Computer Siksha

Class 7 Computer Security MCQs with Solutions

Introduction

Class 7 Computer Security MCQs with Solutions is specially designed to help students understand the basics of cyber safety and online protection in a simple and exam-friendly way. This post includes carefully selected multiple-choice questions with clear and detailed explanations to strengthen students’ concepts. These MCQs cover important topics like passwords, viruses, phishing, malware, and safe internet practices.

Class 7 Computer Security MCQs with Solutions

Practicing these questions improves confidence, boosts exam performance, and develops awareness about digital security. Each solution explains the correct answer in an easy language so students can avoid common mistakes. This resource is highly useful for school exams, class tests, and competitive preparation.

Computer Security MCQ Quiz | 60 Questions

Computer Security MCQ

Master computer security concepts with 60 unique multiple-choice questions covering threats, viruses, firewalls, cybercrime, and ethics.

60
Questions
3
Sections
8
Topics
0 / 60 answered
0
Answered
0
Correct
0
Incorrect
0%
Score

Introduction, Threats & Computer Viruses

Q1 – Q20
Q1

What is computer security primarily concerned with?

AIncreasing computer processing speed
BProtecting computer systems and data from damage, theft, and unauthorized access
CDesigning new programming languages
DManufacturing computer hardware
✅ Correct Answer: B. Computer security involves protecting computer systems, networks, and data from digital attacks, unauthorized access, damage, or theft. It ensures the confidentiality, integrity, and availability of information stored on or transmitted through computing systems.
Q2

Which of the following best defines a “threat” in computer security?

AA security patch released by a software vendor
BA potential danger that could exploit a vulnerability to harm a system
CA type of programming error
DA hardware component that protects data
✅ Correct Answer: B. In computer security, a threat is any potential danger that could exploit a system’s vulnerability. Threats can be natural (floods, fires), accidental (user errors), or intentional (hackers, malware) and can compromise data security, system availability, or data integrity.
Q3

Which of the following is NOT a common computer threat?

AMalware infection
BPhishing attacks
CDisk defragmentation
DUnauthorized access
✅ Correct Answer: C. Disk defragmentation is a maintenance process that reorganizes fragmented data on a hard drive to improve performance — it is a beneficial operation, not a threat. Common computer threats include malware, phishing, unauthorized access, denial-of-service attacks, and data breaches.
Q4

What is a computer virus?

AA hardware component used for data storage
BA biological organism that affects computer users
CMalicious software that attaches itself to programs and replicates when executed
DA type of internet browser
✅ Correct Answer: C. A computer virus is malicious software (malware) that attaches itself to legitimate programs or files. When an infected file runs, the virus replicates and spreads to other files. Viruses can corrupt data, slow performance, delete files, or allow hackers to gain unauthorized access.
Q5

How does a computer virus primarily spread from one system to another?

AThrough the power supply cable
BVia infected files, email attachments, downloads, and removable media
CThrough keyboard typing
DBy touching the computer screen
✅ Correct Answer: B. Computer viruses spread through multiple channels including infected email attachments, malicious downloads from the internet, infected USB drives or CDs, file sharing networks, and visiting compromised websites. The virus activates when the infected file or program is opened or executed.
Q6

A Boot Sector Virus infects which part of a computer?

AThe graphics card firmware
BThe master boot record or boot sector of storage devices
CThe computer monitor drivers
DThe printer memory
✅ Correct Answer: B. A Boot Sector Virus targets the master boot record (MBR) or the boot sector of hard drives and storage devices. Since the boot sector loads before the operating system, this virus executes before any security software runs, making it particularly difficult to detect and remove effectively.
Q7

Which type of virus specifically targets executable program files with extensions like .exe or .com?

AMacro Virus
BBoot Sector Virus
CFile Virus
DWorm
✅ Correct Answer: C. A File Virus (also called a program virus) attaches itself to executable files such as .exe, .com, .sys, or .bat files. When a user runs the infected program, the virus activates, spreads to other executable files on the system, and can cause data loss or system damage.
Q8

A Macro Virus most commonly infects which type of files?

AOperating system kernel files
BVideo and audio media files
CDocuments and spreadsheets that support macros (e.g., MS Word, Excel)
DNetwork router configuration files
✅ Correct Answer: C. Macro Viruses embed malicious code within macros of document files, most commonly Microsoft Word (.doc) and Excel (.xls) files. When a user opens an infected document and enables macros, the virus executes, can spread to other documents, corrupt data, or download additional malware.
Q9

What is the key characteristic that distinguishes a Worm from a traditional virus?

