Introduction
Cyber safety is very important for students who use computers and the internet. This Class 7 Cyber Security MCQ with Solutions quiz helps students test their knowledge about online safety, passwords, viruses, and digital protection. These questions are designed according to the Class 7 computer syllabus. By practicing these MCQs, students can improve their understanding of cyber security concepts and prepare better for school exams.

Section 1 — Hackers, Crackers & Cyber Law
Questions 1–20 · Topics: Hackers, Crackers, Cyber Law
1
What is the primary characteristic that defines a hacker?
HackersAA person who only writes malicious software❌
BA person with advanced computer skills who explores and tests system security✅
CA government employee responsible for managing networks❌
DA technician who repairs physical computer hardware❌
✅ Correct Answer: B. A hacker is fundamentally someone who possesses deep technical knowledge of computer systems and uses that expertise to explore, test, and understand security boundaries. Hackers may operate ethically (white hat) or unethically (black hat), but the defining trait is advanced technical skill, not just malicious intent.
2
Which type of hacker works with an organization’s permission to find security vulnerabilities?
HackersABlack Hat Hacker❌
BGrey Hat Hacker❌
CWhite Hat Hacker✅
DScript Kiddie❌
✅ Correct Answer: C. White Hat Hackers, also called ethical hackers or penetration testers, receive explicit permission from organizations before attempting to break into their systems. They document their findings and help close security gaps, making them a valuable part of modern cybersecurity teams. Their work is fully legal and constructive.
3
What does a Black Hat Hacker typically aim to achieve?
HackersAImprove an organization’s cybersecurity posture❌
BObtain a cybersecurity certification❌
CHelp law enforcement agencies track criminals❌
DGain unauthorized access to steal data or cause damage for personal gain✅
✅ Correct Answer: D. Black Hat Hackers operate without permission and with malicious intent. Their goals typically include stealing sensitive data, disrupting services, extorting victims with ransomware, or selling stolen credentials on dark-web markets. These activities are criminal offences under cyber laws in most countries worldwide.
4
A Grey Hat Hacker is best described as someone who:
HackersAAlways works within the law and has official authorization❌
BSometimes breaks rules without malicious intent, often exposing flaws and informing owners✅
COnly uses automated hacking tools without understanding the code❌
DIs an employee who steals data from their own company❌
✅ Correct Answer: B. Grey Hat Hackers fall between ethical and unethical behaviour. They may access systems without permission but do not intend to cause harm. After finding a vulnerability, they often notify the affected organization — sometimes expecting compensation. While their motives can be good, their methods may still be illegal.
5
Which term describes an inexperienced individual who uses pre-made hacking tools without understanding them?
HackersAElite Hacker❌
BHacktivist❌
CScript Kiddie✅
DRed Team Member❌
✅ Correct Answer: C. A Script Kiddie (or “skid”) is a derogatory term for someone who uses scripts or programs created by others to attack computer systems without understanding how those programs work. They lack the deep technical knowledge of true hackers and typically rely on readily available exploits found online.
6
What is a Hacktivist primarily motivated by?
HackersAFinancial profit through data theft❌
BPolitical or social causes and ideological beliefs✅
CGaining certifications in cybersecurity❌
DImproving software performance and speed❌
✅ Correct Answer: B. Hacktivists combine hacking techniques with activism to promote political or social causes. Groups like Anonymous have conducted attacks on government websites, corporations, and institutions to protest policies they disagree with. While their goals may seem noble to some, their hacking activities remain illegal under cybercrime laws.
7
What is the main difference between a hacker and a cracker?
Hackers vs CrackersAHackers use computers while crackers use mobile devices only❌
BCrackers are government-employed while hackers are freelancers❌
CHackers explore systems with skill, often ethically, while crackers break security with malicious criminal intent✅
DHackers only target hardware while crackers focus on software❌
✅ Correct Answer: C. The term “cracker” was originally coined to distinguish malicious intruders from skilled but benign hackers. A cracker intentionally bypasses security measures to steal, destroy, or exploit data for criminal gain. A hacker, in the purest sense, is motivated by curiosity and skill, not criminal intent — though the words are often confused in popular media.
