Computer Siksha

Class 7 Cyber Security MCQ with Solutions

Introduction

Cyber safety is very important for students who use computers and the internet. This Class 7 Cyber Security MCQ with Solutions quiz helps students test their knowledge about online safety, passwords, viruses, and digital protection. These questions are designed according to the Class 7 computer syllabus. By practicing these MCQs, students can improve their understanding of cyber security concepts and prepare better for school exams.

Class 7 Cyber Security MCQ with Solutions

Cybersecurity & IT Concepts — MCQ Quiz
📚 Cybersecurity & IT Fundamentals

Master Cyber Concepts
with Smart MCQs

Test your understanding of Hackers, Crackers, Cyber Law, and Backup & Restore with 40 carefully crafted questions.

40Questions
4Topics
2Sections
Retries
0 / 40
Score: 0
🎉
Quiz Complete!
0 / 40
Keep practising to improve your score.
1
1
What is the primary characteristic that defines a hacker?
Hackers
AA person who only writes malicious software
BA person with advanced computer skills who explores and tests system security
CA government employee responsible for managing networks
DA technician who repairs physical computer hardware
✅ Correct Answer: B. A hacker is fundamentally someone who possesses deep technical knowledge of computer systems and uses that expertise to explore, test, and understand security boundaries. Hackers may operate ethically (white hat) or unethically (black hat), but the defining trait is advanced technical skill, not just malicious intent.
2
Which type of hacker works with an organization’s permission to find security vulnerabilities?
Hackers
ABlack Hat Hacker
BGrey Hat Hacker
CWhite Hat Hacker
DScript Kiddie
✅ Correct Answer: C. White Hat Hackers, also called ethical hackers or penetration testers, receive explicit permission from organizations before attempting to break into their systems. They document their findings and help close security gaps, making them a valuable part of modern cybersecurity teams. Their work is fully legal and constructive.
3
What does a Black Hat Hacker typically aim to achieve?
Hackers
AImprove an organization’s cybersecurity posture
BObtain a cybersecurity certification
CHelp law enforcement agencies track criminals
DGain unauthorized access to steal data or cause damage for personal gain
✅ Correct Answer: D. Black Hat Hackers operate without permission and with malicious intent. Their goals typically include stealing sensitive data, disrupting services, extorting victims with ransomware, or selling stolen credentials on dark-web markets. These activities are criminal offences under cyber laws in most countries worldwide.
4
A Grey Hat Hacker is best described as someone who:
Hackers
AAlways works within the law and has official authorization
BSometimes breaks rules without malicious intent, often exposing flaws and informing owners
COnly uses automated hacking tools without understanding the code
DIs an employee who steals data from their own company
✅ Correct Answer: B. Grey Hat Hackers fall between ethical and unethical behaviour. They may access systems without permission but do not intend to cause harm. After finding a vulnerability, they often notify the affected organization — sometimes expecting compensation. While their motives can be good, their methods may still be illegal.
5
Which term describes an inexperienced individual who uses pre-made hacking tools without understanding them?
Hackers
AElite Hacker
BHacktivist
CScript Kiddie
DRed Team Member
✅ Correct Answer: C. A Script Kiddie (or “skid”) is a derogatory term for someone who uses scripts or programs created by others to attack computer systems without understanding how those programs work. They lack the deep technical knowledge of true hackers and typically rely on readily available exploits found online.
6
What is a Hacktivist primarily motivated by?
Hackers
AFinancial profit through data theft
BPolitical or social causes and ideological beliefs
CGaining certifications in cybersecurity
DImproving software performance and speed
✅ Correct Answer: B. Hacktivists combine hacking techniques with activism to promote political or social causes. Groups like Anonymous have conducted attacks on government websites, corporations, and institutions to protest policies they disagree with. While their goals may seem noble to some, their hacking activities remain illegal under cybercrime laws.
7
What is the main difference between a hacker and a cracker?