AWorms only affect mobile devices
BWorms self-replicate and spread across networks without needing to attach to a host file
CWorms cannot damage files
DWorms require a user to physically install them
✅ Correct Answer: B. Unlike traditional viruses that need a host file to spread, worms are standalone malicious programs that replicate independently across networks without human interaction. Worms consume network bandwidth, can carry payloads, delete files, and open backdoors for remote attackers to exploit.
Q10

A Trojan Horse differs from a virus because it:

ASpreads faster than a virus
BDisguises itself as legitimate software to trick users into installing it
COnly affects ancient computers
DDoes not cause any damage to the system
✅ Correct Answer: B. A Trojan Horse masquerades as a legitimate, helpful application to trick users into downloading and running it. Unlike viruses, Trojans do not self-replicate. Once installed, they can steal data, create backdoors, log keystrokes, download more malware, and give attackers remote control of the infected system.
Q11

Which sign most likely indicates a computer has been infected by a virus?

AThe screen becomes brighter
BFiles open faster than usual
CUnexplained slowdowns, missing files, and frequent crashes
DThe internet connection becomes stronger
✅ Correct Answer: C. Common symptoms of a virus-infected computer include sudden and unexplained performance slowdowns, programs crashing unexpectedly, files mysteriously disappearing or becoming corrupted, excessive hard drive activity, unfamiliar programs starting automatically, and strange pop-up messages appearing on screen.
Q12

Which of the following actions is most likely to introduce a virus into a computer?

ARestarting the computer
BOpening an email attachment from an unknown sender
CChanging the desktop wallpaper
DUpdating the operating system
✅ Correct Answer: B. Opening email attachments from unknown or suspicious senders is one of the most common ways viruses enter a computer. Cybercriminals disguise malware as innocent-looking files (PDFs, images, Word docs) and use social engineering tactics to lure unsuspecting users into opening them.
Q13

What is “social engineering” in the context of computer security?

ABuilding social media platforms
BManipulating people psychologically to reveal confidential information or take harmful actions
CEngineering new social networking algorithms
DDesigning user interfaces for social apps
✅ Correct Answer: B. Social engineering exploits human psychology rather than technical vulnerabilities. Attackers manipulate people into divulging passwords, clicking malicious links, or granting access by impersonating trusted entities. Common examples include phishing emails, pretexting phone calls, and baiting attacks that exploit trust.
Q14

Which of the following BEST describes “phishing”?

AA method of increasing internet speed
BA fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
CA legitimate online banking technique
DA type of network cable
✅ Correct Answer: B. Phishing is a deceptive cybercrime where attackers impersonate legitimate organizations (banks, tech companies, government agencies) via email, text, or fake websites to trick victims into revealing sensitive information such as passwords, credit card numbers, or social security numbers.
Q15

What does “malware” stand for?

AManual software
BMalicious software
CManaged layer software
DMarketing layer software
✅ Correct Answer: B. Malware is a portmanteau (combined word) of “malicious software.” It is an umbrella term covering any software specifically designed to disrupt, damage, or gain unauthorized access to computer systems. Malware includes viruses, worms, Trojan horses, ransomware, spyware, adware, and rootkits.
Q16

Ransomware is a type of malware that:

ASpeeds up computer performance
BEncrypts a victim’s files and demands payment to restore access
CMonitors internet usage for parental controls
DAutomatically backs up important data
✅ Correct Answer: B. Ransomware encrypts the victim’s files or locks their system and demands a ransom payment (usually cryptocurrency) in exchange for the decryption key. High-profile ransomware attacks have targeted hospitals, corporations, and government agencies, causing billions of dollars in damages worldwide each year.
Q17

What type of malware secretly records everything a user types, including passwords?

AAdware
BKeylogger
CDefragmenter
DCompiler
✅ Correct Answer: B. A keylogger is malicious software that silently records every keystroke a user makes on their keyboard, capturing passwords, credit card numbers, private messages, and other sensitive data. The collected information is then secretly transmitted to the attacker for identity theft or unauthorized access to accounts.
Q18

Which of these represents a strong password practice?