8
Which activity is most commonly associated with a cracker?
CrackersAWriting open-source security patches❌
BTeaching programming to students at universities❌
CBreaking software copy-protection or bypassing authentication illegally✅
DDeveloping antivirus definitions for security companies❌
✅ Correct Answer: C. Crackers are specifically known for breaking software protection mechanisms — such as removing licensing restrictions, bypassing passwords, or disabling security features in programs. This activity is illegal as it violates intellectual property laws and software licensing agreements. The term also extends to unauthorized network intrusions for criminal purposes.
9
What does the term “penetration testing” refer to in cybersecurity?
HackersATesting the physical durability of computer hardware❌
BAn authorized simulated cyber-attack to identify and fix security weaknesses✅
CInstalling a firewall on a network server❌
DThe process of encrypting database files❌
✅ Correct Answer: B. Penetration testing (pen testing) is a proactive security practice where ethical hackers simulate real-world cyber attacks against a target system with full authorization. The goal is to discover and document vulnerabilities before malicious actors exploit them. Organizations use pen test reports to strengthen their defences and prioritize security investments effectively.
10
What is a “phishing” attack?
CrackersAA method to increase internet connection speed❌
BA programming technique for faster database queries❌
CA hardware vulnerability in network switches❌
DA social-engineering attack that tricks users into revealing sensitive credentials via fake messages✅
✅ Correct Answer: D. Phishing is a deceptive technique where attackers impersonate trusted entities — banks, email providers, or employers — through fake emails, websites, or messages to steal usernames, passwords, or financial details. It is one of the most widespread cyber attack methods and exploits human psychology rather than technical vulnerabilities in software.
11
What is Cyber Law?
Cyber LawAA set of regulations governing the manufacturing of electronic devices❌
BRules about the speed limits for internet data transfer❌
CA body of legal rules governing the internet, digital data, and electronic communication activities✅
DPhysical laws of electricity applied to computer circuits❌
✅ Correct Answer: C. Cyber Law (also called IT Law or Internet Law) is the legal framework that governs activities conducted in cyberspace. It covers areas such as online privacy, digital contracts, intellectual property, electronic evidence, hacking, data protection, and cybercrime. Countries enact specific IT Acts to address these matters and protect citizens in the digital world.
12
Why is Cyber Law important in the modern digital world?
Cyber LawAIt reduces the electricity consumption of data centres❌
BIt protects individuals and organizations from cybercrime, data theft, and digital fraud✅
CIt manages the physical cables used for internet infrastructure❌
DIt controls the prices of internet service providers❌
✅ Correct Answer: B. Cyber Law provides a legal structure to address the rapidly growing threats in cyberspace. It defines what constitutes a cybercrime, outlines penalties for offenders, establishes rights for victims, and creates frameworks for digital contracts and privacy. Without Cyber Law, individuals and businesses would have no legal recourse against online crimes and digital exploitation.
13
Which of the following is a recognized example of cybercrime?
Cyber CrimeAUpdating antivirus software on a personal laptop❌
BCreating a personal website to showcase a portfolio❌
CSharing publicly available open-source code on GitHub❌
DIdentity theft by stealing someone’s personal credentials online✅
✅ Correct Answer: D. Identity theft — where a criminal steals personal information such as login credentials, social security numbers, or credit card details to impersonate a victim — is a serious cybercrime. It causes significant financial and reputational harm. Cyber Law specifically criminalizes this activity and provides legal mechanisms for victims to seek justice and compensation.
14
What type of cybercrime involves holding a victim’s data hostage until a payment is made?
Cyber CrimeASpyware Attack❌
BRansomware Attack✅
CSQL Injection❌
DMan-in-the-Middle Attack❌
✅ Correct Answer: B. Ransomware is malicious software that encrypts a victim’s files and demands a ransom — usually in cryptocurrency — for the decryption key. It targets individuals, hospitals, corporations, and even governments. Notable examples include WannaCry and Petya. Cyber Law classifies ransomware deployment as a serious criminal offence with severe legal penalties worldwide.
