Q: 1 Identify the oldest phone hacking technique used by hackers to make free calls?
Spamming
Phreaking
Cracking
Phishing
[ Option B ]
Phreaking is an early phone hacking method from the 1960s and 70s where hackers used special sounds to trick telephone systems. They played a 2600 Hz tone to control the phone switches and make free long-distance calls. Tools called "blue boxes" were made to create these tones, and famous phreakers like John Draper (“Captain Crunch”) used a cereal box whistle that made the same tone.
Q: 2 During May 2017, a very popular malware infected almost 2 lakh computers around the world. It demanded payments in Bitcoin crypto currency. It made its victims cry. It is known as _____________.
Wanna Cry
Baby Cry
Crypto
Node Cry
[ Option A ]
WannaCry was a ransomware attack that occurred in May 2017, infecting over 2,00,000 computers across 150 countries. It encrypted users’ data and demanded payment in Bitcoin cryptocurrency to restore access, hence the name “WannaCry” because victims were left helpless.
Q: 3 Which one of the following is usually used in the process of Wi-Fi hacking?
Aircrack—ng
Wireshark
Norton
All of the above
[ Option A ]
Aircrack-ng is a widely used toolset for Wi-Fi hacking and security testing. It includes tools for capturing network traffic, testing wireless card capabilities, and cracking WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), and WPA2 encryption keys.
It supports various attacks such as deauthentication and replay attacks to capture handshake data needed for cracking passwords. This tool is popular among security professionals and hackers for analyzing and testing Wi-Fi network security.
Wireshark is a powerful packet analyzer useful for inspecting network traffic and can assist in wireless troubleshooting or analysis, but it is not primarily a Wi-Fi cracking tool.
Q: 4 Which amongst the following is not a way to protect the system from malware?
Opening the pop-ups
Firewall Protection
Avoid using the Public Wi-Fi
Taking a Regular Backup
[ Option A ]
OPENING POP-UPS is not a way to protect your system, in fact, it is one of the most common ways malware spreads. Pop-ups may contain malicious links, fake ads, or phishing content that can install harmful software on your device.
To stay protected from malware, never click on suspicious pop-ups, use firewalls and antivirus software, and regularly back up important data.
Q: 5 The __________ keyboard of an operating system uses a fixed QWERTY key layout. This can be exploited by keylogger but are still safe than normal keyboard hardware.
On Screen
Online Virtual
Software
Semi-Soft
[ Option A ]
The On-Screen Keyboard is a Virtual Keyboard provided by an operating system that displays QWERTY keys on the screen that allows users to input text by clicking keys using a mouse or touch input instead of a physical keyboard.
Although keyloggers can exploit it by recording screen activities, it is still safer than hardware keyboards, which can be compromised by physical keyloggers.
Q: 6 _________ is a complete software of a third party that is installed on the host computer and can be used by the browser for multiple functionalities.
Firewall
Add on
Plug-in
Extension
[ Option C ]
A Plug-In is a complete software component developed by a third party that is installed on a host application, such as a web browser, to extend its capabilities.
Plug-Ins allow browsers to perform additional functions like playing videos, displaying PDFs, or running multimedia content. Examples include Adobe Flash Player, Java Plug-in, PDF Viewer etc.
Plug-Ins differ from Add-Ons or Extensions, which are usually smaller tools that modify or enhance the browser’s behavior, while plug-ins provide additional functionality through external software integration.
Q: 7 Which phase is not included in virus life cycle?
Dormant
Execution
Start
Triggering
[ Option C ]
A Computer Virus is a type of malicious software that attaches itself to files or programs and can spread from one system to another. Just like a biological virus, it has a life cycle made up of different stages.
| Phase | Description |
|---|---|
| Dormant Phase | The virus stays inactive, waiting for specific conditions to occur like date, event, or user action. |
| Propagation Phase | The virus spreads by making copies of itself and attaching to files, programs, or boot sectors. |
| Triggering Phase | The virus is activated when certain conditions are met, e.g., opening a file, reaching a set date. |
| Execution Phase | The malicious payload runs, performing harmful actions such as deleting data, corrupting files, or displaying messages. |
Q: 8 __________ is a network security system designed to protect a trusted private network from an untrusted outside network to which it is connected.
Bridge
Cookies
Firewall
SSL
[ Option C ]
A Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Its primary purpose is to protect a trusted internal (LAN) network from untrusted external networks like the Internet.
Firewalls can be hardware, software, or a combination of both, and act as a barrier or gatekeeper between networks by allowing or blocking data packets depending on security policies.
Q: 9 Which of the following attack is used for identity theft?
Phishing attack
TCP flooding attack
Virus infection
DNS amplification attack
[ Option A ]
Phishing is when someone tricks you to give your personal information like passwords, bank details, or ID numbers by sending fake emails, messages, or websites that look real. Hackers use this stolen information to steal your identity, make purchases, or commit fraud.