AUsing your birthdate as a password
BUsing the same password for all accounts
CCreating a long mix of uppercase, lowercase, numbers, and symbols
DUsing your pet’s name as a password
✅ Correct Answer: C. A strong password combines uppercase letters, lowercase letters, numbers, and special symbols and is at least 12–16 characters long. Strong passwords are difficult to guess or crack through brute force attacks. Users should also use unique passwords for every account to limit the damage if one password is compromised.
Q19

What is a “zero-day vulnerability”?

AA security flaw known to the public for zero days
BA newly discovered software flaw that has no available fix yet
CA bug that only activates at midnight
DA vulnerability in zero-cost software
✅ Correct Answer: B. A zero-day vulnerability is a software security flaw that is unknown to the software vendor and therefore has no patch or fix available. Attackers exploit zero-day vulnerabilities before developers become aware of them. The term “zero-day” refers to the fact that developers have had zero days to address the flaw.
Q20

Which method does a worm use to spread across a network without human interaction?

AIt waits for a user to insert a USB drive
BIt exploits network vulnerabilities and automatically copies itself to connected systems
CIt requires the user to manually run an installer
DIt only spreads via Bluetooth connections
✅ Correct Answer: B. Worms actively scan networks for vulnerable systems and exploit security weaknesses to automatically replicate and install themselves on new machines without any user action. Famous worms like WannaCry and ILOVEYOU spread to millions of computers in days, causing enormous data loss and financial damage globally.

Antivirus Software & Firewalls

Q21 – Q40
Q21

What is the primary purpose of antivirus software?

ATo increase internet download speed
BTo detect, prevent, and remove malicious software from a computer
CTo create backups of all system files
DTo compress files for faster storage
✅ Correct Answer: B. Antivirus software is a security program designed to detect, prevent, quarantine, and remove malicious software including viruses, worms, Trojans, spyware, and ransomware. It works by scanning files against a database of known malware signatures and using heuristic analysis to identify new, unknown threats.
Q22

Which of the following is a well-known antivirus software?

AMicrosoft Word
BNorton Antivirus
CAdobe Photoshop
DMozilla Firefox
✅ Correct Answer: B. Norton Antivirus is one of the most widely recognized and used antivirus software products in the world, developed by NortonLifeLock. Other popular antivirus products include McAfee, Kaspersky, Avast, Bitdefender, AVG, and Windows Defender which is built into modern Windows operating systems.
Q23

Why is it important to regularly update antivirus software?

ATo change the software’s color theme
BTo ensure it can detect the latest virus definitions and new malware threats
CTo make the computer run faster
DUpdates are unnecessary once installed
✅ Correct Answer: B. New malware threats emerge every day, so antivirus software must regularly update its virus definition database to recognize and block the latest threats. Outdated antivirus software cannot detect newly created viruses, leaving the computer vulnerable. Updates also include improved detection algorithms and security patches for the antivirus program itself.
Q24

What is “real-time protection” in antivirus software?

AA feature that shows the current time on screen
BContinuous monitoring of system activity to block threats as they occur
CA scan that only runs at specific scheduled times
DProtection that only works when connected to the internet
✅ Correct Answer: B. Real-time protection (also called on-access scanning) continuously monitors all file activity, downloads, and running processes in the background. It intercepts and scans files when they are accessed, opened, or created, blocking threats immediately before they can execute and harm the system rather than finding infections after they occur.
Q25

What is a firewall in computer security?

APhysical hardware that prevents computers from overheating
BA security system that monitors and controls incoming and outgoing network traffic
CA type of computer virus
DSoftware that compresses large files
✅ Correct Answer: B. A firewall is a network security system (either hardware, software, or both) that monitors and filters incoming and outgoing network traffic based on predetermined security rules. It creates a protective barrier between a trusted internal network and untrusted external networks like the internet, blocking unauthorized access.
Q26

A packet filtering firewall examines network data based on which criteria?

AThe file size of the data being transmitted
BSource and destination IP addresses, ports, and protocols
CThe username of the person sending data
DThe color theme of the operating system
✅ Correct Answer: B. Packet filtering firewalls inspect each data packet’s header information including source IP address, destination IP address, source port, destination port, and network protocol (TCP/UDP). Based on predefined rules, the firewall either allows or blocks each packet without inspecting the actual content of the data payload.
Q27

Which type of firewall operates at the application layer and can inspect the actual content of data packets?