15
What does “cyberbullying” involve as a form of cybercrime?
Cyber CrimeAUsing computers to hack into financial institutions❌
BDownloading copyrighted movies without permission❌
CUsing digital platforms to harass, threaten, or humiliate individuals repeatedly✅
DCreating duplicate accounts on social media platforms❌
✅ Correct Answer: C. Cyberbullying uses digital tools — social media, messaging apps, emails — to repeatedly harass, intimidate, or humiliate a person. It is especially harmful to young people and can cause severe psychological trauma. Cyber Laws in many countries now criminalize cyberbullying, and platforms are required to report and remove such harmful content promptly.
16
Which law in India specifically addresses cybercrime and electronic commerce?
Cyber LawAThe Indian Penal Code, 1860❌
BThe Constitution of India❌
CThe Information Technology Act, 2000✅
DThe Companies Act, 2013❌
✅ Correct Answer: C. India’s Information Technology Act, 2000 (IT Act) is the primary legislation governing cybercrime, electronic contracts, digital signatures, and data protection. It was amended significantly in 2008 to address emerging threats like data theft, cyber terrorism, and privacy violations. The Act establishes cyber appellate tribunals and outlines penalties for various cyber offences.
17
What is a “Denial of Service” (DoS) attack?
Cyber CrimeAEncrypting personal files on a victim’s hard drive❌
BSecretly monitoring someone’s keystrokes on their keyboard❌
CCopying files from a remote server without permission❌
DOverwhelming a server with traffic to make a service unavailable to legitimate users✅
✅ Correct Answer: D. A DoS attack floods a server, network, or service with excessive requests, consuming all available resources so that legitimate users cannot access the service. A Distributed DoS (DDoS) attack uses multiple compromised computers (botnets) to amplify the traffic. Both forms are illegal under Cyber Law and can cause enormous financial damage to businesses.
18
What is “intellectual property” in the context of Cyber Law?
Cyber LawAPhysical property owned by technology companies❌
BCreations of the mind — such as software, music, or text — protected by copyright and patents online✅
CHardware patents registered by semiconductor companies❌
DIntelligence reports produced by government agencies❌
✅ Correct Answer: B. In Cyber Law, intellectual property refers to original creative works in digital form — including software code, music, eBooks, videos, and websites — that are protected by copyright, trademarks, or patents. Unauthorized copying, distribution, or reproduction of these works online constitutes digital piracy, which is a criminal and civil offence under IT and copyright laws.
19
What is “cyber stalking”?
Cyber CrimeATracking CPU performance using monitoring software❌
BAnalysing network traffic for security purposes❌
CUsing the internet to persistently follow, monitor, or harass an individual, causing fear✅
DMonitoring employee productivity on company computers❌
✅ Correct Answer: C. Cyber stalking involves the repeated use of digital technology — emails, social media, GPS, or spyware — to track, follow, or intimidate an individual. It instils fear and distress in the victim. Cyber Law recognizes it as a criminal activity separate from traditional stalking, with penalties including fines and imprisonment to protect victims’ safety and digital privacy.
20
Which international convention serves as a key framework for combating cybercrime across countries?
Cyber LawAThe Geneva Convention❌
BThe Kyoto Protocol❌
CThe Budapest Convention on Cybercrime✅
DThe Paris Agreement on Digital Security❌
✅ Correct Answer: C. The Budapest Convention on Cybercrime (2001), developed by the Council of Europe, is the first binding international treaty on cybercrime. It harmonizes national laws, improves investigative techniques, and enhances international cooperation for prosecuting cybercriminals. Over 60 countries have ratified it, making it the most significant global legal framework in cybercrime enforcement today.
Section 2 — Backup, Restore & Data Safety
Questions 21–40 · Topics: Backup, Devices, Restore, Importance
21
What is a data backup?
