Class 10 Computer Application [165]
Unit 3: Cyber Ethics
Multiple Choice Questions – Cyber Ethics Set – 3
41. To ensure that the site is a safe site, you must check ___________.
a. https protocol
b. padlock
c. Both a and b
d. None of these
42. Fraud committed using the Internet is called ___________.
a. online fraud
b. cyber crime
c. hacking
d. None of these
43. Identify which of the following is not an Online Fraud?
a. Non-delivered goods
b. Stealing information
c. Fraudulent payments
d. Not received OTP
44. Identify which of the following is an Online Fraud?
a. Non-existent companies
b. Purchased of Items on Amazon.com
c. Delivery of Goods
d. None of these
45. Credit Card frauds is an example of _____________.
a. Stealing information
b. Fraudulent payments
c. Both a and b
d. None of these
46. In ___________ fraud, the credit card details of user are stolen from his / her online activities and then some payment frauds are carried out with this stolen information.
a. Identity theft
b. Credit card frauds
c. Plagiarism
d. None of these
47. Stealing someone else’s online identity, fraudulent posts, or some other malicious activity is carried out, is called _________.
a. Identity theft
b. Credit card frauds
c. Plagiarism
d. None of these
48. Fraudulent posts are posted on social media handle, email-id , etc. is known as ________.
a. Identity theft
b. Credit card frauds
c. Plagiarism
d. None of these
49. While providing your personal details or bank details on any web site, you must ensure that ___________.
a. Type the URL in the address bar
b. Do not click on a link
c. Do not cut/copy the link
d. All of these
50. By URL, Identify which site is not a secured web site.
a. https://mycstutorial.in/
b. https://www.anjeevsinghacademy.com
c. http://www.btechgyan.com
d. https://www.onlinesbi.com
51. Identify the image of closed padlock, which display with the secured web site .
a.

b.
c.
d. None of these
52. __________ means applying enough technical safeguards so that data travels safely to its target, without being compromised or eavesdropped.
a. Data Transmission
b. Secure Data Transmission
c. Secure Transmission
d. None of these
53. __________ is a standard security protocol which establishes encrypted links between a web server and a browser in an online communication.
a. https
b. ftps
c. ssl
d. pop
54. SSL stands for __________ .
a. Session Secured Level
b. Secure Sockets Layer
c. Secure Session Layer
d. Session Security Level
55. __________ technology ensures that all data transmitted between a web server and a browser remains encrypted and hence remains safe.
a. HTTPS
b. FTP
c. SSL
d. TELNET
56. To ensure secure data transmission, _____________ techniques are applied.
a. SSL Secure data transmission
b. Data Encryption
c. Use of Safe Protocols
d. All of these
57. SSH stands for _____________.
a. Secure Shell
b. Safety Shell
c. Secure Socket Hypertext
d. None of these
58. _______ data when sent over Internet is hard to steal and hence is safer.
a. Encrypted
b. Decrypted
c. Personal
d. None of these
59. _______ will ensure the safety of data being transferred over the insecure network like Internet.
a. FTPs
b. HTTP
c. SSH
d. None of these
60. _______ will be use as safe protocols to transfer files.
a. Secure FTP
b. HTTPS
c. SSH
d. None of these