Brand Logo

Class 9

Class 9 - English
Moments (9 Chapters)|
Beehive (18 Chapters)|
Words and Expressions - I (9 Chapters)
Class 9 - Health and Physical Education
Health and Physical Education (14 Chapters)
Class 9 - Hindi
Sanchayan (4 Chapters)|
Sparsh (10 Chapters)|
Kshitij (13 Chapters)|
Kritika (4 Chapters)
Class 9 - ICT
Information and Communication Technology (8 Chapters)
Class 9 - Mathematics
Mathematics (12 Chapters)
Class 9 - Sanskrit
Shemushi Prathmo Bhag (10 Chapters)|
Vyakaranavithi (20 Chapters)|
Abhyaswaan Bhav (15 Chapters)
Class 9 - Science
Science (12 Chapters)
Class 9 - Social Science
Contemporary India (6 Chapters)|
Democratic Politics (5 Chapters)|
Economics (4 Chapters)|
India and the Contemporary World - I (5 Chapters)

Class 10

Class 10 - English
First Flight (22 Chapters)|
Foot Prints Without feet (9 Chapters)|
Words and Expressions - II (9 Chapters)
Class 10 - Health and Physical Education
Health and Physical Education (13 Chapters)
Class 10 - Hindi
Kshitij - II (13 Chapters)|
Sparsh (14 Chapters)|
Sanchayan - II (3 Chapters)|
Kritika (3 Chapters)
Class 10 - Mathematics
Mathematics (14 Chapters)
Class 10 - Sanskrit
Vyakaranavithi (14 Chapters)|
Shemushi - II (12 Chapters)|
Abhyaswaan Bhav - II (14 Chapters)
Class 10 - Science
Science (13 Chapters)
Class 10 - Social Science
Contemporary India (7 Chapters)|
Democratic Politics (5 Chapters)|
India and the Contemporary World - II (5 Chapters)|
Understanding Economic Development (5 Chapters)
Class 10 - Urdu
Nawa-e-urdu (15 Chapters)

Class 11

Class 11 - Accountancy
Accountancy - II (2 Chapters)|
Financial Accounting - I (7 Chapters)
Class 11 - Biology
Biology (19 Chapters)
Class 11 - Biotechnology
Biotechnology (12 Chapters)
Class 11 - Business Studies
Business Studies (11 Chapters)
Class 11 - Chemistry
Chemistry Part - I (6 Chapters)|
Chemistry Part - II (3 Chapters)
Class 11 - Computer Science
Computer Science (11 Chapters)
Class 11 - Creative Writing and Translation
Srijan (4 Chapters)
Class 11 - Economics
Statistics for Economics (8 Chapters)|
Indian Economic Development (8 Chapters)
Class 11 - English
Hornbill (11 Chapters)|
Snapshots (5 Chapters)|
Woven Words (27 Chapters)
Class 11 - Fine Art
An Introduction to Indian Art Part - I (8 Chapters)
Class 11 - Geography
Fundamentals of Physical Geography (14 Chapters)|
India Physical Environment (6 Chapters)|
Practical Work in Geography (6 Chapters)
Class 11 - Health and Physical Education
Health and Physical Education (11 Chapters)
Class 11 - History
Themes in World History (13 Chapters)
Class 11 - Home Science
Human Ecology and Family Sciences - I (7 Chapters)|
Human Ecology and Family Sciences - II (4 Chapters)
Class 11 - Informatics Practices
Informatics Practices (8 Chapters)
Class 11 - Knowledge Traditions Practices of India
Knowledge Traditions Practices of India (9 Chapters)
Class 11 - Mathematics
Mathematics (14 Chapters)
Class 11 - Physics
Physics Part - I (7 Chapters)|
Physics Part - II (7 Chapters)
Class 11 - Political Science
Indian Constitution at Work (10 Chapters)|
Political Theory (8 Chapters)
Class 11 - Psychology
Introduction to Psychology (8 Chapters)
Class 11 - Sangeet
Tabla evam Pakhawaj (8 Chapters)|
Hindustani Sangeet Gayan Evam Vadan (10 Chapters)
Class 11 - Sociology
Understanding Society (5 Chapters)|
Introducing Sociology (5 Chapters)