BackupAThe process of permanently deleting old files to free up storage space❌
BA copy of data stored separately so it can be recovered in case of loss or damage✅
CA method to increase the speed of a computer processor❌
DAn encryption technique to protect data from hackers❌
✅ Correct Answer: B. A data backup is a duplicate copy of data stored on a separate medium or location — such as an external drive, cloud server, or tape — so that the original data can be recovered if it is lost, corrupted, accidentally deleted, or destroyed by events like hardware failure, ransomware, or natural disasters. Regular backups are a fundamental pillar of any data protection strategy.
22
What is a “full backup”?
BackupAA backup that only stores files changed since the last backup❌
BA backup that stores only newly created files since the last full backup❌
CA complete copy of all data in a system at a specific point in time✅
DA backup that stores only system configuration files❌
✅ Correct Answer: C. A full backup creates a complete copy of every selected file, folder, and system data at a particular moment. Although it requires the most storage space and takes the longest to complete, it is the simplest to restore from because all data resides in a single backup set. Organizations typically perform full backups weekly and supplement them with incremental or differential backups on other days.
23
What distinguishes an incremental backup from a full backup?
BackupAIncremental backup stores all data, while full backup stores only changed data❌
BIncremental backup saves only data changed since the last backup, making it faster and smaller✅
CIncremental backup runs only once a year while full backup runs daily❌
DIncremental backup stores data on physical tapes only❌
✅ Correct Answer: B. An incremental backup captures only the data that has changed since the most recent backup — whether that was a full or another incremental backup. This makes each backup job faster and requires far less storage. However, restoring data requires the full backup plus every subsequent incremental backup, making the restoration process more complex and time-consuming compared to restoring a full backup alone.
24
Which device is most commonly used as an external backup storage medium?
Backup DevicesAMonitor❌
BKeyboard❌
CExternal Hard Drive✅
DGraphics Processing Unit (GPU)❌
✅ Correct Answer: C. External hard drives are among the most popular and cost-effective backup devices for individuals and small businesses. They connect via USB or other interfaces, offer large storage capacities (up to several terabytes), and allow users to store copies of entire systems offline. Being portable and affordable, they serve as excellent first-line backup solutions when maintained separately from the primary computer.
25
What is cloud backup?
Backup DevicesAStoring data on a computer’s internal hard disk drive❌
BUploading files to a local network-attached storage (NAS) device❌
CSending data over the internet to remote servers managed by a third-party provider✅
DPrinting documents as a physical paper-based archive❌
✅ Correct Answer: C. Cloud backup transmits data over the internet to secure servers operated by providers like Google Drive, OneDrive, Dropbox, or Amazon S3. It offers off-site protection, automatic scheduling, and accessibility from any device. Cloud backup is especially valuable for disaster recovery scenarios where local devices (including external drives) may be physically destroyed or stolen alongside the primary system.
26
What is a USB flash drive primarily used for in terms of data management?
Backup DevicesAIncreasing RAM capacity of a desktop computer❌
BConnecting a computer to a network router wirelessly❌
CBoosting the computer’s processing speed during tasks❌
DPortable storage and transfer of files between computers or as a small backup device✅
✅ Correct Answer: D. USB flash drives (pen drives or thumb drives) are compact, portable storage devices that plug into a USB port. They are widely used to carry and transfer files between computers and serve as convenient backup media for smaller volumes of data. While not ideal for large-scale enterprise backups, they are practical for personal document backups and transporting data between locations.
27
What is a magnetic tape used for in enterprise backup environments?
Backup DevicesAConnecting monitors to graphics cards in high-performance systems❌
BLong-term, high-capacity, cost-effective archiving of large volumes of data✅
CRunning operating systems in virtual machine environments❌
DStreaming high-definition video content to users❌
✅ Correct Answer: B. Magnetic tape remains one of the most cost-effective solutions for archiving enormous volumes of data over the long term in enterprise environments. Despite being slower to access than disk-based backups, modern tape cartridges (like LTO) offer massive capacities, low cost per gigabyte, and longevity of 30+ years. Banks, governments, and cloud providers still rely on tape for offline cold storage and disaster recovery archives.
28
What does “data restore” mean?