Q: 10 ___________ is another term for antivirus software.
Anti – Malware
Malware Detection Program
Spyware Eliminator
Network Protection Software
[ Option A ]
Antivirus software is also called Antimalware, because it protects the system not only from viruses but also from other malicious software like worms, trojans, spyware, and ransomware.
| MALWARE TYPE | EXPLANATION |
|---|---|
| Virus | Attaches to files or programs and spreads when the file is run. |
| Worm | Spreads automatically across computer or networks without user action. |
| Trojan Horse | Looks like a safe program but secretly does harmful things. |
| Spyware | Secretly monitors user activity and steals information. |
| Adware | Displays unwanted ads (advertisements), sometimes tracks browsing. |
| Ransomware | Locks files or systems and demands payment to unlock them. |
| Rootkit | Hides itself and other malware, giving attackers control. |
| Keylogger | Records all keystrokes to steal information like passwords. |
| Backdoor | Creates a hidden way to access a computer system. |
| Logic Bomb | Triggers malicious actions when specific conditions are met. |
Q: 11 Consider Column – I and Column – II in context of malwares.
| Column – I | Column – II |
|---|---|
| a. Rootkit | i. An infected machine activated to launch attacks on other machines. |
| b. Zombie | ii. Appears to be useful, but also has a hidden malicious function. |
| c. Spyware | iii. Collects information and transmits it to another system. |
| d. Trojan Horse | iv. Set of hacker tools used after breaking into a computer system and gaining root-level access. |
Which of the following is the most suitable match of Column – I and Column – II?
a – iv, b – i, c – iii, d – ii
a – ii, b – iii, c – iv, d – i
a – ii, b – i, c – iii, d – iv
a – i, b – iv, c – ii, d – iii
[ Option A ]
| Malware Type | Description |
|---|---|
| Virus | Infects files and programs, spreads when infected files are shared or executed. |
| Worm | Self-replicating malware that spreads across networks without user action. |
| Trojan Horse | Appears as legitimate (genuine) software but secretly creates backdoors or installs malware. |
| Rootkit | Hides deep in the OS, modifies system functions, and gives attackers administrator control. In other word, set of hacker tools installed after gaining root-level access to a system, allowing attackers to hide their presence and control the system. |
| Spyware | Monitors user activities, stealing data such as browsing history, keystrokes, and credentials. |
| Ransomware | Encrypts files and demands payment for the decryption key. |
| Zombie | An infected machine that can be remotely controlled to launch attacks, often as part of a botnet. |
| Adware | Displays intrusive advertisements, often bundled with free software. |
| Keylogger | Records user keystrokes to steal sensitive information like passwords and credit card details. |
Q: 12 An unauthorized real – time interception or monitoring of private communication between two entities over a network is called –
Insecure Access
Eavesdropping
Over Hearing
Phishing
[ Option B ]
In network security, communication between two devices can be intercepted by malicious users. Eavesdropping is the unauthorized real-time interception or monitoring of private communication between two entities over a network. It can involve listening to voice calls, reading emails or data transmissions without consent, exploiting unsecured or weakly secured communication channels.
Q: 13 Which attack blocks a legitimate user (मान्य उपयोगकर्ता) from using computer?
Phishing
Spamming
Virus
DOS (Denial of Service)
[ Option D ]
A Denial of Service (DoS) attack is a type of cyberattack that aims to make a computer system or network unavailable to its legitimate users. It does this by overloading the system with excessive requests, causing it to slow down or crash completely.
Q: 14 To verify a digital signature, we need the _____________.
Sender's private key
Sender's public key
Receiver's private key
Receiver's public key
[ Option B ]
In public key cryptography, a Digital Signature is created by the sender using their private key (Sender Private Key). To verify that the signature is authentic and that the message has not been altered, the receiver uses the Sender’s Public Key. This ensures the signature was indeed generated by the sender and provides authentication and integrity.
Q: 15 Which of the following statements are true regarding firewalls?
A. Only the packets from trusted source address can enter the organization's network.
B. It is important to have firewalls to prevent the network from unauthorized access.
C. A firewall can be implemented using hardware or software or the combination of both.
D. A firewall can not be implemented using software.
A, B, C are correct.
A, B, D are correct.
A and C are correct.
A and B are correct.
[ Option A ]
A Firewall is a network security device or software that acts as a barrier between a trusted internal network and an untrusted external network, like the internet.
Its main purpose is to monitor data packets entering or leaving the network and decide whether to allow or block them based on predefined security rules.
Firewalls help protect systems from hackers, viruses, and unauthorized access. They can be implemented using hardware, software, or both, depending on the system’s security needs.