Class 12

Class 12 - Accountancy
Accountancy Part - I (4 Chapters)|
Accountancy Part - II (6 Chapters)
Class 12 - Biology
Biology (13 Chapters)
Class 12 - Biotechnology
Biotechnology (13 Chapters)
Class 12 - Business Studies
Business Studies - II (3 Chapters)|
Business Studies - I (8 Chapters)
Class 12 - Chemistry
Chemistry - II (5 Chapters)|
Chemistry - I (5 Chapters)
Class 12 - Computer Science
Computer Science (13 Chapters)
Class 12 - Economics
Introductory Microeconomics (5 Chapters)|
Introductory Macroeconomics (6 Chapters)
Class 12 - English
Flamingo (14 Chapters)|
Vistas (7 Chapters)|
Kaliedoscope (21 Chapters)
Class 12 - Fine Art
An Introduction to Indian Art Part - II (8 Chapters)
Class 12 - Geography
Practical Work in Geography - Part II (4 Chapters)|
Fundamentals of Human Geography (8 Chapters)|
India - People and Economy (9 Chapters)
Class 12 - Hindi
Aroh (15 Chapters)|
Antra (23 Chapters)|
Antral Bhag - II (3 Chapters)|
Vitan (3 Chapters)
Class 12 - History
Themes in Indian History - III (4 Chapters)|
Themes in Indian History - I (4 Chapters)|
Themes in Indian History - II (4 Chapters)
Class 12 - Home Science
Human Ecology and Family Sciences Part I (7 Chapters)|
Human Ecology and Family Sciences Part II (7 Chapters)
Class 12 - Informatics Practices
Informatics Practices (7 Chapters)
Class 12 - Mathematics
Mathematics Part - I (6 Chapters)|
Mathematics Part - II (7 Chapters)
Class 12 - Physics
Physics Part - I (8 Chapters)|
Physics Part - II (6 Chapters)
Class 12 - Political Science
Politics in India Since Independence (8 Chapters)|
Contemporary World Politics (7 Chapters)
Class 12 - Psychology
Psychology (7 Chapters)
Class 12 - Sangeet
Hindustani Sangeet Gayan Evam Vadan (9 Chapters)|
Tabla evam Pakhawaj (7 Chapters)
Class 12 - Sociology
Social Change and Development in India (8 Chapters)|
Indian Society (7 Chapters)

About Edzy - Gamified Learning Platform

Edzy is India's premier gamified AI tutor platform for CBSE and State Board students in classes 6-12. Our platform transforms traditional studying with AI-powered study plans, interactive practice sessions, and personalized learning pathways. Students using Edzy experience unmatched learning efficiency through our immersive educational environment that combines advanced technology with curriculum-aligned content.

Why Choose Edzy for CBSE and State Board Preparation

Edzy offers an adaptive AI educational experience tailored to each student's learning style and pace. We integrate gamification with proven educational strategies to create an engaging environment that students love. Our micro-content approach breaks down complex CBSE and State Board topics into manageable lessons, building confidence through mastery-based progression and real-time feedback.

CBSE and State Board Focus Areas

Edzy specializes in transforming online education for classes 6-12 with AI-powered tutoring. We provide comprehensive NCERT-aligned content and engaging lessons across Mathematics, Science, English, Social Studies, and IT. Our system helps students master fundamental concepts and excel in board exams through AI-generated study plans, personalized learning timelines, and dynamic practice sessions.