RestoreAThe process of encrypting data to prevent unauthorized access❌
BPermanently removing duplicate files from a storage device❌
CRetrieving and reinstating data from a backup after it has been lost or corrupted✅
DCompressing files to reduce the size of a hard drive❌
✅ Correct Answer: C. Data restore is the complementary process to backup — it involves accessing stored backup copies and returning them to their original location or an alternate system to make data usable again. Restoring data is critical after events like accidental deletion, hardware failure, ransomware attacks, or data corruption. Without a reliable restore process, even the best backup is useless in a real emergency.
29
What is the “3-2-1 backup rule”?
BackupABack up data 3 times a day, keep 2 versions, and delete 1 copy weekly❌
BKeep 3 copies of data, on 2 different media types, with 1 copy stored off-site✅
CUse 3 cloud providers, 2 local drives, and 1 USB stick simultaneously❌
DEncrypt data 3 times using 2 algorithms and store on 1 external drive❌
✅ Correct Answer: B. The 3-2-1 backup strategy is a widely recommended best practice: maintain 3 total copies of your data, stored on 2 different types of media (e.g., hard drive and cloud), with 1 copy kept off-site. This approach protects against multiple simultaneous failure scenarios — local hardware failure, site-level disasters (fire/flood), and media-specific issues — ensuring maximum data resilience and recoverability.
30
Why should you store a backup copy in an off-site location?
Importance of BackupATo reduce the cost of purchasing new storage devices❌
BTo allow faster retrieval of files during normal operation❌
CTo protect data from physical disasters — such as fire or flood — that destroy local devices✅
DTo comply with internet speed regulations set by ISPs❌
✅ Correct Answer: C. Storing a backup off-site — whether at another physical location or in the cloud — ensures survival of your data even if the primary site is completely destroyed by fire, flooding, earthquake, theft, or another catastrophic event. If both the original and backup are at the same location, a single disaster could destroy everything. Geographic separation is a non-negotiable element of robust disaster recovery planning.
31
What is a NAS (Network Attached Storage) device used for?
Backup DevicesABoosting Wi-Fi signal strength in a home network❌
BProcessing graphics for video games in real time❌
CCentralized data storage accessible by multiple users over a local network, commonly used for backups✅
DScanning documents and converting them to digital formats❌
✅ Correct Answer: C. A NAS device is a dedicated file storage system connected to a network, allowing multiple computers and users to access and store data from a central location. It is ideal for home offices and small businesses as a local backup target. Users can configure automated backup jobs to run regularly, ensuring all connected machines continuously protect their data to the shared NAS storage pool.
32
What is “disaster recovery” in the context of data management?
RestoreAA strategy to prevent power surges from damaging computer equipment❌
BA type of antivirus software designed to remove malware after infection❌
CA set of policies and tools to restore IT systems and data after a major disruptive event✅
DA process of repairing damaged physical storage media❌
✅ Correct Answer: C. Disaster Recovery (DR) encompasses the strategies, processes, and technologies organizations use to resume normal operations after catastrophic events — cyberattacks, natural disasters, or system failures. A DR plan outlines Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs), defining how quickly systems must be restored and how much data loss is acceptable to keep business continuity intact.
33
What does RTO stand for in disaster recovery?
RestoreAReal Time Operations❌
BRedundant Transfer Option❌
CRemote Terminal Output❌
DRecovery Time Objective — the maximum acceptable time to restore a system after failure✅
✅ Correct Answer: D. Recovery Time Objective (RTO) defines the maximum duration of time within which a business process must be restored after a disaster to avoid unacceptable consequences. For example, a hospital may set an RTO of 1 hour for patient record systems. A shorter RTO requires more investment in redundant systems and faster backup infrastructure to meet the target restoration timeline effectively.
34
Which scenario best illustrates the importance of having a recent backup?
Importance of BackupAA user wants to share photos on social media platforms❌
BA student wants to increase their internet browsing speed❌
CA company’s server crashes and all customer records are lost, requiring urgent recovery✅
DA user needs to transfer files to a colleague via email❌
✅ Correct Answer: C. When a company’s server crashes and destroys customer records, the only way to recover is from a backup. This scenario demonstrates the mission-critical importance of backups for business continuity. Without a recent backup, the company faces permanent data loss, legal liability, regulatory fines, and severe reputational damage — costs that far outweigh the investment of a good backup strategy.
