200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 5

Unit 4 Societal Impacts

Class 12 Informatics Practices New 065


Societal Impacts MCQ’s


Multiple Choice Questions Set 5


Q81. ________ is done on behalf of a company, which wants to find out the loopholes in the system in context to security.

a. Ethical hacking

b. Unethical hacking

c. Ethical and Unethical hacking

d. None of these

Ans. a. Ethical hacking

Q82. ________ is done in order to harm or cause loss to an individual or a company.

a. Ethical hacking

b. Unethical hacking

c. Ethical and Unethical hacking

d. None of these

Ans. b. Unethical hacking

Q83. ________ is an unlawful activity where fake websites or emails that look original or authentic are present the user to fraudulently collect sensitive and personal details .

a. Phishing

b. Spoofing

c. Social engineering

d. All of these

Ans. a. Phishing

Q84. Through Phishing, they try to collect ______

a. username & passwords

b. credit card details

c. banking detials

d. All of these

Ans. d. All of these

Q85. The most common phishing method is through __________.

a. email spoofing

b. spamming

c. call on phone

d. All of these

Ans. a. email spoofing

Q86. In _________ , you receive mail from fake or forged email address, which looks like an authentic source.

a. phishing

b. email spoofing

c. spamming

d. All of these

Ans. b. email spoofing.

Note: Email spoofing is a common method of Phishing. If email spoofing option is not there then select Phishing.

Q87. We should ensure to open any email link or attachment only when it is from a trusted source and doesn’t look doubtful.

a. True

b. False

Ans. a. True

Q88. Accepting links from untrusted emails can be hazardous, as they may potentially contain __________ .

a. virus

b. link to malicious website

c. Both (a) and (b)

d. All of these

Ans. c. Both (a) and (b)

Q89. _________ refers to as a fraudulent or malicious practice in which communication is sent from an unknown source disguised as a trusted source known to the receiver.

a. Spoofing

b. Phishing

c. Pretexting

d. All of these

Ans. a. Spoofing

Q90. Obtaining the personal information from financial institutions, telephone companies and other sources, is called ___________

a. Spoofing

b. Phishing

c. Pretexting / Social Engineering

d. All of these

Ans. c. Pretexting / Social Engineering

Q91. A user’s identifiable personal data like demographic details, email ID, banking credentials, passport, PAN, Aadhar number and various such personal data are stolen and misused by the hacker on behalf of the victim, is called ___________.

a. Spoofing

b. Phishing

c. Identity theft

d. All of these

Ans. c. Identity theft

Q92. The criminal can takes advantage of an individual’s stolen identity in __________ ways.

a. Financial Identity theft

b. Criminal identity theft

c. Medical identity theft

d. All of these

Ans. d. All of these

Q93. Cyber crime where the attacker gains access to the computer and blocks the user from accessing, usually by encrypting the data, is called __________.

a. Phishing

b. Ransomware

c. Identity theft

d. None of these

Ans. b. Ransomware

Q94. In ___________, the attacker blackmails the victim to pay for getting access to the data, or sometimes threatens to publish personal and sensitive information or photographs unless a ransom is paid.

a. Phishing

b. Ransomware

c. Identity theft

d. None of these

Ans. b. Ransomware

Q95. Ransomware can get downloaded on your computer when _______________________________

a. users visit any malicious or unsecure websites

b. download software from doubtful repositories

c. click on a malicious advertisement on the Internet

d. All of these

Ans. d. All of these

Q96. The challenges of cyber crime can be mitigated with the twin approach of _________.

a. being alert

b. taking legal help

c. Both (a) and (b)

d. None of these

Ans. c. Both (a) and (b)

Q97. __________ are the digital equivalent of a paper certificate.

a. Digital signature

b. Electronic signature

c. Signature

d. None of these

Ans. a. Digital Signature

Q98. Derogatory messages or comments posted online targeting people are called ________.

a. Phishing

b. Spamming

c. Cyber troll

d. None of these

Ans. c. Cyber troll

Q99. In Cyber troll, ‘troll’ is refer to _______.

a. person, who is doing it

b. derogatory comments, posted by a person

c. Both (a) and (b)

d. None of these

Ans. c. Both (a) and (b)

Q100. Cyber troll or trolling is a cybercrime which is closely related to __________.

a. Cyber bullying

b. Cyber phishing

c. Cyber stalking

d. None of these

Ans. a. Cyber bullying


Societal Impacts MCQ’s


Class 12 Informatics Practices Data Handling using Python Pandas – MCQ’s


Class 12 Informatics Practices NCERT Book Exercise Solutions

You cannot copy content of this page

Scroll to Top