Hackers vs Crackers
AHackers use computers while crackers use mobile devices only
BCrackers are government-employed while hackers are freelancers
CHackers explore systems with skill, often ethically, while crackers break security with malicious criminal intent
DHackers only target hardware while crackers focus on software
✅ Correct Answer: C. The term “cracker” was originally coined to distinguish malicious intruders from skilled but benign hackers. A cracker intentionally bypasses security measures to steal, destroy, or exploit data for criminal gain. A hacker, in the purest sense, is motivated by curiosity and skill, not criminal intent — though the words are often confused in popular media.
8
Which activity is most commonly associated with a cracker?
Crackers
AWriting open-source security patches
BTeaching programming to students at universities
CBreaking software copy-protection or bypassing authentication illegally
DDeveloping antivirus definitions for security companies
✅ Correct Answer: C. Crackers are specifically known for breaking software protection mechanisms — such as removing licensing restrictions, bypassing passwords, or disabling security features in programs. This activity is illegal as it violates intellectual property laws and software licensing agreements. The term also extends to unauthorized network intrusions for criminal purposes.
9
What does the term “penetration testing” refer to in cybersecurity?
Hackers
ATesting the physical durability of computer hardware
BAn authorized simulated cyber-attack to identify and fix security weaknesses
CInstalling a firewall on a network server
DThe process of encrypting database files
✅ Correct Answer: B. Penetration testing (pen testing) is a proactive security practice where ethical hackers simulate real-world cyber attacks against a target system with full authorization. The goal is to discover and document vulnerabilities before malicious actors exploit them. Organizations use pen test reports to strengthen their defences and prioritize security investments effectively.
10
What is a “phishing” attack?
Crackers
AA method to increase internet connection speed
BA programming technique for faster database queries
CA hardware vulnerability in network switches
DA social-engineering attack that tricks users into revealing sensitive credentials via fake messages
✅ Correct Answer: D. Phishing is a deceptive technique where attackers impersonate trusted entities — banks, email providers, or employers — through fake emails, websites, or messages to steal usernames, passwords, or financial details. It is one of the most widespread cyber attack methods and exploits human psychology rather than technical vulnerabilities in software.
11
What is Cyber Law?
Cyber Law
AA set of regulations governing the manufacturing of electronic devices
BRules about the speed limits for internet data transfer
CA body of legal rules governing the internet, digital data, and electronic communication activities
DPhysical laws of electricity applied to computer circuits
✅ Correct Answer: C. Cyber Law (also called IT Law or Internet Law) is the legal framework that governs activities conducted in cyberspace. It covers areas such as online privacy, digital contracts, intellectual property, electronic evidence, hacking, data protection, and cybercrime. Countries enact specific IT Acts to address these matters and protect citizens in the digital world.
12
Why is Cyber Law important in the modern digital world?
Cyber Law
AIt reduces the electricity consumption of data centres
BIt protects individuals and organizations from cybercrime, data theft, and digital fraud
CIt manages the physical cables used for internet infrastructure
DIt controls the prices of internet service providers
✅ Correct Answer: B. Cyber Law provides a legal structure to address the rapidly growing threats in cyberspace. It defines what constitutes a cybercrime, outlines penalties for offenders, establishes rights for victims, and creates frameworks for digital contracts and privacy. Without Cyber Law, individuals and businesses would have no legal recourse against online crimes and digital exploitation.
13
Which of the following is a recognized example of cybercrime?
Cyber Crime
AUpdating antivirus software on a personal laptop
BCreating a personal website to showcase a portfolio
CSharing publicly available open-source code on GitHub
DIdentity theft by stealing someone’s personal credentials online
✅ Correct Answer: D. Identity theft — where a criminal steals personal information such as login credentials, social security numbers, or credit card details to impersonate a victim — is a serious cybercrime. It causes significant financial and reputational harm. Cyber Law specifically criminalizes this activity and provides legal mechanisms for victims to seek justice and compensation.
14
What type of cybercrime involves holding a victim’s data hostage until a payment is made?