APacket filtering firewall
BApplication-layer (proxy) firewall
CNetwork address translation
DPhysical barrier firewall
✅ Correct Answer: B. An application-layer or proxy firewall operates at the highest level of the OSI model. It acts as a proxy between users and the internet, fully inspecting data packet content, application protocols, and user behavior. This deep inspection allows it to detect sophisticated threats hidden within seemingly legitimate traffic that simpler firewalls miss.
Q28

What is the main advantage of using a hardware firewall over a software firewall?

AHardware firewalls are free to install
BHardware firewalls protect an entire network independently of individual computers’ resources
CHardware firewalls do not require any configuration
DHardware firewalls cannot be bypassed
✅ Correct Answer: B. Hardware firewalls are dedicated physical devices installed between a network and its internet connection. They protect all devices on the network simultaneously without using any individual computer’s CPU or memory resources. This makes them ideal for businesses where protecting multiple computers from a single point is critical for network security.
Q29

What does “quarantine” mean in the context of antivirus software?

APermanently deleting all files on the computer
BIsolating a suspicious file in a restricted area so it cannot harm the system
CSharing the virus with other security researchers
DCompressing infected files to reduce their size
✅ Correct Answer: B. Quarantine in antivirus software means moving a suspicious or infected file to a special isolated folder where it cannot execute, access the file system, or spread to other files. The quarantined file remains on the system, allowing the user or antivirus to further analyze it, restore it if it was a false positive, or delete it permanently.
Q30

What is “heuristic analysis” in antivirus software?

AScanning only files that are exactly 5 MB in size
BDetecting new, unknown malware by analyzing suspicious behavioral patterns
CComparing files to a database of known good programs
DScanning files based on their creation date
✅ Correct Answer: B. Heuristic analysis enables antivirus software to detect new or previously unknown malware by examining the code and behavior of programs for suspicious patterns or actions — such as attempting to modify system files, replicate themselves, or communicate with unknown servers — rather than relying solely on a database of known virus signatures.
Q31

Which of the following is a use of a firewall?

ASpeeding up CPU performance
BBlocking unauthorized remote access to a private network
CIncreasing the computer’s RAM capacity
DTranslating documents into different languages
✅ Correct Answer: B. One of the primary uses of a firewall is to block unauthorized remote access attempts to a private network. Firewalls enforce security rules that prevent hackers from establishing unauthorized connections, protect sensitive internal resources from external threats, and ensure only legitimate, authorized traffic enters or leaves the network.
Q32

What is a “false positive” in antivirus scanning?

AA virus that disguises itself as a false program
BWhen antivirus incorrectly identifies a safe file as malicious
CA positive scan result that proves the system is clean
DWhen a virus successfully bypasses antivirus detection
✅ Correct Answer: B. A false positive occurs when antivirus software incorrectly flags a legitimate, harmless file or program as malicious. This can happen due to similarity to known malware patterns or overly aggressive heuristic detection. False positives can lead to important system files being quarantined or deleted, potentially causing software or system failures.
Q33

What does a firewall use to decide which network traffic to allow or block?

AThe user’s subscription level
BPredefined security rules and policies
CThe file size of transmitted data
DThe current time of day
✅ Correct Answer: B. Firewalls operate based on a set of predefined security rules and access control policies configured by network administrators. These rules define which types of traffic, IP addresses, ports, and protocols are permitted or denied. Traffic that matches an “allow” rule passes through; traffic that matches a “deny” rule or has no matching rule is blocked.
Q34

Windows Defender is an example of which type of security tool?

AA third-party hardware firewall
BA built-in antivirus and security software included with Windows
CA type of computer virus
DA network router configuration tool
✅ Correct Answer: B. Windows Defender (now called Microsoft Defender Antivirus) is a free, built-in antivirus and anti-malware program that comes pre-installed with Windows 8 and later versions. It provides real-time protection, cloud-based threat detection, firewall management, and periodic system scanning without requiring any additional software installation.
Q35

What is a “DMZ” (Demilitarized Zone) in network security?

AA highly secure zone where only administrators can work
BA network segment that acts as a buffer zone between a private network and the internet
CA zone free from all firewalls and security tools
DA physical server room protected from fire hazards
✅ Correct Answer: B. A DMZ (Demilitarized Zone) is a physical or logical network segment that separates an organization’s internal network from the internet. Public-facing servers (web, email, DNS) are placed in the DMZ, where they can be accessed externally while being isolated from the sensitive internal network, limiting the damage if they are compromised.
Q36

Which antivirus feature scans files only when they are accessed or executed?