Edzy's Unique Approach to Online Learning

Unlike traditional online coaching platforms, Edzy converts CBSE and State Board syllabus content into interactive learning adventures. Our AI tutor provides timely assistance while adapting to student progress. The platform features instant feedback, gamified practice sessions, and achievement badges to motivate continuous learning and concept mastery.

Brand Logo

Edzy | Largest Online Learning Platform for Classes 6–12

Study smarter with Edzy – India’s leading gamified AI tutor for CBSE and State Boards. Designed for Classes 6–12, Edzy offers interactive lessons, AI-powered study plans, and rewarding practice tools for every subject.

Find us on Social Media

Links

About EdzyFAQsContact UsCBSE CoursesDuelsRumblesEdzy App

Parents & Teachers

Search EdzyParent DashboardCreator PlatformEducation BlogCBSE & NCERT News

Policies

Terms and ConditionsRefund PolicyPrivacy PolicyCookie Policy

© 2026 Edzy | Largest Online Learning Platform for Classes 6–12. All rights reserved.

Edzy is an AI tutor for CBSE and State Board students, offering interactive lessons and personalized learning for Classes 6–12.

SitemapNews SitemapBlog SitemapSchool SitemapAccessibility
CBSE
Class 12
Computer Science
Computer Science
Security Aspects

Question Bank

Question Bank: Security Aspects

This chapter discusses essential security aspects in computer science, focusing on malware, threats, and preventive measures. Understanding these concepts is crucial for protecting devices and data in a connected world.

Question Bank - Security Aspects

View all (133)
Q1.

What is malware?

Single Answer MCQ
Q-00095520
Q2.

Which of the following is a type of malware that replicates itself to spread to other systems?

Single Answer MCQ
Q-00095521
Q3.

What is the primary function of antivirus software?

Single Answer MCQ
Q-00095522
Q4.

Which of the following types of malware is often used to steal personal information covertly?

Single Answer MCQ
Q-00095523
Q5.

Which is a common method for a ransomware attack?

Single Answer MCQ
Q-00095524
Q6.

What security measure can help users identify whether a website is secure?

Single Answer MCQ
Q-00095525
Q7.

Which of the following best describes a firewall?

Single Answer MCQ
Q-00095526
Q8.

Which of the following is a characteristic of a worm?

Single Answer MCQ
Q-00095527
Q9.

What is the main purpose of spam emails?

Single Answer MCQ
Q-00095528
Q10.

What role do cookies play in web browsing?

Single Answer MCQ
Q-00095529
Q11.

Which of the following attacks involves an unauthorized person gaining access to a computer network by exploiting vulnerabilities?

Single Answer MCQ
Q-00095530
Q12.

What is the primary difference between a hacker and a cracker?

Single Answer MCQ
Q-00095531
Q13.

What is a potential risk of using public Wi-Fi without a VPN?

Single Answer MCQ
Q-00095532
Q14.

Which type of malware encrypts the user's files and demands payment for decryption?

Single Answer MCQ
Q-00095533
Q15.

What is malware primarily designed to do?

Single Answer MCQ
Q-00095552
Q16.

Which of the following is NOT a common method of malware distribution?

Single Answer MCQ
Q-00095554
Q17.

Which of the following is a sign of possible malware infection?

Single Answer MCQ
Q-00095556
Q18.

What does phishing typically use to deliver malware?

Single Answer MCQ
Q-00095558
Q19.

Which type of malware is disguised as a legitimate program?

Single Answer MCQ
Q-00095560
Q20.

What precaution can help prevent malware infections while browsing the internet?

Single Answer MCQ
Q-00095562
Q21.

Which of the following describes ransomware?

Single Answer MCQ
Q-00095564
Q22.

What is the primary purpose of anti-malware software?

Single Answer MCQ
Q-00095566
Q23.

Eavesdropping on a network is best described as what?

Single Answer MCQ
Q-00095568
Q24.

Which malware often collects personal information without the user's knowledge?

Single Answer MCQ
Q-00095570
Q25.

