MCQ Mojo
access_time
menu
Quiz
Web Stories
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
Quiz
Quiz
/
Cyber security Class 9 MCQ Questions With Answers
1.
What is Spam?
Canned meat.
Unsolicited emails sent to many email addresses that try to get you buy something or share private information.
A computer virus that will hack your account.
None of these
2.
Who should know your passwords?
Only you!
Your best friends
Anyone
3.
A malware program that, when executed, replicates by inserting copies of itself into other computer programs is known as?
Covid-19
Virus
Spoofing
Rhinovirus
4.
The attempt to acquire sensitive information such as usernames, passwords, and credit card details by pretending you are a trustworthy entity in an electronic communication is known as?
Converting
Hacking
Phishing
Fishing
5.
When visiting a website, you notice a lock icon in the lower-right corner of the browser window. What does the lock represent?
A link to open another site
A webpage that has a secure connection
A program that prevents you from leaving the page
A warning that you are not allowed to view this webpage
6.
To keep your browser private, you can use the _______ mode.
incognito
confidential
encrypted
deception
7.
What is Ransomware
A Disease you get from playing to much Fortnite
A type of malware that wants Money
An Anti Virus Software
Software that protects you from Phishing
8.
You can erase your digital footprint.
True
False
9.
Which of these indicates a website is secure?
You found the website on Google or clicked it from a link in an email.
A little lock icon next to the website address.
The website shows a company name and logo and looks real.
10.
An online shopping website want to track user purchase. The website commonly user data file to store purchasing history. These files are commonly know as:
Cookie
Widgets
script
logs
11.
Which of the following best describes a Trojan Horse
Malicious software that misleads users of its intent, which is to allow unauthorised access to your system
Malicious software that replicates itself and spreads through your network to steal data
Malicious software that it usually attached to an email and sends itself around a network to allow unauthorised access to your system
Malicious software that sets your computer on fire
12.
Software that aims to gather information about a person or organization without their knowledge?
Spyware
Spam
Trojan Horse
Fishing
13.
A computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.
Ethical hacker
Programer
Social Engineer
14.
____ also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.
Cyber Security
Cyber Etiquette
Cyber Warfare
15.
What is one of the most popular online activities-and one that poses the greatest risk to your privacy?
quizizz
Examview
Granville Gmail
social networking
16.
The technology, process or people that protect networks and devices from attack, damage, or unauthorized access
Cyber Security
White Hat Hacker
Domain Name Server
All of the above
17.
Unsolicited electronic messages, especially advertising is know as?
Spim
Spam
Ransomware
18.
General name of computer software designed to cause damage to your electronic device.
Dangerbots
Problemware
Malware
Hyperlinks
19.
A network security device that monitors incoming and outgoing network traffic and decides whether it is safe.
Anti-virus
Firewall
Encryption
Malware
20.
Which is NOT a type of malware?
Virus
Worm
Trojan horse
Sandwich
21.
What is the best way to monitor your online profile?
use password manager
Google yourself
ask your friends to tell you what you see
make sure you have all of your personal information visible
22.
What should you do if you think you have been hacked?
Report the problem to the school or teacher
Change your password
Tell your parents or an adult
All of the above
23.
A type of malware which restricts access to the computer system that it infects, and demands a fee be paid to the operators of the malware in order for the restriction to be removed is known as?
Ransomware
Virus
Spim
Spam
24.
A set of rules for appropriate behavior while on the internet.
Identity
Netiquette
Social Network
Dossier
25.
How do we tighten our security?
Use strong password
Use firewalls
Log-off personal account when not in use
Update anti-virus software
All of the above
26.
Any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems is known as?
Malware
Operating System
Device Driver
Report Question
Previous
Next
warning
Submit
access_time
Time
Report Question
A bunch of text
Support mcqmojo.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page