Skip to content
Early access — you're among the first to try PYQLabs. Share feedback

UGC NET Paper 1ICT

847 questions across 12 years

Public preview: answer keys and topic tags are available on many questions, while original explanations are being added selectively. Use the filters below for cleaner practice.

By year

By topic

Practice questions

43 questions shown in Cyber Security.

Showing Cyber Security questions.
2023 Q32

Identify the correct order of the following terms A-E to complete the paragraph given below that explains how data is sent securely over the Internet using the Transport Layer Secu...

Cyber Security/Hindi/answer key
2023 Q32

Which of the following statements about email security best describes email encryption?

Cyber Security/Hindi/answer key
2023 Q33

Identify the correct order of the following terms A-D to complete the sentences given below: The action of sending emails to fraudulently obtain another person's bank details is ca...

Cyber Security/Hindi/answer key
2023 Q33

Given below are two statements: Statement I: A modem converts analog signals to digital signals and vice versa. Statement II: In the context of computer security, crackers are also...

Cyber Security/Hindi/answer key
2023 Q33

In the context of Information and Communication Technologies(ICT), which of the following statements is/are true? A. In an email system, Bcc: allows the sender of a message to conc...

Cyber Security/Hindi/answer key
2023 Q33

Below are two statements: Statement - I: A Denial-of-Service (DoS) attack is an excessive number of requests sent to a web server at the same time, causing the server to crash. Sta...

Cyber Security/Hindi
2023 Q35

Match List - I with List - II. List - I (Cyber Attack) (A) Spyware (B) Phishing (C) Ransomware (D) Pharming List - II (Description) (I) Sending an email to lure users to fake websi...

Cyber Security
2023 Q35

Match List I with List II List I (Internet Term) A. Spyware B. Phishing C. Social Networking Sites D. Pharming List II (Description) I. Malicious software is installed on a user's...

Cyber Security/Hindi/answer key
2023 Q35

Match List I with List II LIST I (Internet Term) A. Spyware B. Phishing C. Social networking sites D. Pharming LIST II (Description) I. Malicious software installed on a user's har...

Cyber Security/answer key
2022 Q26

Which of the following best describes a computer worm?

Cyber Security/Hindi/answer key
2022 Q26

Which of the following is the act of obtaining a password or other confidential information from a person within an organization by using unauthorized means such as feigning an eme...

Cyber Security/answer key
2022 Q26

A destructive computer program that masquerades as a useful application is called

Cyber Security/Hindi/answer key
2022 Q26

The act of obtaining passwords or other confidential information from an individual within an organization using unauthorized means, such as in a pseudo-emergency situation, is con...

Cyber Security/Hindi/answer key
2022 Q26

Which Indian Act makes it illegal to knowingly spread a computer virus?

Cyber Security/Hindi/answer key
2022 Q27

Miss Madhu clicks on a web link received in a message on her phone which promises her a complimentary trip to a destination of her choice. She forwarded this message to her friend,...

Cyber Security/Hindi/answer key
2022 Q28

Given below are two statements Statement I: 'Spam' is an attempt to acquire sensitive information for malicious reasons, by masquerading as a trustworthy entity. Statement II: 'Phi...

Cyber Security/Hindi/answer key
2022 Q29

Given below are two statements: Statement I: Piracy refers to attempts to gain information from otherwise undisclosed areas. Statement II: Hacking refers to the unauthorized duplic...

Cyber Security/Hindi/answer key
2022 Q29

Which of the following are examples of fraudulent use of the Internet? A. Blogging B. Booking a cinema ticket C. Pharming D. Phishing Choose the correct answer from the options giv...

Cyber Security/Hindi/answer key
2022 Q30

Match List I with List II: List I (Technical Term) (A) Phishing (B) Pharming (C) Spam (D) Smishing Choose the correct answer from the options given below:

Cyber Security/Hindi/answer key
2022 Q30

Match List I with List II List I Ethical Issue in Information Technology A. Privacy B. Accuracy C. Property D. Accesibility List II Description I. Responsibility of data collector...

Cyber Security/answer key
2022 Q30

An example of a cyber exacerbated crime is

Cyber Security/answer key
2022 Q140

निम्नलिखित में से कौन एक साइबर उत्तेजित अपराध है ?

Cyber Security/Hindi
2022 Q937

Using the school district's database to determine gender distribution in local schools.

Cyber Security/Hindi
2021 Q31

Which of the following is a special type of Computer Virus that fills a computer system with self-replicating information. clogging the system so that its operations are slowed or...

Cyber Security/answer key
2021 Q33

Given below are two statements: Statement I: Software programs permanently stored in ROM are called 'Malware'. Statement II: The use of the Internet. Cell phones or other devices t...

Cyber Security/answer key
2021 Q35

Given below are two statements, one is labelled as Assertion A and the other is labelled as Reason R Assertion A: The Internet of Things (IOT) is a rapidly evolving technology capa...

Cyber Security/answer key
2020 Q31

Ankur receives an email informing him that his credit card is going to be cancelled. The email advises him to clink on the provided link and sign into his online banking account to...

Cyber Security
2020 Q32

Extra browser window of commercials that open automatically on browsing web pages is called:

Cyber Security
2020 Q35

Scrambling of data before transmission across a network to avoid manipulation by a third party is known as

Cyber Security
2020 Q35

Radha receives an email claiming that her credit card account is about to be suspended unless she emails her credit card details and personal identification number (PIN) immediatel...

Cyber Security
2020 Q38

Given below are two statements, one is labelled as Assertion A and the other is labelled as Reason R Assertion A: Privacy and security of user data is at stake on the Internet Reas...

Cyber Security
2020 Q39

Given below are two statements, one is labelled as Assertion A and the other is labelled as Reason R Assertion A: E-commerce companies require personal data to serve the stakeholde...

Cyber Security
2019 Q37

A/An _________ is a computer program that spreads by inserting copies of itself into other executable code or documents.

Cyber Security/answer key
2019 Q39

In the context of IT/ICT, which one of the following statements about spamming is true?

Cyber Security/answer key
2019 Q39

Which of the following is/are major issues arising out of the growing reliance on information technology? (a) Profitability

Cyber Security/answer key
2019 Q40

What is spyware in respect of computer software?

Cyber Security/answer key
2019 Q42

A virus type that is capable of transferring from one computer to another without any 'user interaction' is known as

Cyber Security/answer key
2019 Q46

Which of the following is a type of malware intentionally inserted into a software system that will setoff a malicious function when specified conditions are met?

Cyber Security/answer key
2018 Q41

A virus hoax is an untrue virus warning, email. When you receive a virus hoax such as the one below, what is the appropriate action? Subject: Warning! A new Virus has been detected...

Cyber Security
2017 Q9

निम्नलिखित दोनों कथनों को पढ़ें : I : सूचना एवं संचार प्रौद्योगिकी (आई.सी.टी.) को सूचना प्रौद्योगिकी (आई.टी.) का उपसमुच्चय माना जाता है । II : सॉफ्टवेयर के किसी हिस्से के 'उपयोग-अध...

Cyber Security
2017 Q25

Read the following two statements : I: Information and Communication Technology (ICT) is considered a subset of Information Technology (IT). II: The 'right to use' a piece of softw...

Cyber Security
2015 Q8

नेटवर्क के आर-पार ट्रांसमिशन के लिए आंकड़ों को कूटबद्ध करना या गडमड करना क्या कहलाता है?

Cyber Security
2015 Q37

नेटवर्क के आर-पार ट्रांसमिशन के लिए आंकड़ों को कूटबद्ध करना या गडमड करना क्या कहलाता है?

Cyber Security