Introduction
Cyber safety is very important for students who use computers and the internet. This Class 7 Cyber Security MCQ with Solutions quiz helps students test their knowledge about online safety, passwords, viruses, and digital protection. These questions are designed according to the Class 7 computer syllabus. By practicing these MCQs, students can improve their understanding of cyber security concepts and prepare better for school exams.

📚 Cybersecurity & IT Fundamentals
Master Cyber Concepts
with Smart MCQs
Test your understanding of Hackers, Crackers, Cyber Law, and Backup & Restore with 40 carefully crafted questions.
40Questions
4Topics
2Sections
∞Retries
🎉
Quiz Complete!
0 / 40
1
Section One — Hackers, Crackers & Cyber Law
Questions 1 – 20 · Topics: Hackers, Crackers, Cyber Law
1
What is the primary characteristic that defines a hacker?
Hackers
✅ Correct Answer: B. A hacker is fundamentally someone who possesses deep technical knowledge of computer systems and uses that expertise to explore, test, and understand security boundaries. Hackers may operate ethically (white hat) or unethically (black hat), but the defining trait is advanced technical skill, not just malicious intent.
2
Which type of hacker works with an organization’s permission to find security vulnerabilities?
Hackers
✅ Correct Answer: C. White Hat Hackers, also called ethical hackers or penetration testers, receive explicit permission from organizations before attempting to break into their systems. They document their findings and help close security gaps, making them a valuable part of modern cybersecurity teams. Their work is fully legal and constructive.
3
What does a Black Hat Hacker typically aim to achieve?
Hackers
✅ Correct Answer: D. Black Hat Hackers operate without permission and with malicious intent. Their goals typically include stealing sensitive data, disrupting services, extorting victims with ransomware, or selling stolen credentials on dark-web markets. These activities are criminal offences under cyber laws in most countries worldwide.
4
A Grey Hat Hacker is best described as someone who:
Hackers
✅ Correct Answer: B. Grey Hat Hackers fall between ethical and unethical behaviour. They may access systems without permission but do not intend to cause harm. After finding a vulnerability, they often notify the affected organization — sometimes expecting compensation. While their motives can be good, their methods may still be illegal.
5
Which term describes an inexperienced individual who uses pre-made hacking tools without understanding them?
Hackers
✅ Correct Answer: C. A Script Kiddie (or “skid”) is a derogatory term for someone who uses scripts or programs created by others to attack computer systems without understanding how those programs work. They lack the deep technical knowledge of true hackers and typically rely on readily available exploits found online.
6
What is a Hacktivist primarily motivated by?
Hackers
✅ Correct Answer: B. Hacktivists combine hacking techniques with activism to promote political or social causes. Groups like Anonymous have conducted attacks on government websites, corporations, and institutions to protest policies they disagree with. While their goals may seem noble to some, their hacking activities remain illegal under cybercrime laws.
7
What is the main difference between a hacker and a cracker?
Hackers vs Crackers
✅ Correct Answer: C. The term “cracker” was originally coined to distinguish malicious intruders from skilled but benign hackers. A cracker intentionally bypasses security measures to steal, destroy, or exploit data for criminal gain. A hacker, in the purest sense, is motivated by curiosity and skill, not criminal intent — though the words are often confused in popular media.
8
Which activity is most commonly associated with a cracker?
Crackers
✅ Correct Answer: C. Crackers are specifically known for breaking software protection mechanisms — such as removing licensing restrictions, bypassing passwords, or disabling security features in programs. This activity is illegal as it violates intellectual property laws and software licensing agreements. The term also extends to unauthorized network intrusions for criminal purposes.
9
What does the term “penetration testing” refer to in cybersecurity?
Hackers
✅ Correct Answer: B. Penetration testing (pen testing) is a proactive security practice where ethical hackers simulate real-world cyber attacks against a target system with full authorization. The goal is to discover and document vulnerabilities before malicious actors exploit them. Organizations use pen test reports to strengthen their defences and prioritize security investments effectively.
10
What is a “phishing” attack?