Cyber Crime
ASpyware Attack
BRansomware Attack
CSQL Injection
DMan-in-the-Middle Attack
✅ Correct Answer: B. Ransomware is malicious software that encrypts a victim’s files and demands a ransom — usually in cryptocurrency — for the decryption key. It targets individuals, hospitals, corporations, and even governments. Notable examples include WannaCry and Petya. Cyber Law classifies ransomware deployment as a serious criminal offence with severe legal penalties worldwide.
15
What does “cyberbullying” involve as a form of cybercrime?
Cyber Crime
AUsing computers to hack into financial institutions
BDownloading copyrighted movies without permission
CUsing digital platforms to harass, threaten, or humiliate individuals repeatedly
DCreating duplicate accounts on social media platforms
✅ Correct Answer: C. Cyberbullying uses digital tools — social media, messaging apps, emails — to repeatedly harass, intimidate, or humiliate a person. It is especially harmful to young people and can cause severe psychological trauma. Cyber Laws in many countries now criminalize cyberbullying, and platforms are required to report and remove such harmful content promptly.
16
Which law in India specifically addresses cybercrime and electronic commerce?
Cyber Law
AThe Indian Penal Code, 1860
BThe Constitution of India
CThe Information Technology Act, 2000
DThe Companies Act, 2013
✅ Correct Answer: C. India’s Information Technology Act, 2000 (IT Act) is the primary legislation governing cybercrime, electronic contracts, digital signatures, and data protection. It was amended significantly in 2008 to address emerging threats like data theft, cyber terrorism, and privacy violations. The Act establishes cyber appellate tribunals and outlines penalties for various cyber offences.
17
What is a “Denial of Service” (DoS) attack?
Cyber Crime
AEncrypting personal files on a victim’s hard drive
BSecretly monitoring someone’s keystrokes on their keyboard
CCopying files from a remote server without permission
DOverwhelming a server with traffic to make a service unavailable to legitimate users
✅ Correct Answer: D. A DoS attack floods a server, network, or service with excessive requests, consuming all available resources so that legitimate users cannot access the service. A Distributed DoS (DDoS) attack uses multiple compromised computers (botnets) to amplify the traffic. Both forms are illegal under Cyber Law and can cause enormous financial damage to businesses.
18
What is “intellectual property” in the context of Cyber Law?
Cyber Law
APhysical property owned by technology companies
BCreations of the mind — such as software, music, or text — protected by copyright and patents online
CHardware patents registered by semiconductor companies
DIntelligence reports produced by government agencies
✅ Correct Answer: B. In Cyber Law, intellectual property refers to original creative works in digital form — including software code, music, eBooks, videos, and websites — that are protected by copyright, trademarks, or patents. Unauthorized copying, distribution, or reproduction of these works online constitutes digital piracy, which is a criminal and civil offence under IT and copyright laws.
19
What is “cyber stalking”?
Cyber Crime
ATracking CPU performance using monitoring software
BAnalysing network traffic for security purposes
CUsing the internet to persistently follow, monitor, or harass an individual, causing fear
DMonitoring employee productivity on company computers
✅ Correct Answer: C. Cyber stalking involves the repeated use of digital technology — emails, social media, GPS, or spyware — to track, follow, or intimidate an individual. It instils fear and distress in the victim. Cyber Law recognizes it as a criminal activity separate from traditional stalking, with penalties including fines and imprisonment to protect victims’ safety and digital privacy.
20
Which international convention serves as a key framework for combating cybercrime across countries?
Cyber Law
AThe Geneva Convention
BThe Kyoto Protocol
CThe Budapest Convention on Cybercrime
DThe Paris Agreement on Digital Security
✅ Correct Answer: C. The Budapest Convention on Cybercrime (2001), developed by the Council of Europe, is the first binding international treaty on cybercrime. It harmonizes national laws, improves investigative techniques, and enhances international cooperation for prosecuting cybercriminals. Over 60 countries have ratified it, making it the most significant global legal framework in cybercrime enforcement today.
2
21
What is a data backup?
