Cyber Olympiad Class 10 - Sample question paper 14
Posted by Olympiad Tester on
Q1. What is the primary purpose of the Domain Name System (DNS) on the Internet?
a) Encrypting data for secure transmission
b) Converting domain names to IP addresses
c) Filtering malicious websites
d) Providing access to social media platforms
Answer: b) Converting domain names to IP addresses
Explanation: DNS translates human-readable domain names into IP addresses, enabling computers to locate and connect to each other on the Internet.
Q2. What protocol is commonly used for secure data transmission over the Internet?
a) HTTP
b) FTP
c) HTTPS
d) SMTP
Answer: c) HTTPS
Explanation: HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP commonly used for encrypted communication over the Internet.
Q3. What does the acronym "URL" stand for in the context of the Internet?
a) Uniform Resource Locator
b) Universal Routing Language
c) Unique Resource Locator
d) Unified Resource Listing
Answer: a) Uniform Resource Locator
Explanation: A URL is a Uniform Resource Locator, providing the address used to access resources on the web.
Q4. What is the purpose of a VPN (Virtual Private Network) on the Internet?
a) Speed up internet connection
b) Bypass website restrictions
c) Encrypt and secure data transmission
d) Increase website loading times
Answer: c) Encrypt and secure data transmission
Explanation: A VPN encrypts data transmitted over the Internet, enhancing security and privacy.
Q5. What is the purpose of an IP address on the Internet?
a) Identify the location of a website
b) Encrypt data for secure transmission
c) Provide a unique identifier for devices on a network
d) Filter spam emails
Answer: c) Provide a unique identifier for devices on a network
Explanation: An IP address is a unique identifier assigned to devices on a network, facilitating communication and data exchange.
Q6. Which Internet protocol is responsible for sending emails?
a) FTP (File Transfer Protocol)
b) SMTP (Simple Mail Transfer Protocol)
c) HTTP (Hypertext Transfer Protocol)
d) UDP (User Datagram Protocol)
Answer: b) SMTP (Simple Mail Transfer Protocol)
Explanation: SMTP is the protocol used for sending emails over the Internet.
Q7. What is the purpose of the Internet protocol ICMP (Internet Control Message Protocol)?
a) Transmit data securely
b) Diagnose network-related issues
c) Stream video content
d) Connect to wireless networks
Answer: b) Diagnose network-related issues
Explanation: ICMP is used for network diagnostics, including error reporting and troubleshooting.
Q8. Which of the following is an example of a top-level domain (TLD) on the Internet?
a) .com
b) www
c) http
d) ftp
Answer: a) .com
Explanation: .com is an example of a top-level domain (TLD) commonly used for commercial websites.
Q9. What is the primary function of an Internet Service Provider (ISP)?
a) Provide email services
b) Host websites
c) Connect users to the Internet
d) Design website interfaces
Answer: c) Connect users to the Internet
Explanation: ISPs connect users to the Internet by providing internet access services.
Q10. What is the purpose of a cookie in the context of web browsing?
a) Enhance website design
b) Store user preferences and information
c) Block unwanted advertisements
d) Establish secure connections
Answer: b) Store user preferences and information
Explanation: Cookies are used to store user preferences and information to enhance the browsing experience.
Q11. In the context of web browsers, what is the purpose of the "Incognito" or "Private Browsing" mode?
a) Block access to certain websites
b) Enhance download speeds
c) Prevent the storage of browsing history and cookies
d) Enable multiple users to share a single browser instance
Answer: c) Prevent the storage of browsing history and cookies
Explanation: Incognito or Private Browsing mode prevents the storage of browsing history and cookies for enhanced privacy.
Q12. What is the purpose of the "Cache" in web browsers?
a) Store website images and videos
b) Enhance website security
c) Speed up the loading of frequently visited websites
d) Block unwanted pop-up advertisements
Answer: c) Speed up the loading of frequently visited websites
Explanation: The cache in web browsers stores copies of web pages, images, and resources to speed up the loading of frequently visited websites.