How can removable storage devices spread malware?

Single Answer MCQ
Q-00095572
Q26.

What is a primary goal of a firewall in relation to malware?

Single Answer MCQ
Q-00095574
Q27.

What is the main difference between a virus and a worm?

Single Answer MCQ
Q-00095576
Q28.

What is the primary function of antivirus software?

Single Answer MCQ
Q-00095578
Q29.

Which of the following is a method used by antivirus programs to identify malware?

Single Answer MCQ
Q-00095579
Q30.

What is a common symptom of a computer infected with malware?

Single Answer MCQ
Q-00095580
Q31.

Which of the following is NOT a preventive measure against malware?

Single Answer MCQ
Q-00095581
Q32.

What does the term 'adware' refer to in the context of computer security?

Single Answer MCQ
Q-00095582
Q33.

In terms of malware, what is a Trojan horse?

Single Answer MCQ
Q-00095583
Q34.

Which kind of malware is specifically designed to encrypt a user's files and demand payment for the decryption key?

Single Answer MCQ
Q-00095584
Q35.

What is the best practice for dealing with suspicious email attachments?

Single Answer MCQ
Q-00095585
Q36.

What does 'heuristic analysis' refer to in antivirus software?

Single Answer MCQ
Q-00095586
Q37.

Why is it important to regularly update antivirus software?

Single Answer MCQ
Q-00095587
Q38.

Which of the following antivirus features offers real-time protection?

Single Answer MCQ
Q-00095588
Q39.

In which situation would the use of sandbox detection be most effective?

Single Answer MCQ
Q-00095589
Q40.

What is a potential consequence of using outdated antivirus software?

Single Answer MCQ
Q-00095590
Q41.

Which of the following behaviors would most likely put a user at risk of a malware infection?

Single Answer MCQ
Q-00095591
Q42.

What is the primary characteristic of spam emails?

Single Answer MCQ
Q-00095592
Q43.

Which automated feature helps filter out spam messages in email services?

Single Answer MCQ
Q-00095593
Q44.

What is it called when a user marks an email as spam?

Single Answer MCQ
Q-00095594
Q45.

What can spam emails often trick users into doing?

Single Answer MCQ
Q-00095595
Q46.

What does the term 'phishing' in spam contexts refer to?

Single Answer MCQ
Q-00095596
Q47.

Why is spam a significant issue for email users?

Single Answer MCQ
Q-00095597
Q48.

Which of the following is a common feature of spam emails?

Single Answer MCQ
Q-00095598
Q49.

What method do spammers use to send emails to large groups of people?

Single Answer MCQ
Q-00095599
Q50.

What can be a consequence of consistently clicking on spam links?

Single Answer MCQ
Q-00095600
Q51.

Which of the following actions can help reduce spam in your inbox?

Single Answer MCQ
Q-00095601
Q52.

Why is it important to verify links in suspicious emails?

Single Answer MCQ
Q-00095602
Q53.

What could be a red flag indicating an email is spam?

Single Answer MCQ
Q-00095603
Q54.

What type of phishing attack involves unsolicited messages on social media platforms?

Single Answer MCQ
Q-00095604
Q55.

Which type of spam specifically refers to unsolicited messages sent via text messages?

Single Answer MCQ
Q-00095605
Q56.

In the context of spam, what does 'opt-out' refer to?

Single Answer MCQ
Q-00095606
Q57.

What does HTTPS stand for?

Single Answer MCQ
Q-00095607
Q58.

What is the primary purpose of HTTPS?

Single Answer MCQ
Q-00095608
Q59.

How does HTTPS enhance security compared to HTTP?

Single Answer MCQ
Q-00095609
Q60.

Which additional component is needed for HTTPS?

Single Answer MCQ
Q-00095610
Q61.

What does an SSL Certificate do?

Single Answer MCQ
Q-00095611
Q62.

Why should sensitive information never be sent over HTTP?