Backup
AThe process of permanently deleting old files to free up storage space
BA copy of data stored separately so it can be recovered in case of loss or damage
CA method to increase the speed of a computer processor
DAn encryption technique to protect data from hackers
✅ Correct Answer: B. A data backup is a duplicate copy of data stored on a separate medium or location — such as an external drive, cloud server, or tape — so that the original data can be recovered if it is lost, corrupted, accidentally deleted, or destroyed by events like hardware failure, ransomware, or natural disasters. Regular backups are a fundamental pillar of any data protection strategy.
22
What is a “full backup”?
Backup
AA backup that only stores files changed since the last backup
BA backup that stores only newly created files since the last full backup
CA complete copy of all data in a system at a specific point in time
DA backup that stores only system configuration files
✅ Correct Answer: C. A full backup creates a complete copy of every selected file, folder, and system data at a particular moment. Although it requires the most storage space and takes the longest to complete, it is the simplest to restore from because all data resides in a single backup set. Organizations typically perform full backups weekly and supplement them with incremental or differential backups on other days.
23
What distinguishes an incremental backup from a full backup?
Backup
AIncremental backup stores all data, while full backup stores only changed data
BIncremental backup saves only data changed since the last backup, making it faster and smaller
CIncremental backup runs only once a year while full backup runs daily
DIncremental backup stores data on physical tapes only
✅ Correct Answer: B. An incremental backup captures only the data that has changed since the most recent backup — whether that was a full or another incremental backup. This makes each backup job faster and requires far less storage. However, restoring data requires the full backup plus every subsequent incremental backup, making the restoration process more complex and time-consuming compared to restoring a full backup alone.
24
Which device is most commonly used as an external backup storage medium?
Backup Devices
AMonitor
BKeyboard
CExternal Hard Drive
DGraphics Processing Unit (GPU)
✅ Correct Answer: C. External hard drives are among the most popular and cost-effective backup devices for individuals and small businesses. They connect via USB or other interfaces, offer large storage capacities (up to several terabytes), and allow users to store copies of entire systems offline. Being portable and affordable, they serve as excellent first-line backup solutions when maintained separately from the primary computer.
25
What is cloud backup?
Backup Devices
AStoring data on a computer’s internal hard disk drive
BUploading files to a local network-attached storage (NAS) device
CSending data over the internet to remote servers managed by a third-party provider
DPrinting documents as a physical paper-based archive
✅ Correct Answer: C. Cloud backup transmits data over the internet to secure servers operated by providers like Google Drive, OneDrive, Dropbox, or Amazon S3. It offers off-site protection, automatic scheduling, and accessibility from any device. Cloud backup is especially valuable for disaster recovery scenarios where local devices (including external drives) may be physically destroyed or stolen alongside the primary system.
26
What is a USB flash drive primarily used for in terms of data management?
Backup Devices
AIncreasing RAM capacity of a desktop computer
BConnecting a computer to a network router wirelessly
CBoosting the computer’s processing speed during tasks
DPortable storage and transfer of files between computers or as a small backup device
✅ Correct Answer: D. USB flash drives (pen drives or thumb drives) are compact, portable storage devices that plug into a USB port. They are widely used to carry and transfer files between computers and serve as convenient backup media for smaller volumes of data. While not ideal for large-scale enterprise backups, they are practical for personal document backups and transporting data between locations.
27
What is a magnetic tape used for in enterprise backup environments?
Backup Devices
AConnecting monitors to graphics cards in high-performance systems
BLong-term, high-capacity, cost-effective archiving of large volumes of data
CRunning operating systems in virtual machine environments
DStreaming high-definition video content to users
✅ Correct Answer: B. Magnetic tape remains one of the most cost-effective solutions for archiving enormous volumes of data over the long term in enterprise environments. Despite being slower to access than disk-based backups, modern tape cartridges (like LTO) offer massive capacities, low cost per gigabyte, and longevity of 30+ years. Banks, governments, and cloud providers still rely on tape for offline cold storage and disaster recovery archives.
28
What does “data restore” mean?