AFull system scan
BScheduled scan
COn-access scan (real-time protection)
DBoot-time scan
✅ Correct Answer: C. On-access scanning (real-time protection) automatically checks files for malware at the moment they are accessed, opened, copied, or executed. This approach provides continuous, immediate protection and stops threats before they activate. It differs from on-demand scans which only run when manually triggered or scheduled by the user.
Q37

What is the role of antivirus software’s “virus definition database”?

AIt stores all the user’s personal files securely
BIt contains signatures of known malware used to identify threats during scanning
CIt lists all websites blocked by the firewall
DIt tracks the computer’s login history
✅ Correct Answer: B. A virus definition database (also called a signature database) is a continuously updated library of digital fingerprints of known malware. When antivirus software scans a file, it compares the file’s code patterns against these signatures. A match indicates the presence of a known threat. Regular updates ensure the database includes the newest discovered malware signatures.
Q38

A firewall that tracks the state of active network connections is called a:

AProxy firewall
BStateful inspection firewall
CPacket filtering firewall
DNext-generation firewall
✅ Correct Answer: B. A stateful inspection firewall monitors the complete state of active network connections by tracking which connections are established, ongoing, or closing. Unlike simple packet filtering, it evaluates packets in the context of the entire connection, making it significantly more effective at detecting and blocking suspicious traffic patterns and session-hijacking attacks.
Q39

Which of the following best describes McAfee?

AA type of computer virus
BA widely used antivirus and cybersecurity software product
CA social media platform
DA cloud storage service
✅ Correct Answer: B. McAfee is one of the world’s largest cybersecurity software companies, offering antivirus, internet security, and endpoint protection products for both consumers and businesses. Founded by John McAfee in 1987, it provides real-time threat detection, firewall protection, identity monitoring, and safe web browsing features to millions of users worldwide.
Q40

What happens when a firewall receives a packet that does not match any rule?

AIt automatically speeds up the packet’s delivery
BBy default, most firewalls drop or block the unmatched packet
CThe packet is stored and delivered later
DThe firewall shuts down immediately
✅ Correct Answer: B. Most firewalls follow a “default deny” security principle, meaning any network traffic that does not match an explicitly defined “allow” rule is automatically blocked and dropped. This conservative approach ensures that unknown or suspicious traffic is rejected by default, reducing the attack surface and preventing unauthorized access through unspecified channels.

Cybercrime & Computer Ethics

Q41 – Q60
Q41

What is cybercrime?

ACrimes committed in a cyber café
BCriminal activities carried out using computers or the internet as tools or targets
CWatching videos online for free
DPlaying video games on a computer
✅ Correct Answer: B. Cybercrime encompasses any criminal activity that involves a computer, network, or internet-connected device either as the tool used to commit the crime or as the target of the crime. Examples include hacking, identity theft, online fraud, cyberstalking, distribution of child exploitation material, and ransomware attacks.
Q42

What is “identity theft” in the context of cybercrime?

ALegally changing your name online
BStealing someone’s personal information to commit fraud or other crimes in their name
CCreating a fake social media profile for fun
DForgetting your own password
✅ Correct Answer: B. Identity theft is a serious crime where a criminal steals a person’s personal information — such as name, social security number, credit card details, or passwords — and uses it fraudulently to open bank accounts, apply for loans, make purchases, or commit other crimes while impersonating the victim, causing significant financial and reputational damage.
Q43

A Denial-of-Service (DoS) attack aims to:

ASteal sensitive data from a database
BOverwhelm a server or network with traffic to make it unavailable to legitimate users
CEncrypt files and demand a ransom payment
DTrack user browsing behavior for advertising
✅ Correct Answer: B. A Denial-of-Service (DoS) attack floods a target server, website, or network with an overwhelming amount of traffic or requests, exhausting its resources and making it slow or completely unavailable to legitimate users. Distributed DoS (DDoS) attacks use thousands of compromised computers simultaneously to launch even more powerful attacks.
Q44

What is “hacking” in computer security?

ACutting computer cables
BGaining unauthorized access to computer systems or networks
CRepairing broken computer hardware
DTyping very quickly on a keyboard
✅ Correct Answer: B. Hacking refers to identifying and exploiting weaknesses in a computer system or network to gain unauthorized access. While malicious hackers (black hats) commit cybercrime, ethical hackers (white hats) are authorized security professionals who use the same techniques to identify vulnerabilities so organizations can fix them before criminals exploit them.
Q45

What is cyberstalking?