Crackers
✅ Correct Answer: D. Phishing is a deceptive technique where attackers impersonate trusted entities — banks, email providers, or employers — through fake emails, websites, or messages to steal usernames, passwords, or financial details. It is one of the most widespread cyber attack methods and exploits human psychology rather than technical vulnerabilities in software.
11
What is Cyber Law?
Cyber Law
✅ Correct Answer: C. Cyber Law (also called IT Law or Internet Law) is the legal framework that governs activities conducted in cyberspace. It covers areas such as online privacy, digital contracts, intellectual property, electronic evidence, hacking, data protection, and cybercrime. Countries enact specific IT Acts to address these matters and protect citizens in the digital world.
12
Why is Cyber Law important in the modern digital world?
Cyber Law
✅ Correct Answer: B. Cyber Law provides a legal structure to address the rapidly growing threats in cyberspace. It defines what constitutes a cybercrime, outlines penalties for offenders, establishes rights for victims, and creates frameworks for digital contracts and privacy. Without Cyber Law, individuals and businesses would have no legal recourse against online crimes and digital exploitation.
13
Which of the following is a recognized example of cybercrime?
Cyber Crime
✅ Correct Answer: D. Identity theft — where a criminal steals personal information such as login credentials, social security numbers, or credit card details to impersonate a victim — is a serious cybercrime. It causes significant financial and reputational harm. Cyber Law specifically criminalizes this activity and provides legal mechanisms for victims to seek justice and compensation.
14
What type of cybercrime involves holding a victim’s data hostage until a payment is made?
Cyber Crime
✅ Correct Answer: B. Ransomware is malicious software that encrypts a victim’s files and demands a ransom — usually in cryptocurrency — for the decryption key. It targets individuals, hospitals, corporations, and even governments. Notable examples include WannaCry and Petya. Cyber Law classifies ransomware deployment as a serious criminal offence with severe legal penalties worldwide.
15
What does “cyberbullying” involve as a form of cybercrime?
Cyber Crime
✅ Correct Answer: C. Cyberbullying uses digital tools — social media, messaging apps, emails — to repeatedly harass, intimidate, or humiliate a person. It is especially harmful to young people and can cause severe psychological trauma. Cyber Laws in many countries now criminalize cyberbullying, and platforms are required to report and remove such harmful content promptly.
16
Which law in India specifically addresses cybercrime and electronic commerce?
Cyber Law
✅ Correct Answer: C. India’s Information Technology Act, 2000 (IT Act) is the primary legislation governing cybercrime, electronic contracts, digital signatures, and data protection. It was amended significantly in 2008 to address emerging threats like data theft, cyber terrorism, and privacy violations. The Act establishes cyber appellate tribunals and outlines penalties for various cyber offences.
17
What is a “Denial of Service” (DoS) attack?
Cyber Crime
✅ Correct Answer: D. A DoS attack floods a server, network, or service with excessive requests, consuming all available resources so that legitimate users cannot access the service. A Distributed DoS (DDoS) attack uses multiple compromised computers (botnets) to amplify the traffic. Both forms are illegal under Cyber Law and can cause enormous financial damage to businesses.
18
What is “intellectual property” in the context of Cyber Law?
Cyber Law
✅ Correct Answer: B. In Cyber Law, intellectual property refers to original creative works in digital form — including software code, music, eBooks, videos, and websites — that are protected by copyright, trademarks, or patents. Unauthorized copying, distribution, or reproduction of these works online constitutes digital piracy, which is a criminal and civil offence under IT and copyright laws.
19
What is “cyber stalking”?
Cyber Crime
✅ Correct Answer: C. Cyber stalking involves the repeated use of digital technology — emails, social media, GPS, or spyware — to track, follow, or intimidate an individual. It instils fear and distress in the victim. Cyber Law recognizes it as a criminal activity separate from traditional stalking, with penalties including fines and imprisonment to protect victims’ safety and digital privacy.
20
Which international convention serves as a key framework for combating cybercrime across countries?
Cyber Law
✅ Correct Answer: C. The Budapest Convention on Cybercrime (2001), developed by the Council of Europe, is the first binding international treaty on cybercrime. It harmonizes national laws, improves investigative techniques, and enhances international cooperation for prosecuting cybercriminals. Over 60 countries have ratified it, making it the most significant global legal framework in cybercrime enforcement today.