Restore
AThe process of encrypting data to prevent unauthorized access
BPermanently removing duplicate files from a storage device
CRetrieving and reinstate data from a backup after it has been lost or corrupted
DCompressing files to reduce the size of a hard drive
✅ Correct Answer: C. Data restore is the complementary process to backup — it involves accessing stored backup copies and returning them to their original location or an alternate system to make data usable again. Restoring data is critical after events like accidental deletion, hardware failure, ransomware attacks, or data corruption. Without a reliable restore process, even the best backup is useless in a real emergency.
29
What is the “3-2-1 backup rule”?
Backup
ABack up data 3 times a day, keep 2 versions, and delete 1 copy weekly
BKeep 3 copies of data, on 2 different media types, with 1 copy stored off-site
CUse 3 cloud providers, 2 local drives, and 1 USB stick simultaneously
DEncrypt data 3 times using 2 algorithms and store on 1 external drive
✅ Correct Answer: B. The 3-2-1 backup strategy is a widely recommended best practice: maintain 3 total copies of your data, stored on 2 different types of media (e.g., hard drive and cloud), with 1 copy kept off-site. This approach protects against multiple simultaneous failure scenarios — local hardware failure, site-level disasters (fire/flood), and media-specific issues — ensuring maximum data resilience and recoverability.
30
Why should you store a backup copy in an off-site location?
Importance of Backup
ATo reduce the cost of purchasing new storage devices
BTo allow faster retrieval of files during normal operation
CTo protect data from physical disasters — such as fire or flood — that destroy local devices
DTo comply with internet speed regulations set by ISPs
✅ Correct Answer: C. Storing a backup off-site — whether at another physical location or in the cloud — ensures survival of your data even if the primary site is completely destroyed by fire, flooding, earthquake, theft, or another catastrophic event. If both the original and backup are at the same location, a single disaster could destroy everything. Geographic separation is a non-negotiable element of robust disaster recovery planning.
31
What is a NAS (Network Attached Storage) device used for?
Backup Devices
ABoosting Wi-Fi signal strength in a home network
BProcessing graphics for video games in real time
CCentralized data storage accessible by multiple users over a local network, commonly used for backups
DScanning documents and converting them to digital formats
✅ Correct Answer: C. A NAS device is a dedicated file storage system connected to a network, allowing multiple computers and users to access and store data from a central location. It is ideal for home offices and small businesses as a local backup target. Users can configure automated backup jobs to run regularly, ensuring all connected machines continuously protect their data to the shared NAS storage pool.
32
What is “disaster recovery” in the context of data management?
Restore
AA strategy to prevent power surges from damaging computer equipment
BA type of antivirus software designed to remove malware after infection
CA set of policies and tools to restore IT systems and data after a major disruptive event
DA process of repairing damaged physical storage media
✅ Correct Answer: C. Disaster Recovery (DR) encompasses the strategies, processes, and technologies organizations use to resume normal operations after catastrophic events — cyberattacks, natural disasters, or system failures. A DR plan outlines Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs), defining how quickly systems must be restored and how much data loss is acceptable to keep business continuity intact.
33
What does RTO stand for in disaster recovery?
Restore
AReal Time Operations
BRedundant Transfer Option
CRemote Terminal Output
DRecovery Time Objective — the maximum acceptable time to restore a system after failure
✅ Correct Answer: D. Recovery Time Objective (RTO) defines the maximum duration of time within which a business process must be restored after a disaster to avoid unacceptable consequences. For example, a hospital may set an RTO of 1 hour for patient record systems. A shorter RTO requires more investment in redundant systems and faster backup infrastructure to meet the target restoration timeline effectively.
34
Which scenario best illustrates the importance of having a recent backup?
Importance of Backup
AA user wants to share photos on social media platforms
BA student wants to increase their internet browsing speed
CA company’s server crashes and all customer records are lost, requiring urgent recovery
DA user needs to transfer files to a colleague via email
✅ Correct Answer: C. When a company’s server crashes and destroys customer records, the only way to recover is from a backup. This scenario demonstrates the mission-critical importance of backups for business continuity. Without a recent backup, the company faces permanent data loss, legal liability, regulatory fines, and severe reputational damage — costs that far outweigh the investment of a good backup strategy.