Firewalls ensure that only packets from trusted source addresses are allowed to enter the organization’s network.
Q: 16 The information that gets transformed in encryption is-
Plain Text
Parallel Text
Encrypted Text
Decrypted Text
[ Option A ]
Cryptography, the science of securing communication by using encryption and decryption techniques.
The information that gets transformed during encryption is called Plain Text. Plain text refers to the original, human-readable data such as messages, files, or any sensitive information.
Encryption is the process of converting readable information, called plain text, into an unreadable or scrambled format known as Cipher Text, using algorithms and cryptographic keys. The Cipher Text, ensures that unauthorized users cannot understand it without the proper key.
Decryption is the reverse of encryption. It transforms encrypted data (cipher text) back into its original readable form (plain text) using a decryption key.
Q: 17 Act of listening to a private conversation between hosts in a network is called ___________.
Spoofing
Tampering
Eavesdropping
Repudiation
[ Option C ]
Eavesdropping is the act of secretly listening to or capturing private communication between two parties over a network.
It is a type of network attack where an unauthorized person monitors data that is being transmitted between hosts. This can include listening to phone calls, reading emails, or intercepting messages exchanged over the internet.
Q: 18
Match List — I with List — II and select the correct answer by using the codes given below the lists:
| List — I | List — II |
|---|---|
| (i) Boot Virus | A. The attacker sends a large number of connection or information requests to a target. |
| (ii) Worm | B. Infects the key operating system files located in a computer. |
| (iii) Zombies | C. Malicious program that replicates itself constantly until they completely fill available resources. |
| (iv) Denial-of-service attack | D. Machines directed remotely. |
(i) – A, (ii) – B, (iii) – C, (iv) – D
(i) – B, (ii) – C, (iii) – D, (iv) – A
(i) – C, (ii) – D, (iii) – A, (iv) – B
(i) – D, (ii) – A, (iii) – B, (iv) – C
[ Option B ]
A Boot Virus is a type of computer virus that infects the boot sector of a storage device or the key operating system files that help a computer start. When the infected computer is turned on, the virus is automatically loaded into memory before the operating system starts.
A Worm is a self-replicating malicious program that spreads without needing to attach itself to any file or program. Unlike ordinary viruses, worms can travel automatically through networks and the internet.
Zombies are computers that have been secretly infected with malicious software and are controlled remotely by a hacker, often without the owner’s knowledge. These compromised machines are used to perform tasks such as sending spam emails, spreading viruses, or participating in large-scale network attacks.
A Denial-of-Service (DoS) attack is an attempt by an attacker to make a computer or network service unavailable to its users. In this attack, the hacker sends a massive number of requests or data packets to a target server or website.
Q: 19 Which of the following is the first computer virus?
Sasser
Blaster
Creeper
Both (a) and (c)
[ Option C ]
The Creeper virus, created in 1970s by Bob Thomas at BBN Technologies, is considered the first computer virus. It was an experimental self-replicating program that moved across ARPANET and displayed the message: "I'M THE CREEPER, CATCH ME IF YOU CAN!".
Q: 20 Hacktivism is –
A process of break into systems and dig out its information and make it public.
Gaining access to systems with an intention to fix the identified weaknesses.
A test technique for an existing internet infrastructure and to find its loopholes.
The act of hacking a computer system, for politically or socially motivated purpose.
[ Option D ]
Hacktivism is the combination of "hacking" and "activism." It refers to the act of breaking into computer systems or networks with the intention of promoting political or social causes (not for financial gain).
Hacktivists use hacking techniques to raise awareness, protest against injustices, or support specific movements by targeting organizations, governments, or corporations they oppose.
Common hacktivist activities include:
Q: 21 The term ‘Skimming’ in E-banking is related to :
Theft of credit card details.
Providing account details for initiating net-banking services.
Maintenance of an e-log for all account holders with active net-banking, by their bank.
Creation of secure gateways for net-banking.
[ Option A ]
In E-banking and digital payments, security is a major concern. One of the common fraud techniques used by criminals is called Skimming. The skimming refers to the illegal practice of stealing credit card or debit card details using a small device called a skimmer, often hidden at ATMs or Point-of-Sale (POS) terminals.
Fraudsters use skimmers to secretly copy the information from a card’s magnetic strip. They may also use a hidden camera or fake keypad to capture the PIN. The stolen data is used to create counterfeit cards or make unauthorized transactions.
| TERM | DESCRIPTION |
|---|---|
| Skimming | Illegally copying card data from the magnetic strip using a hidden device called skimmer. |
| Phishing | Fraud through fake emails or websites to steal personal information (sensitive data). Fake login page. |
| Carding | Using stolen card details to make unauthorized online purchases. |
| Spoofing | Impersonating bank/website/phone number to trick victims. |
| Smishing | Phishing using SMS messages instead of email. |
| Vishing | Phishing via phone or voice calls. |
| Account Takeover | Gaining control of a user bank account through stolen credentials. |
| SIM Swap | Obtaining a duplicate SIM card to intercept OTPs and accounts. |
Q: 22 In public key cryptography, which key is used to verify a digital signature?