Q13. What does the term "Phishing" refer to in the context of Internet security?
a) Improving website design
b) Sending unsolicited emails
c) Hacking into computer systems
d) Attempting to trick individuals into revealing sensitive information
Answer: d) Attempting to trick individuals into revealing sensitive information
Explanation: Phishing is a type of cyber attack that involves attempting to trick individuals into revealing sensitive information, such as passwords or financial details.
Q14. What is the purpose of a firewall in the context of Internet security?
a) Enhance internet speed
b) Block unwanted emails
c) Monitor website traffic
d) Control and filter incoming and outgoing network traffic
Answer: d) Control and filter incoming and outgoing network traffic
Explanation: A firewall controls and filters incoming and outgoing network traffic to protect a network or computer from unauthorized access or cyber attacks.
Q15. In the context of Internet security, what is the purpose of a VPN (Virtual Private Network)?
a) Enhance website encryption
b) Provide a private network connection over the Internet
c) Block malicious websites
d) Increase internet browsing speed
Answer: b) Provide a private network connection over the Internet
Explanation: A VPN provides a secure and private network connection over the Internet, encrypting data for enhanced security and privacy.
Q16. You are working from a coffee shop using public Wi-Fi. What precautions should you take to secure your data during online transactions?
a) Disable Wi-Fi and use cellular data
b) Use a Virtual Private Network (VPN)
c) Share sensitive information openly
d) Keep antivirus software updated
Answer: b) Use a Virtual Private Network (VPN)
Explanation: Using a VPN encrypts your data, enhancing security, especially when using public Wi-Fi networks.
Q17. You receive an email claiming you won a lottery but need to provide personal information to claim the prize. What should you do?
a) Reply with your personal information
b) Ignore the email
c) Forward the email to friends
d) Share the information on social media
Answer: b) Ignore the email
Explanation: Such emails are often phishing attempts. Ignoring and not sharing personal information is crucial for security.
Q18. You notice unauthorized access to your social media account. What immediate steps should you take to secure your account?
a) Share the incident on your timeline
b) Change your password
c) Use the same password for all accounts
d) Deactivate your account temporarily
Answer: b) Change your password
Explanation: Changing the password helps regain control and prevents further unauthorized access.
Q19. You come across a website offering free software downloads. What precautions should you take before downloading and installing the software?
a) Download without checking
b) Check reviews and ratings
c) Share the download link with friends
d) Disable antivirus software
Answer: b) Check reviews and ratings
Explanation: Checking reviews helps ensure the software is legitimate and safe to download.
Q20. You want to share sensitive information online. What feature should you look for in a website's URL to ensure a secure connection?
a) "HTTP" in the URL
b) "HTTPS" in the URL
c) No need to check
d) Long and complex URL
Answer: b) "HTTPS" in the URL
Explanation: "HTTPS" indicates a secure connection, encrypting data during transmission.
Q21. Your friend received an email attachment claiming to be from you, but you didn't send it. What should you do?
a) Ignore the situation
b) Reply to the email
c) Alert your friend about the potential threat
d) Share the attachment with others
Answer: c) Alert your friend about the potential threat
Explanation: Alerting your friend helps prevent them from opening potentially harmful attachments.
Q22. Your browser displays a warning about an unsecured connection while accessing a website. What should you avoid doing on that site?
a) Share personal information
b) Ignore the warning and proceed
c) Download files
d) Close the browser immediately
Answer: a) Share personal information
Explanation: An unsecured connection may expose your data, so avoid sharing personal information.
Q23. You suspect that your computer is infected with malware. What should you do to address this issue?
a) Share your computer with friends
b) Run a reputable antivirus scan
c) Disable the firewall
d) Continue using the computer as usual
Answer: b) Run a reputable antivirus scan
Explanation: Running a reliable antivirus scan helps detect and remove malware from your computer.
Q24. Your friend asks to connect to your home Wi-Fi network. What security measure should you implement before sharing your Wi-Fi password?
a) Use an easily guessable password
b) Share the password openly
c) Enable WPA or WPA2 security
d) Change the Wi-Fi network name
Answer: c) Enable WPA or WPA2 security
Explanation: Enabling WPA or WPA2 security enhances the security of your Wi-Fi network.