2
Section Two — Backup, Restore & Data Safety
Questions 21 – 40 · Topics: Backup, Devices, Restore, Importance
21
What is a data backup?
Backup
✅ Correct Answer: B. A data backup is a duplicate copy of data stored on a separate medium or location — such as an external drive, cloud server, or tape — so that the original data can be recovered if it is lost, corrupted, accidentally deleted, or destroyed by events like hardware failure, ransomware, or natural disasters. Regular backups are a fundamental pillar of any data protection strategy.
22
What is a “full backup”?
Backup
✅ Correct Answer: C. A full backup creates a complete copy of every selected file, folder, and system data at a particular moment. Although it requires the most storage space and takes the longest to complete, it is the simplest to restore from because all data resides in a single backup set. Organizations typically perform full backups weekly and supplement them with incremental or differential backups on other days.
23
What distinguishes an incremental backup from a full backup?
Backup
✅ Correct Answer: B. An incremental backup captures only the data that has changed since the most recent backup — whether that was a full or another incremental backup. This makes each backup job faster and requires far less storage. However, restoring data requires the full backup plus every subsequent incremental backup, making the restoration process more complex and time-consuming compared to restoring a full backup alone.
24
Which device is most commonly used as an external backup storage medium?
Backup Devices
✅ Correct Answer: C. External hard drives are among the most popular and cost-effective backup devices for individuals and small businesses. They connect via USB or other interfaces, offer large storage capacities (up to several terabytes), and allow users to store copies of entire systems offline. Being portable and affordable, they serve as excellent first-line backup solutions when maintained separately from the primary computer.
25
What is cloud backup?
Backup Devices
✅ Correct Answer: C. Cloud backup transmits data over the internet to secure servers operated by providers like Google Drive, OneDrive, Dropbox, or Amazon S3. It offers off-site protection, automatic scheduling, and accessibility from any device. Cloud backup is especially valuable for disaster recovery scenarios where local devices (including external drives) may be physically destroyed or stolen alongside the primary system.
26
What is a USB flash drive primarily used for in terms of data management?
Backup Devices
✅ Correct Answer: D. USB flash drives (pen drives or thumb drives) are compact, portable storage devices that plug into a USB port. They are widely used to carry and transfer files between computers and serve as convenient backup media for smaller volumes of data. While not ideal for large-scale enterprise backups, they are practical for personal document backups and transporting data between locations.
27
What is a magnetic tape used for in enterprise backup environments?
Backup Devices
✅ Correct Answer: B. Magnetic tape remains one of the most cost-effective solutions for archiving enormous volumes of data over the long term in enterprise environments. Despite being slower to access than disk-based backups, modern tape cartridges (like LTO) offer massive capacities, low cost per gigabyte, and longevity of 30+ years. Banks, governments, and cloud providers still rely on tape for offline cold storage and disaster recovery archives.
28
What does “data restore” mean?
Restore
✅ Correct Answer: C. Data restore is the complementary process to backup — it involves accessing stored backup copies and returning them to their original location or an alternate system to make data usable again. Restoring data is critical after events like accidental deletion, hardware failure, ransomware attacks, or data corruption. Without a reliable restore process, even the best backup is useless in a real emergency.
29
What is the “3-2-1 backup rule”?
Backup
✅ Correct Answer: B. The 3-2-1 backup strategy is a widely recommended best practice: maintain 3 total copies of your data, stored on 2 different types of media (e.g., hard drive and cloud), with 1 copy kept off-site. This approach protects against multiple simultaneous failure scenarios — local hardware failure, site-level disasters (fire/flood), and media-specific issues — ensuring maximum data resilience and recoverability.
30
Why should you store a backup copy in an off-site location?
Importance of Backup
✅ Correct Answer: C. Storing a backup off-site — whether at another physical location or in the cloud — ensures survival of your data even if the primary site is completely destroyed by fire, flooding, earthquake, theft, or another catastrophic event. If both the original and backup are at the same location, a single disaster could destroy everything. Geographic separation is a non-negotiable element of robust disaster recovery planning.