Sender’s private key
Sender’s public key
Receiver’s public key
Receiver’s private key
[ Option B ]
In public key cryptography, a Digital Signature is created by the sender using their private key. To verify that the signature is authentic and that the message has not been altered, the receiver uses the sender’s public key. This ensures the signature was indeed generated by the sender and provides authentication and integrity.
Q: 23 Cyber security is also called, “Security of Information Technology”. It is used mainly to:
Connect different computers together
Used to share the resources on internet
Stop unauthorized access into various computers
Used to send letters by post
[ Option C ]
Cyber Security is the practice of protecting computers, networks, programs, and data from unauthorized access, attacks, or damage. The main goals of cyber security are Confidentiality, Integrity, Availability (CIA).
| MEASURE | PURPOSE |
|---|---|
| Firewall | Blocks unauthorized access to networks. Act as a barrier between trusted internal networks and untrusted external networks. |
| Antivirus / Antimalware | Software tools that detect and remove malicious software to protect systems and data. |
| Encryption | Converts data into unreadable form for unauthorized access during storage or transmission. |
| Access Control | Restricts access to authorized users only. Common methods are Passwords, Biometrics, Multi-Factor Authentication (MFA). |
| Intrusion Detection System (IDS) | Monitors network for suspicious activity. |
| Regular Software Updates | Fixes security vulnerabilities in programs. |
| Backup & Recovery | Protects against data loss due to attacks. Cloud backup, external drives. |
Q: 24 Which of the following is not a type of firewall?
Stateful Inspection
Application Proxy
Packet Filtering
ITU-T X.509
[ Option D ]
A Firewall is a network security device or software that monitors and controls incoming and outgoing traffic based on predefined security rules. Common types of firewalls include:
ITU-T X.509 is a standard for Public Key Infrastructure (PKI) certificates and certificate formats used for authentication and trust, not for traffic filtering.
Q: 25 What are the forms of password cracking techniques?
Attacksyllable
AttackBrut Forcing
AttackHybrid
All the above
[ Option D ]
Password Cracking is the process of attempting to discover or recover a password to gain unauthorized or authorized access to a system, account, or network. It is performed either to recover forgotten passwords or, more maliciously, to break into systems by guessing the correct password.
Attackers use various automated tools and techniques to systematically guess or decrypt passwords by exploiting weak or commonly used ones.
Q: 26 An unauthorized real time interception or monitoring of private communication between two entities over a network is called –
Eavesdropping
Snooping
Phishing
Virus
[ Option A ]
In network security, communication between two devices can be intercepted by malicious users. Eavesdropping is the unauthorized real-time interception or monitoring of private communication between two entities over a network. It can involve listening to voice calls, reading emails or data transmissions without consent, exploiting unsecured or weakly secured communication channels.
Phishing : Fraudulent attempt to obtain or steal sensitive information like passwords.
Virus : Malicious Software (Malware) designed to damage or disrupt systems.
Q: 27 _________ is malicious software that alters the regular functionality of an OS, takes full control on the targeted system and acts as the system administrator on the victim’s system.
Spyware
Virus
Rootkit
Trojan Horse
[ Option C ]
A Rootkit is a type of Malicious Software (Malware) designed to gain unauthorized administrator-level control over an operating system. Once installed, it alters the normal functioning of the OS, allowing the attacker to take full control of the system and act as its administrator.
Rootkits are especially dangerous because they actively hide themselves, making detection and removal very difficult.
| Malware Type | Description |
|---|---|
| Virus | Infects files and programs, spreads when infected files are shared or executed. |
| Worm | Self-replicating malware that spreads across networks without user action. |
| Trojan Horse | Appears as legitimate (genuine) software but secretly creates backdoors or installs malware. |
| Rootkit | Hides deep in the OS, modifies system functions, and gives attackers administrator control. |
| Spyware | Monitors user activities, stealing data such as browsing history, keystrokes, and credentials. |
| Ransomware | Encrypts files and demands payment for the decryption key. |
| Adware | Displays intrusive advertisements, often bundled with free software. |
| Keylogger | Records user keystrokes to steal sensitive information like passwords and credit card details. |
Thank you so much for taking the time to read my Computer Science MCQs section carefully. Your support and interest mean a lot, and I truly appreciate you being part of this journey. Stay connected for more insights and updates! If you'd like to explore more tutorials and insights, check out my YouTube channel.
Don’t forget to subscribe and stay connected for future updates.