Single Answer MCQ
Q-00095612
Q63.

Which of the following is a characteristic of HTTP?

Single Answer MCQ
Q-00095613
Q64.

What does the 's' in HTTPS signify?

Single Answer MCQ
Q-00095614
Q65.

What role does the URL prefix 'https://' play?

Single Answer MCQ
Q-00095615
Q66.

Which of the following is NOT a benefit of using HTTPS?

Single Answer MCQ
Q-00095616
Q67.

What happens when data is encrypted in HTTPS?

Single Answer MCQ
Q-00095617
Q68.

How might a user identify an HTTPS website?

Single Answer MCQ
Q-00095618
Q69.

Which protocol is more suitable for e-commerce websites?

Single Answer MCQ
Q-00095619
Q70.

What is a potential risk of using only HTTP?

Single Answer MCQ
Q-00095620
Q71.

What is the difference in port numbers between HTTP and HTTPS?

Single Answer MCQ
Q-00095621
Q72.

In what way does HTTPS handle data retrieval?

Single Answer MCQ
Q-00095622
Q73.

What is the primary purpose of a firewall?

Single Answer MCQ
Q-00095623
Q74.

Which type of firewall is installed on individual computers to monitor traffic?

Single Answer MCQ
Q-00095624
Q75.

What kind of attacks can a firewall prevent?

Single Answer MCQ
Q-00095625
Q76.

In a school network, if a rule is set to block student access to the finance server, what type of firewall is being utilized?

Single Answer MCQ
Q-00095626
Q77.

What is a common feature of hardware firewalls?

Single Answer MCQ
Q-00095627
Q78.

Which filtering technique does a stateful firewall use?

Single Answer MCQ
Q-00095628
Q79.

Which command-line utility on Windows can be used to manage the firewall?

Single Answer MCQ
Q-00095629
Q80.

What does a firewall do when it encounters traffic that does not meet the predefined rules?

Single Answer MCQ
Q-00095630
Q81.

True or False: A firewall can only be implemented in software.

Single Answer MCQ
Q-00095631
Q82.

Which of the following is NOT a feature of a firewall?

Single Answer MCQ
Q-00095632
Q83.

How does a packet-filtering firewall determine whether to allow or block a packet?

Single Answer MCQ
Q-00095633
Q84.

What is a potential limitation of using a software firewall?

Single Answer MCQ
Q-00095634
Q85.

When should a firewall be configured for specific applications?

Single Answer MCQ
Q-00095635
Q86.

Which firewall type is more effective in managing multiple network devices?

Single Answer MCQ
Q-00095636
Q87.

What is one of the key differences between stateful and stateless firewalls?

Single Answer MCQ
Q-00095637
Q88.

What type of malware is specifically designed to replicate itself and spread to other computers?

Single Answer MCQ
Q-00095638
Q89.

Which of the following describes a Denial of Service (DoS) attack?

Single Answer MCQ
Q-00095639
Q90.

What is the primary function of a firewall in network security?

Single Answer MCQ
Q-00095640
Q91.

Which type of attack uses compromised devices to conduct a simultaneous attack on a target?

Single Answer MCQ
Q-00095641
Q92.

Snooping in network security refers to which of the following?

Single Answer MCQ
Q-00095642
Q93.

In a buffer overflow attack, what does the attacker primarily manipulate?

Single Answer MCQ
Q-00095643
Q94.

What type of malware disguises itself as legitimate software?

Single Answer MCQ
Q-00095644
Q95.

What is a common method through which hackers conduct snooping?

Single Answer MCQ
Q-00095645
Q96.

Which of the following types of attacks entails the attacker sending commands that manipulate the flow of execution of a program?

Single Answer MCQ
Q-00095646
Q97.

Which is NOT a characteristic of a computer virus?

Single Answer MCQ
Q-00095647
Q98.

What protocol is primarily used for secure communication over the internet?

