
i. Lock icon 🔒 ✅
ii. Big banner
iii. Cookies
iv. Username
Answer: i.
Explanation: Lock icon in browser = secure encryption.
Q40. Which of the following is NOT a
safe browsing method?
i. Using HTTPS websites
ii. Logging out of accounts
iii. Clicking on random links ✅
iv. Using updated browsers
Answer: iii.
Explanation: Random links may be malicious.
6.5
Digital Citizen
Q41. A digital citizen is:
i. A person using social media only
ii. Someone who uses the internet responsibly ✅
iii. Only hackers
iv. A government officer
Answer: ii.
Explanation: Digital citizens act ethically online.
Q42. Which is NOT a guideline of good
digital citizenship?
i. Think before posting
ii. Protect personal info
iii. Share passwords ✅
iv. Report bad behavior
Answer: iii.
Explanation: Sharing passwords is unsafe.
Q43. Example of good digital
citizenship is:
i. Plagiarizing online content
ii. Giving credit to original creators ✅
iii. Spreading fake news
iv. Cyberbullying
Answer: ii.
Explanation: Respecting creators shows responsibility.
Q44. Which is an example of bad online
behavior?
i. Reporting abuse
ii. Using polite language
iii. Spreading fake news ✅
iv. Protecting privacy
Answer: iii.
Explanation: Fake news harms digital society.
Q45. Good digital citizens should:
i. Overshare personal data
ii. Change passwords regularly ✅
iii. Ignore online rules
iv. Support cyberbullying
Answer: ii.
Explanation: Changing passwords protects accounts.
6.6
Netiquette & Online Behaviors
Q46. Netiquette means:
i. Internet ethics ✅
ii. Online fraud
iii. Password manager
iv. Malware
Answer: i.
Explanation: Netiquette = rules of online manners.
Q47. Which of these is bad netiquette?
i. Respect privacy
ii. Spamming ✅
iii. Think before posting
iv. Give credit
Answer: ii.
Explanation: Spamming annoys and harms online spaces.
Q48. Which guideline of netiquette
avoids misunderstanding?
i. Use emojis carefully ✅
ii. Overshare data
iii. Post fake memes
iv. Troll others
Answer: i.
Explanation: Emojis must be used wisely in communication.
Q49. Why is netiquette important?
i. To increase ads
ii. To maintain respect and safety online ✅
iii. To download faster
iv. To bypass rules
Answer: ii.
Explanation: Netiquette = safe, respectful online community.
Q50. Which is an example of good online
behavior?
i. Cyberbullying
ii. Reporting abuse ✅
iii. Using hate speech
iv. Pirating content
Answer: ii.
Explanation: Reporting harmful acts supports digital society.
No comments:
Post a Comment