CYBER SAFETY QUIZ 23 AUGUST

 

MULTIPLE CHOICE QUESTIONS

UNIT 1: INTRODUCTION TO CYBER SECURITY

 

1) "IoT" stand for in the context of cybersecurity ……..

[a] Internet of Things                                 [b] Input-Output Technology [c] Information Overload Toolkit                                  [d] International Online Tracking

2.  VPN (Virtual Private Network) primarily provide ………….

[a]    Firewall protection                                  [b] Anonymity on the internet

[c] Enhanced download speed                     [d] Video streaming services

3.  The primary purpose of a firewall in cybersecurity ………

[a]    Protecting against physical break-ins              [b]Monitoring web traffic

[c] Encrypting data transmissions                        [d] Filtering and controlling network traffic

4.  The term for the practice of sending fraudulent emails to deceive individuals into revealing personal information ……….

[a]    Malware                                             [b] Hacking

[c] Social engineering                              [d] Encryption

5.  What is cyberspace? ………..

[a]     A physical location

[b]    A virtual environment created by interconnected computers

[c]     An alternate reality               [d] A fictional concept

6.  The primary purpose of a VPN (Virtual Private Network) ……..

[a]    To play online games                 [b] To secure and anonymize internet connections

[c] To access outer space                [d] To send physical mail

7.  The term for the deliberate spreading of false information online to deceive and manipulate people ……..

[a]    Cyberwarfare                            [b] Cyberbullying

[c] Disinformation                           [d] Cyber espionage

8.  The "URL" stand for in the context of web addresses ………

[a]   Uniform Resource Locator                  [b] Universal Resource Language

[c] Unidentified Real-time Link                 [d] Universal Remote Location

9.  The common cybersecurity threat in cyberspace ……..

[a]    Solar flares                      [b] Hurricanes

[c] Malware                          [d] Earthquakes

10.  The "ISP" stand for in the context of internet services ………..

[a]    Internet Security Protocol                 [b] Internet Speed Provider

[c] Internet Service Provider                   [d] Internet Search Platform

11.  The protocol is commonly used for sending emails in cyberspace ………


[a]    HTTP (Hypertext Transfer Protocol)            [b] SMTP (Simple Mail Transfer Protocol)

[c] VPN (Virtual Private Network)                     [d] FTP (File Transfer Protocol)

12.  The primary goal of cybersecurity in cyberspace ……….

[a]     To facilitate online shopping

[b]    To eliminate all online risks

[c]     To protect digital information and systems from threats

[d]    To increase social media engagement

13.  HTML stand for in web technology ………….

[a]    Hyperlink Text Markup Language         [b] Hypertext Transfer Protocol

[c] Hypertext Markup Language                 [d] High-Tech Multimedia Language

14.  The programming language is primarily used for client-side scripting in web Development ……..

[a]    Python                               [b] Java

[c] JavaScript                           [d] PHP

15.  The role of a web server in the context of web technology ………

[a]    Rendering web pages in browsers                       [b] Storing user data on the internet

[c] Hosting and serving web content to clients        [d] Protecting against viruses and malware

16.  The technology allows for real-time, bidirectional communication between a web server and a client browser ………

[a]    HTML                                                                             [b] CSS

[c] AJAX (Asynchronous JavaScript and XML)                  [d] WebSockets

17.  The primary function of a web browser ………..

[a]    To create websites                                         [b] To host websites

[c] To access and display web content               [d] To manage database systems

18.  The protocol is commonly used for secure data transmission over the internet ………

[a]    HTTP                          [b] HTTPS

[c] FTP                             [d] SMTP

19.  The main purpose of an IP address in internet communication ……..

[a]     To specify a website's designed m

[b]    To identify the physical location of a server

[c]     To uniquely identify devices on a network

[d]    To encrypt data transmissions

20.  The internet protocol is used for sending and receiving emails ………

[a]    HTTP                     [b] FTP

[c] SMTP                     [d] DNS

21.  The term for the practice of obtaining sensitive information, such as passwords or credit card numbers, by disguising as a trustworthy entity in an electronic communication ……….


[a]    Hacking                            [b] Encryption

[c] Phishing                             [d] Spamming

22.  The internet browser is developed by the Mozilla Foundation ……..

[a]    Chrome                        [b] Safari

[c] Firefox                         [d] Edge

23.  The technology is commonly used to create and format web documents ………..

[a]    TCP/IP                                                 [b] HTML (Hypertext Markup Language)

[c] VPN (Virtual Private Network)            [d] JavaScript

24.  The primary purpose of a web browser ………

[a]    To host websites                                     [b] To send emails

[c] To access and display web content       [d] To manage computer files

25.  The term for a clickable link on a web page that takes to another web page or resource

…………

[a]    Web marker                    [b] Hyperlink

[c] Web token                     [d] Internet shortcut

26.  When was the first successful message sent over ARPANET, the precursor to the modern internet ……….

[a]    1960         [b] 1969        [c] 1975       [d] 1985

27.  The technology was used to create the first web browser, called "World Wide Web

……..

