Solved MCQ of Cyber Ethics


1. The Server key is always kept ___.

A) Public
B) Private
C) Both A & B
D) None

Answer) B) Private

2. What Cyber Ethics mean
A) Cyber Crime
B) Online Security
C) Rules and Regulations to Follow Online
D) Online Fraud

Answer) C) Rules and Regulations to Follow Online

3. What is the full form of (DoS)
A) Digital of Service
B) Denial of Service
C) Disconnection of Service
D) None

Answer) B) Denial of Service

4. ___ is where a hacker forces your computer to redirect to a fake website.
A) Phishing
B) Pharming
C) Redirecting
D) Redirection

Answer) B) Pharming

5. HTTPS means the website is
A) Secure
B) Insecure
C) Trusted
D) Harmful

Answer) A) Secure

6. Padlock symbol or 'HTTPS' shows while opening a website means
A) It is encrypted and secure
B) Not Encrypted
C) SSL is there
D) Both A and C

Answer) D) Both A and C

7. SSL stands for
A) Secure Security Layer
B) Secure Socket Lamination
C) Secure Socket Layer
D) Secure Data Transmission

Answer) C) Secure Socket Layer

8. TLS stands for
A) Transport Layer Socket
B) Transport Lamination Socket
C) Transfer Layer Security
D) Transport Layer Security

Answer) D) Transport Layer Security

9. This is a hardware or software security device/system that filters information passing between internal and external networks. If in some cases it detects any suspicious data packet it destroys or terminates the data packet.
A) Data encryption
B) Firewall
C) SSL
D) TLS

Answer) B) Firewall

10.  ___ is a process of using computing and communication technologies to transfer data from one place to another and vice versa.
A) Internet
B) Networking
C) Data communications
D) Data transmission

Answer) C) Data communications

11. This is an etiquette or protocol and is defined as a set of rules for acceptable online behavior.
A) Netiquette
B) Cyber security
C) Online safety
D) SSL

Answer) A) Netiquette


12. _____ refers to the ownership of intangible goods.
A) Intellectual Property Rights
B) Online Property Rights
C) Content Rights
D) Original Content Rights

Answer) A) Intellectual Property Rights

13. Using someone else's exact words without using quotation marks or an illustration is an example of
A) Plagiarism
B) Hacking
C) Privacy
D) Stealing

Answer) A) Plagiarism

14. It refers to keeping someone's personal information or something protected or hidden from others Online.
A) Security
B) Protection of personal information
C) Privacy
D) None of the above

Answer) C) Privacy

15. Software whose source code is publicly available and anyone can modify it and redistribute the copies with or without change.
A) Open Source Software
B) Source code Software
C) Executable Software
D) Both B and C

Answer) A) Open Source Software

16. What implies the gap among access and in access to Information and Communication Technology
A) Lack of ICT
B) Lack of Internet
C) Digital Divide
D) None of the above

Answer) C) Digital Divide

17. Ram uses software that can modify its source code. The type of software he uses is
A) Open Source Software
B) Source code Shareable Software
C) Executable Software
D) Both B and C

Answer) A) Open Source Software

18. Plagiarism can be avoided by
A) Paraphrasing
B) Quoting
C) Referencing
D) All of the above

Answer) D) All of the above

19. FoI stands for
A) Freedom of Internet
B) Freedom of Information
C) Freedom of ICT
D) None of the above

Answer) B) Freedom of Information

20. A _____ can spread without a host program.
A) Computer Virus
B) Computer Worm
C) Malware
D) Spyware

Answer) B) Computer Worm

21. ___ is any kind of unwanted online communication.
A) Worm
B) Adware
C) Virus
D) Spam

Answer) D) Spam

22. Trojan horse is a
A) Malware
B) Virus
C) Adware
D) Both A and B

Answer) D) Both A and B

23. It tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you have visited.
A) Virus
B) Worm
C) Spyware
D) Adware

Answer) D) Adware

24. This is software that is downloaded onto your computer to track your activities without your knowledge. This information is then sent to a remote source.
A) Spyware
B) Spam
C) Trojan
D) Adware

Answer) A) Spyware

25) In India, the Freedom of Information Act was implemented in
A) 1991
B) 2001
C) 2004
D) 2002

Answer) D) 2002

26. Rohan wanted to share the words spoken by someone else, to avoid plagiarism he should
A) Do Citing
B) Do Quote of it
C) Paraphrase it
D) Both A and B

Answer) D) Both A and B

27. GNU stands for
A) GNU Next Unix
B) GNU's Not Unix
C) GNU Now Unix
D) None of the above

Answer) B) GNU's Not Unix

28. Using strong characters in passwords, is a
A) Netiquette
B) Precaution
C) Awareness
D) None of the above

Answer) A) Netiquette

29. Shyam visited an e-commerce website in which there is no padlock symbol or HTTPS protocol.
Can Shyam buy some goods from that
e-commerce website.

A) Yes, it is safe
B) Definitely No, there is a higher risk of fraud or personal data loss and should leave that website immediately
C) Not sure
D) None of the above

Answer) B) Definitely No, there is a higher risk of fraud or personal data loss and should leave that website immediately

30. A _______________ is the right given by the government to an inventor to protect his/her
an invention from being used/copied for a fixed period of time.

A) Copyright
B) Intellectual Property
C) Patent
D) Trademark

Answer) C) Patent

31. Secure data transmission means
a) data can be accessed by any unauthorized person during transmission
b) data cannot be accessed by any unauthorized person during transmission
c) transmission of data
d) None of the above

Answer)  (b) 

32. Which of the following techniques can be used for the security of data?
a) Authentication
b) Authorization
c) Encryption
d) All of the these

Answer) (d)

33. An encryption algorithm is used to transform a readable message into
a) text message
b) simple message
c) converted message
d) encrypted message

Answer) (d)

34. In Caesar cipher, for which of the following values of key, the encrypted message will be the same as original message
a) 0
b) 26
c) Both (a) and (b)
d) None of these

Answer) (b)



No comments:

Post a Comment