Single Answer MCQ
Q-00095648
Q99.

What is the primary goal of a phishing attack?

Single Answer MCQ
Q-00095649
Q100.

Which of the following describes traffic flooding in network security?

Single Answer MCQ
Q-00095650
Q101.

A common defense against malware infections includes which of the following?

Single Answer MCQ
Q-00095651
Q102.

Intrusion Detection Systems (IDS) are primarily used to detect what?

Single Answer MCQ
Q-00095652
Q103.

What is the primary purpose of cookies in web browsing?

Single Answer MCQ
Q-00095653
Q104.

Which type of cookie is temporarily stored and deleted when the browser is closed?

Single Answer MCQ
Q-00095654
Q105.

What kind of information can cookies store about a user?

Single Answer MCQ
Q-00095655
Q106.

Why is it important to manage cookies in a web browser?

Single Answer MCQ
Q-00095656
Q107.

What happens when a website creates a cookie?

Single Answer MCQ
Q-00095657
Q108.

What is a major risk associated with the use of cookies?

Single Answer MCQ
Q-00095658
Q109.

Which type of cookie allows a website to remember a user’s login information over multiple visits?

Single Answer MCQ
Q-00095659
Q110.

What is a potential solution for users concerned about cookie privacy?

Single Answer MCQ
Q-00095660
Q111.

What distinguishes third-party cookies from first-party cookies?

Single Answer MCQ
Q-00095661
Q112.

Which of the following is NOT a function of cookies?

Single Answer MCQ
Q-00095662
Q113.

Why do websites use cookies for the shopping cart feature?

Single Answer MCQ
Q-00095663
Q114.

Which security measure could help reduce cookie misuse?

Single Answer MCQ
Q-00095664
Q115.

How does the SameSite attribute enhance cookie security?

Single Answer MCQ
Q-00095665
Q116.

Which of the following is true regarding secure cookies?

Single Answer MCQ
Q-00095666
Q117.

Which method can websites use to enhance user privacy related to cookies?

Single Answer MCQ
Q-00095667
Q118.

What is a hacker typically known for?

Single Answer MCQ
Q-00095678
Q119.

Which type of hacker exclusively finds security flaws to assist organizations?

Single Answer MCQ
Q-00095680
Q120.

Which of the following best describes Black Hat hackers?

Single Answer MCQ
Q-00095682
Q121.

What term is used for unauthorized access of a computer or network with malicious intent?

Single Answer MCQ
Q-00095684
Q122.

Which of the following is characteristic of Grey Hat hackers?

Single Answer MCQ
Q-00095686
Q123.

Which of the following malicious software programs requires a user to execute a file to spread?

Single Answer MCQ
Q-00095687
Q124.

What does a Denial of Service (DoS) attack aim to achieve?

Single Answer MCQ
Q-00095688
Q125.

What distinctive action characterizes a worm compared to a virus?

Single Answer MCQ
Q-00095689
Q126.

A hacker who breaks into systems for social or political activism is known as a:

Single Answer MCQ
Q-00095690
Q127.

Which of the following is NOT an example of malware?

Single Answer MCQ
Q-00095691
Q128.

What is the main purpose of a Cracker?

Single Answer MCQ
Q-00095692
Q129.

What is the primary goal of an ethical hacker?

Single Answer MCQ
Q-00095693
Q130.

Which malware type disguises itself as legitimate software to trick users?

Single Answer MCQ
Q-00095694
Q131.

A collective of compromised computers used to perform DDoS attacks is known as a:

Single Answer MCQ
Q-00095695
Q132.

In context of cybersecurity, what does 'phishing' refer to?

Single Answer MCQ
Q-00095696
Q133.

Which of the following statements is true regarding ethical hackers and black hats?

Single Answer MCQ
Q-00095697

✍️ Practice Makes Perfect

Sharpen your skills with endless MCQs, quizzes, and topic-based practice.

Edzy mobile app