[a]   Mosaic                       [b] Netscape Navigator

[c] Lynx                         [d]HTML (Hypertext Markup Language)

28.  The term for the practice of connecting different computer networks to form the internet

[a]   Internetworking                [b] Intranetworking

[c] Interconnecting                 [d] Intriguing

29.  The primary purpose of the original ARPANET, the precursor to the internet …….

[a]     To support military communication during wartime

[b]    To provide free public internet access

[c]     To enable global e-commerce

[d]    To serve as a platform for social networking

30.  The organization is responsible for managing the allocation of IP addresses and domain names on the Internet ………

[a]   ICANN                      [b] UNESCO

[c] WHO                         [d] NSA


UNIT 2: CYBER CRIME AND CYBER LAW

 

1.  What is cybercrime? …………

[a]   A form of virtual reality gaming

[b]  Illegal activities conducted over the internet

[c]   A type of computer hardware

[d]  Online etiquette guidelines

2.  Which of the following is an example of a cybercrime? ………

[a]  Playing online video games                         [b] Sending emails to friends

[c] Hacking into someone's bank account         [d] Posting photos on social media

3.  The term for a cybercrime in which criminals use deceptive emails or websites to trick individuals into revealing personal information …………..

[a] Phishing                                      [b] Spamming

[c] Hacking                                      [d] Viral marketing

4.  The cybercrime involves illegally copying and distributing copyrighted digital material, such as music or movies …………

[a]  Hacking                            [b] Phishing

[c] Cyberbullying                   [d] Digital piracy

5.  What is a "botnet" in the context of cybercrime? ……….

[a]   A type of computer virus

[b]  A network of infected computers controlled by a remote attacker

[c]   A secure online shopping website

[d]  A social media platform

6.  Which of the following is a form of cybercrime that involves harassing, threatening, or targeting individuals online? ………

[a]  Hacking                         [b] Digital piracy

[c] Cyberbullying                [d] Phishing

7.  The primary motive behind cyber extortion, a common form of cybercrime ………..

[a]  Gaining notoriety                     [b] Seeking revenge

[c] Financial gain                            [d] Political activism

8.  The term for a cybercrime that involves spreading false information about someone with the intent to harm their reputation ……..

[a]  Cyberstalking                           [b] Cyberbullying

[c] Cyberdefamation                     [d] Cyber hacking

9.  The cyber law primarily deal with ……….

[a]   Laws related to outer space

[b]  Legal issues involving computer networks and the internet

[c]   Environmental regulations


[d]  Criminal law

10.  The primary goal of cyber law ……….

[a]   To prevent all forms of online communication

[b]  To regulate social media usage

[c]   To establish legal guidelines for internet-related activities

[d]  To promote online anonymity

11.  The area of cyber law deals with intellectual property rights, copyright infringement, and digital piracy ………

[a]  Cybersecurity law                            [b] Information technology law

[c] Cybercrime law                                [d] Intellectual property law

12.  Type of cybercrime involves unauthorized access to computer systems or networks with the intent to steal, alter, or destroy data ………..

[a]  Cyberbullying                      [b] Hacking

[c] Online fraud                        [d] Phishing

13.  The primary objective of cybercrimes categorized as "financial cybercrimes" ………

[a]  Spreading malware                      [b] Gaining unauthorized access to systems

[c] Financial gain or theft                 [d] Cyberbullying

14.  The term for cybercrimes that involve spreading false or misleading information with the intent to damage a person's reputation or credibility ………

[a]  Online fraud                            [b] Cyberbullying

[c] Defamation                              [d] Hacking

15.  The Type of cybercrime involves distributing malicious software that can damage or compromise computer systems or data …….

[a]  Hacking                                     [b] Phishing

[c] Malware distribution                  [d] Identity theft

16.  The term for cybercrimes that target critical infrastructure systems, such as power grids, water supplies, or transportation networks? ………..

[a]  Cyberbullying                           [b] Cyberterrorism

[c] Online fraud                             [d] Phishing

17.  What is financial fraud? ……….

[a]   Legal financial transactions

[b]  Unintentional financial errors

[c]   Intentional deceptive practices for financial gain

[d]  Financial assistance for those in need

18.  Which type of financial fraud involves creating fake financial documents or records to deceive others for financial gain? ………..

[a]  Identity theft                       [b] Money laundering

[c] Forgery                               [d] Tax evasion


19.  Which type of financial fraud involves intentionally providing false or misleading information on tax returns to reduce tax liability? …………

[a] Tax evasion                          [b] Tax compliance

[c] Tax transparency                  [d] Tax credits

20.  What is "malware"?

[a]   A type of computer hardware

[b]  A form of online shopping

[c]   Malicious software designed to harm or infiltrate computer systems

[d]  A computer programming language

21.  Which type of malware disguises itself as legitimate software but contains malicious code that can harm your computer or steal your data? …………

[a]  Virus                              [b] Worm

[c] Trojan Horse                   [d] Spyware

22.  What is "ransomware"? ……….

[a]   Malware that records your keystrokes

[b]  A type of online shopping platform

[c]   Malware that encrypts your files and demands a ransom for their release

[d]  A type of antivirus software

23.  The remedial measures in cybersecurity primarily focused on ……….

[a]   Preventing future cyberattacks

[b]  Detecting ongoing cyberattacks

[c]   Responding to and recovering from cyberattacks

[d]  Promoting ethical hacking

Comments

Popular posts from this blog

CLASS 8 DATA TYPES IN PYTHON

CHAPTER 4 RAISING QUERIES CLASS 8 COMPUTER

HTML 1 TEST ONLINE 20 MAY 2025