Q25. You want to ensure your online accounts have strong passwords. What practices contribute to creating strong passwords?
a) Use the same password for all accounts
b) Include personal information in the password
c) Use a combination of uppercase and lowercase letters, numbers, and symbols
d) Never change passwords
Answer: c) Use a combination of uppercase and lowercase letters, numbers, and symbols
Explanation: Using a diverse combination of characters makes passwords more secure.
Q26. You receive an email claiming to be from your bank, requesting your account details due to a system upgrade. How should you respond?
a) Provide the requested information immediately
b) Forward the email to your friends for advice
c) Contact your bank directly using official contact information
d) Delete the email without checking
Answer: c) Contact your bank directly using official contact information
Explanation: Contacting the bank directly ensures you verify the request and avoid falling for phishing attempts.
Q27. While browsing, you encounter a pop-up claiming your computer has a virus and prompting you to download an antivirus program. What should you do?
a) Immediately download the antivirus program
b) Ignore the pop-up and continue browsing
c) Close the browser and run a reputable antivirus scan
d) Share the pop-up message with friends
Answer: c) Close the browser and run a reputable antivirus scan
Explanation: Closing the browser and running a reputable antivirus scan helps ensure your computer's security.
Q28. You notice that a website you visit frequently has suddenly changed its appearance and layout. What precautions should you take before interacting with the site?
a) Share your login credentials
b) Proceed with normal interactions
c) Clear your browser cache and cookies
d) Download any files from the site
Answer: c) Clear your browser cache and cookies
Explanation: Clearing the browser cache and cookies can help prevent issues related to site changes and updates.
Q29. You receive a friend request on a social media platform from an unfamiliar account. What should you consider before accepting the request?
a) Accept the request without hesitation
b) Check mutual friends and profile information
c) Share personal details with the new connection
d) Share the request with other friends for advice
Answer: b) Check mutual friends and profile information
Explanation: Checking mutual friends and profile information helps verify the authenticity of the friend request.
Q30. Your friend shares a link to a website claiming to offer free movie downloads. What potential risks should you consider before clicking the link?
a) The website may have the latest movies available
b) It could be a phishing site or contain malware
c) The link is secure and trustworthy
d) Share the link with other friends
Answer: b) It could be a phishing site or contain malware
Explanation: Clicking on such links may lead to phishing attempts or malware infections. It's crucial to be cautious.
Q31. Your computer's firewall alerts you about an application attempting to access the internet. What should you do?
a) Allow the application without further investigation
b) Block the application immediately
c) Investigate the application and allow if trusted
d) Disable the firewall to avoid interruptions
Answer: c) Investigate the application and allow if trusted
Explanation: Investigating the application helps ensure it's legitimate before allowing internet access.
Q32. Your device prompts you to update your operating system. What is a critical reason to perform the update?
a) To enhance the appearance of the user interface
b) To fix security vulnerabilities and bugs
c) To increase the device's processing speed
d) To delete important files
Answer: b) To fix security vulnerabilities and bugs
Explanation: Updates often include security patches, addressing vulnerabilities and improving system stability.
Q33. You receive an email with a link to reset your online banking password, but you didn't request it. What should you do?
a) Click the link and proceed with the password reset
b) Ignore the email
c) Report the email to your bank and avoid clicking the link
d) Share the email with friends for advice
Answer: c) Report the email to your bank and avoid clicking the link
Explanation: Reporting the email to your bank ensures they can investigate and prevent unauthorized access to your account.
Q34. Your computer displays a warning about low disk space. What action should you take?
a) Ignore the warning
b) Delete all files on the computer
c) Transfer files to an external storage device
d) Share the warning with friends for advice
Answer: c) Transfer files to an external storage device
Explanation: Transferring files to an external storage device helps free up space on the computer.
Q35. Your friend shares a link on social media claiming to provide free access to premium content. What should you consider before clicking the link?
a) Click the link immediately
b) Share the link with other friends
c) Verify the legitimacy of the link before clicking
d) Ignore the link and block your friend
Answer: c) Verify the legitimacy of the link before clicking
Explanation: Verifying the legitimacy helps avoid potential scams or malicious content associated with the link.