35
What is a “differential backup”?
BackupAA backup that stores only files smaller than 1 MB❌
BA backup that saves all data changed since the last full backup, regardless of prior differentials✅
CA backup that separates user files from operating system files❌
DA backup that stores data in two different file formats simultaneously❌
✅ Correct Answer: B. A differential backup captures all changes made since the last full backup — regardless of whether another differential was taken in between. This makes it faster to restore than incremental backups (you only need the full backup plus the latest differential), but differential backups grow progressively larger over time as more changes accumulate since the last full backup cycle was performed.
36
What happens during a system restore point recovery in Windows?
RestoreAThe operating system reinstalls all user-installed applications automatically❌
BAll personal files and documents are permanently deleted from the system❌
CWindows reverts system files, settings, and the registry to a previously saved stable state✅
DThe system connects to a remote server and downloads a fresh Windows installation❌
✅ Correct Answer: C. Windows System Restore reverts the operating system’s configuration — including system files, installed programs, and the Windows registry — to a snapshot taken at an earlier restore point. Importantly, it does not affect personal files such as documents, photos, or emails. This feature is useful for undoing harmful system changes caused by faulty software installations or problematic Windows updates.
37
Why is it critical to test your backup regularly?
Importance of BackupATesting backups reduces the storage space they occupy❌
BTested backups encrypt data more securely than untested ones❌
CTo confirm that data can actually be restored successfully — a corrupt backup is useless in a crisis✅
DTesting backups speeds up the original system’s performance❌
✅ Correct Answer: C. Many organizations discover their backups are corrupt, incomplete, or unrestorable only when a real disaster strikes — the worst possible moment to find out. Regular restore tests verify that backup processes work correctly, data integrity is maintained, and recovery procedures succeed within acceptable time frames. Untested backups provide a false sense of security and can fail completely when you need them most.
38
What does RPO (Recovery Point Objective) define?
RestoreAThe maximum number of backup copies to retain on a device❌
BThe minimum internet speed required for cloud backup uploads❌
CThe maximum acceptable amount of data loss measured in time from the last successful backup✅
DThe physical distance data must travel to reach the off-site storage location❌
✅ Correct Answer: C. Recovery Point Objective (RPO) defines the maximum amount of data loss a business can tolerate, expressed as a time interval. For example, an RPO of 4 hours means the organization must back up data at least every 4 hours, so that in the event of failure, no more than 4 hours of work is permanently lost. A stricter RPO (closer to zero) demands more frequent backups and higher infrastructure investment.
39
What is an optical disc (such as a DVD) used for in backup scenarios?
Backup DevicesASending large data packets across wide-area networks❌
BStoring relatively small, infrequently changed data archives as read-only physical media✅
CIncreasing a computer’s RAM for improved multitasking performance❌
DConnecting printers to computers via wireless signals❌
✅ Correct Answer: B. Optical discs — including CDs, DVDs, and Blu-ray discs — are used for archiving small to medium volumes of data as read-only or write-once media. Their physical nature makes them immune to malware (ransomware cannot encrypt a completed disc). Though largely replaced by cloud and external drives for everyday backups, optical discs still serve archival purposes in libraries, legal archives, and long-term data preservation projects.
40
A school loses all student records due to a virus attack. Which lesson about backup does this example best demonstrate?
Importance of BackupASchools should not store any data digitally❌
BAntivirus software alone guarantees complete data protection without backups❌
COnly government organizations need backup systems❌
DAll organizations must maintain regular, tested backups to protect critical data from unexpected threats✅
✅ Correct Answer: D. This scenario powerfully illustrates that any organization — regardless of size — is vulnerable to data loss from malware, hardware failure, or human error. The school’s loss of student records demonstrates that backups are not optional extras but essential safeguards. Regular, tested backups stored securely would have enabled the school to restore all student data quickly, avoiding disruption to education and administrative processes.
·