35
What is a “differential backup”?
Backup
AA backup that stores only files smaller than 1 MB
BA backup that saves all data changed since the last full backup, regardless of prior differentials
CA backup that separates user files from operating system files
DA backup that stores data in two different file formats simultaneously
✅ Correct Answer: B. A differential backup captures all changes made since the last full backup — regardless of whether another differential was taken in between. This makes it faster to restore than incremental backups (you only need the full backup plus the latest differential), but differential backups grow progressively larger over time as more changes accumulate since the last full backup cycle was performed.
36
What happens during a system restore point recovery in Windows?
Restore
AThe operating system reinstalls all user-installed applications automatically
BAll personal files and documents are permanently deleted from the system
CWindows reverts system files, settings, and the registry to a previously saved stable state
DThe system connects to a remote server and downloads a fresh Windows installation
✅ Correct Answer: C. Windows System Restore reverts the operating system’s configuration — including system files, installed programs, and the Windows registry — to a snapshot taken at an earlier restore point. Importantly, it does not affect personal files such as documents, photos, or emails. This feature is useful for undoing harmful system changes caused by faulty software installations or problematic Windows updates.
37
Why is it critical to test your backup regularly?
Importance of Backup
ATesting backups reduces the storage space they occupy
BTested backups encrypt data more securely than untested ones
CTo confirm that data can actually be restored successfully — a corrupt backup is useless in a crisis
DTesting backups speeds up the original system’s performance
✅ Correct Answer: C. Many organizations discover their backups are corrupt, incomplete, or unrestorable only when a real disaster strikes — the worst possible moment to find out. Regular restore tests verify that backup processes work correctly, data integrity is maintained, and recovery procedures succeed within acceptable time frames. Untested backups provide a false sense of security and can fail completely when you need them most.
38
What does RPO (Recovery Point Objective) define?
Restore
AThe maximum number of backup copies to retain on a device
BThe minimum internet speed required for cloud backup uploads
CThe maximum acceptable amount of data loss measured in time from the last successful backup
DThe physical distance data must travel to reach the off-site storage location
✅ Correct Answer: C. Recovery Point Objective (RPO) defines the maximum amount of data loss a business can tolerate, expressed as a time interval. For example, an RPO of 4 hours means the organization must back up data at least every 4 hours, so that in the event of failure, no more than 4 hours of work is permanently lost. A stricter RPO (closer to zero) demands more frequent backups and higher infrastructure investment.
39
What is an optical disc (such as a DVD) used for in backup scenarios?
Backup Devices
ASending large data packets across wide-area networks
BStoring relatively small, infrequently changed data archives as read-only physical media
CIncreasing a computer’s RAM for improved multitasking performance
DConnecting printers to computers via wireless signals
✅ Correct Answer: B. Optical discs — including CDs, DVDs, and Blu-ray discs — are used for archiving small to medium volumes of data as read-only or write-once media. Their physical nature makes them immune to malware (ransomware cannot encrypt a completed disc). Though largely replaced by cloud and external drives for everyday backups, optical discs still serve archival purposes in libraries, legal archives, and long-term data preservation projects.
40
A school loses all student records due to a virus attack. Which lesson about backup does this example best demonstrate?
Importance of Backup
ASchools should not store any data digitally
BAntivirus software alone guarantees complete data protection without backups
COnly government organizations need backup systems
DAll organizations must maintain regular, tested backups to protect critical data from unexpected threats
✅ Correct Answer: D. This scenario powerfully illustrates that any organization — regardless of size — is vulnerable to data loss from malware, hardware failure, or human error. The school’s loss of student records demonstrates that backups are not optional extras but essential safeguards. Regular, tested backups stored securely would have enabled the school to restore all student data quickly, avoiding disruption to education and administrative processes.
·

Cybersecurity & IT Concepts MCQ Quiz  ·  40 Questions  ·  4 Topics  ·  Designed for students and learners

Scroll to Top