31
What is a NAS (Network Attached Storage) device used for?
Backup Devices
✅ Correct Answer: C. A NAS device is a dedicated file storage system connected to a network, allowing multiple computers and users to access and store data from a central location. It is ideal for home offices and small businesses as a local backup target. Users can configure automated backup jobs to run regularly, ensuring all connected machines continuously protect their data to the shared NAS storage pool.
32
What is “disaster recovery” in the context of data management?
Restore
✅ Correct Answer: C. Disaster Recovery (DR) encompasses the strategies, processes, and technologies organizations use to resume normal operations after catastrophic events — cyberattacks, natural disasters, or system failures. A DR plan outlines Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs), defining how quickly systems must be restored and how much data loss is acceptable to keep business continuity intact.
33
What does RTO stand for in disaster recovery?
Restore
✅ Correct Answer: D. Recovery Time Objective (RTO) defines the maximum duration of time within which a business process must be restored after a disaster to avoid unacceptable consequences. For example, a hospital may set an RTO of 1 hour for patient record systems. A shorter RTO requires more investment in redundant systems and faster backup infrastructure to meet the target restoration timeline effectively.
34
Which scenario best illustrates the importance of having a recent backup?
Importance of Backup
✅ Correct Answer: C. When a company’s server crashes and destroys customer records, the only way to recover is from a backup. This scenario demonstrates the mission-critical importance of backups for business continuity. Without a recent backup, the company faces permanent data loss, legal liability, regulatory fines, and severe reputational damage — costs that far outweigh the investment of a good backup strategy.
35
What is a “differential backup”?
Backup
✅ Correct Answer: B. A differential backup captures all changes made since the last full backup — regardless of whether another differential was taken in between. This makes it faster to restore than incremental backups (you only need the full backup plus the latest differential), but differential backups grow progressively larger over time as more changes accumulate since the last full backup cycle was performed.
36
What happens during a system restore point recovery in Windows?
Restore
✅ Correct Answer: C. Windows System Restore reverts the operating system’s configuration — including system files, installed programs, and the Windows registry — to a snapshot taken at an earlier restore point. Importantly, it does not affect personal files such as documents, photos, or emails. This feature is useful for undoing harmful system changes caused by faulty software installations or problematic Windows updates.
37
Why is it critical to test your backup regularly?
Importance of Backup
✅ Correct Answer: C. Many organizations discover their backups are corrupt, incomplete, or unrestorable only when a real disaster strikes — the worst possible moment to find out. Regular restore tests verify that backup processes work correctly, data integrity is maintained, and recovery procedures succeed within acceptable time frames. Untested backups provide a false sense of security and can fail completely when you need them most.
38
What does RPO (Recovery Point Objective) define?
Restore
✅ Correct Answer: C. Recovery Point Objective (RPO) defines the maximum amount of data loss a business can tolerate, expressed as a time interval. For example, an RPO of 4 hours means the organization must back up data at least every 4 hours, so that in the event of failure, no more than 4 hours of work is permanently lost. A stricter RPO (closer to zero) demands more frequent backups and higher infrastructure investment.
39
What is an optical disc (such as a DVD) used for in backup scenarios?
Backup Devices
✅ Correct Answer: B. Optical discs — including CDs, DVDs, and Blu-ray discs — are used for archiving small to medium volumes of data as read-only or write-once media. Their physical nature makes them immune to malware (ransomware cannot encrypt a completed disc). Though largely replaced by cloud and external drives for everyday backups, optical discs still serve archival purposes in libraries, legal archives, and long-term data preservation projects.
40
A school loses all student records due to a virus attack. Which lesson about backup does this example best demonstrate?
Importance of Backup
✅ Correct Answer: D. This scenario powerfully illustrates that any organization — regardless of size — is vulnerable to data loss from malware, hardware failure, or human error. The school’s loss of student records demonstrates that backups are not optional extras but essential safeguards. Regular, tested backups stored securely would have enabled the school to restore all student data quickly, avoiding disruption to education and administrative processes.
·