AFollowing someone’s social media posts out of curiosity
BUsing the internet to repeatedly harass, threaten, or monitor a specific individual
CWalking behind someone while using a smartphone
DTracking network packets in a computer lab
✅ Correct Answer: B. Cyberstalking is a form of online harassment where a perpetrator uses electronic communications — email, social media, messaging apps, tracking software — to repeatedly and intentionally harass, intimidate, threaten, or monitor a victim. It is a criminal offense in most jurisdictions and can cause serious psychological harm to victims.
Q46

Software piracy is best described as:

ACreating open-source software
BThe unauthorized copying, distribution, or use of copyrighted software
CDesigning pirate-themed computer games
DInstalling free antivirus software
✅ Correct Answer: B. Software piracy is the illegal reproduction, distribution, or use of copyrighted software without proper licensing or authorization from the copyright holder. It includes activities like sharing activation keys, distributing cracked software, and downloading paid programs from unauthorized sources. Software piracy costs the software industry billions of dollars annually and is a criminal offense.
Q47

What is computer ethics?

AThe study of computer hardware manufacturing processes
BA set of moral principles that guide responsible and appropriate use of computers and technology
CRules for writing efficient programming code
DGuidelines for computer repair technicians
✅ Correct Answer: B. Computer ethics is a branch of applied ethics that examines moral questions arising from the development, deployment, and use of computer technology. It guides individuals and organizations on responsible behavior including respecting privacy, protecting intellectual property, avoiding harm, ensuring data accuracy, and maintaining fair access to technology and information.
Q48

Which of the following represents an important computer ethics principle?

AAlways sharing others’ private information publicly
BRespecting other people’s privacy and confidential information
CUsing pirated software to save money
DAccessing others’ accounts without permission for their own protection
✅ Correct Answer: B. Respecting privacy is a fundamental principle of computer ethics. Users and organizations must treat personal and confidential digital information with care and discretion. This means not sharing private data without consent, not reading others’ private messages, securing sensitive data with appropriate protections, and following data protection laws and regulations.
Q49

What does “data privacy” mean in the context of computer use?

AKeeping data on a private hard drive with no backup
BThe right of individuals to control how their personal information is collected, stored, and used
CEncrypting only financial data
DUsing private browsing mode for all online activities
✅ Correct Answer: B. Data privacy refers to individuals’ fundamental right to determine who collects their personal information, how it is used, how long it is stored, and who it is shared with. Organizations are ethically and legally obligated to handle personal data responsibly, transparently, and in accordance with relevant data protection legislation such as GDPR.
Q50

What is “online fraud”?

ALegitimate online shopping with a discount code
BUsing the internet to deceive people for financial gain or other illegal benefits
CRunning a free promotional campaign online
DReviewing products honestly on a website
✅ Correct Answer: B. Online fraud involves using the internet or digital technology to deceive victims for financial gain or other illegal purposes. Common forms include fake online stores that take payment without delivering goods, advance-fee scams (“Nigerian prince” scams), investment fraud, auction fraud, and fraudulent job postings that steal personal information or money from applicants.
Q51

What is the ethical responsibility of a computer professional regarding system vulnerabilities?

AExploit them for personal financial gain
BReport vulnerabilities responsibly so they can be fixed before malicious actors exploit them
CKeep all vulnerabilities secret and never disclose them
DShare vulnerability details publicly to embarrass the software vendor
✅ Correct Answer: B. Computer security professionals follow responsible disclosure practices: reporting discovered vulnerabilities to the affected organization privately, giving them reasonable time to develop and release a patch, and only then disclosing the details publicly if necessary. This ethical approach protects users while ensuring vendors address security issues promptly and properly.
Q52

What does “intellectual property” mean in a digital context?

APhysical computer components inside a device
BCreations of the mind — like software, music, and writing — protected by copyright or patents
CThe property owned by highly intelligent people
DInternet connection owned by a network provider
✅ Correct Answer: B. Intellectual property in the digital world refers to original creative works — software code, digital artwork, music, videos, written content, and inventions — that are legally protected by copyright, patents, or trademarks. Ethically and legally, users must respect these rights by not copying, distributing, or modifying protected digital content without permission.
Q53

What is the “digital divide”?

AThe gap between the processing speeds of different computers
BThe inequality gap between those who have access to technology and those who do not
CThe difference between digital and analog signals
DThe partition of a hard disk drive
✅ Correct Answer: B. The digital divide describes the socioeconomic gap between individuals, communities, and countries that have meaningful access to modern information and communication technology and those that do not. This inequality affects educational opportunities, economic participation, and quality of life. Computer ethics principles advocate for equitable and fair access to technology for all people.
Q54

Which practice demonstrates ethical behavior when using computers at work?

AInstalling unauthorized software on company computers
BUsing work computers only for authorized business tasks and respecting company policies
CSharing company login credentials with friends
DAccessing colleagues’ private email accounts
✅ Correct Answer: B. Ethical computer use in the workplace means using organizational IT resources strictly for authorized purposes, following acceptable use policies, protecting confidential information, not installing unapproved software that could introduce security risks, reporting security incidents promptly, and respecting the privacy of colleagues’ digital communications and personal data.
Q55

What is “cyberbullying”?

ATeaching others to use computers assertively
BUsing digital technology to repeatedly harm, intimidate, or humiliate others
CChallenging a friend to a computer game
DPushing someone physically while they use a computer
✅ Correct Answer: B. Cyberbullying involves using digital devices and online platforms — social media, text messages, gaming networks, or email — to repeatedly bully, harass, threaten, humiliate, or spread malicious content about someone. It is particularly harmful to young people and can cause serious psychological distress, depression, and in extreme cases, has contributed to suicide.
Q56

What does “responsible use of AI” require from users and developers?

AUsing AI to make all decisions without human oversight
BEnsuring AI systems are transparent, fair, and do not cause harm to individuals or society
CKeeping AI systems secret from the public
DReplacing all human workers with AI as quickly as possible
✅ Correct Answer: B. Responsible AI use requires developers and users to ensure AI systems operate transparently, avoid bias and discrimination, maintain human oversight, protect privacy, and prioritize safety. Ethical AI frameworks require that these systems benefit society, clearly disclose their limitations, and include mechanisms for accountability when AI decisions cause harm or unfair outcomes.
Q57

What is “encryption” and why is it important for computer security?

AIncreasing a file’s size for extra storage capacity
BConverting data into a coded format so only authorized parties can read it
CTranslating computer code into human language
DCompressing files to save disk space
✅ Correct Answer: B. Encryption transforms readable data (plaintext) into an unreadable scrambled format (ciphertext) using mathematical algorithms. Only someone with the correct decryption key can convert it back to readable form. Encryption protects sensitive data during storage and transmission, ensuring that even if data is intercepted or stolen, attackers cannot read its contents without the key.
Q58

What is two-factor authentication (2FA)?

AUsing two different computer monitors simultaneously
BA security method requiring two separate forms of verification to access an account
CHaving two different passwords for the same account
DLogging into two accounts at the same time
✅ Correct Answer: B. Two-factor authentication (2FA) adds a second layer of security beyond just a password. After entering the correct password, users must also provide a second verification form — such as a one-time code sent via SMS, an authenticator app code, a fingerprint, or a hardware token. Even if a password is stolen, 2FA prevents unauthorized account access.
Q59

What does the principle of “least privilege” in computer security mean?

AGiving all users administrator access to make their work easier
BGranting users only the minimum access and permissions necessary to perform their job
CRestricting all users from accessing the internet
DPaying employees the least amount to reduce costs
✅ Correct Answer: B. The principle of least privilege is a cybersecurity best practice where every user, program, and system component is granted only the minimum level of access rights and permissions needed to perform its intended function. This limits the potential damage from accidental errors, insider threats, or compromised accounts by preventing unnecessary access to sensitive resources.
Q60

Which of the following best describes a “data breach”?

AA scheduled backup of company data
BAn incident where unauthorized individuals gain access to confidential data
CA planned software update that replaces old data
DIntentionally deleting old files to free up storage space
✅ Correct Answer: B. A data breach is a security incident where sensitive, protected, or confidential data is accessed, stolen, or disclosed by unauthorized individuals. Breaches can result from hacking, malware, phishing, insider threats, or accidental exposure. Consequences include identity theft, financial losses, reputational damage, and significant legal penalties under data protection regulations.

Computer Security MCQ Quiz  |  60 Unique Questions Across 8 Topics  |  Click any answer option to reveal the explanation

Scroll to Top