Edzy
AI TutorResourcesToolsCompareBuy
SearchDownload AppLogin
Edzy

Edzy for Classes 6-12

Edzy is a personal AI tutor for CBSE and State Board students, with curriculum-aligned guidance, practice, revision, and study plans that adapt to each learner.

  • Email: always@edzy.ai
  • Phone: +91 96256 68472
  • WhatsApp: +91 96256 68472
  • Address: Sector 63, Gurgaon, Haryana

Follow Edzy

Browse by Class

  • CBSE Class 6
  • CBSE Class 7
  • CBSE Class 8
  • CBSE Class 9
  • CBSE Class 10
  • CBSE Class 11
  • CBSE Class 12
Explore the CBSE resource hub

Explore Edzy

  • Study Resources
  • Free Study Tools
  • Best Apps for Board Exams
  • Edzy vs ChatGPT
  • About Us
  • Why We Built Edzy
  • Blog
  • CBSE AI Tutor

Support & Legal

  • Help & FAQs
  • Accessibility
  • Privacy Policy
  • Terms & Conditions
  • Refund Policy
  • Cookie Policy
  • Site Directory

© 2026 Edzy. All rights reserved.

Curriculum-aligned learning paths for students in Classes 6-12.

CBSE
Class 12
Computer Science
Computer Science
Security Aspects

Question Bank

Practice Hub

Question Bank: Security Aspects

This chapter discusses essential security aspects in computer science, focusing on malware, threats, and preventive measures. Understanding these concepts is crucial for protecting devices and data in a connected world.

Structured practice
Question Practice

Practice chapter questions in a cleaner, exam-ready flow

Start with curated question sets, move into full module views when needed, and keep discovering related practice without losing your place in the chapter.

Question Bank - Security Aspects

View all (133)
Q1.

What is malware?

Single Answer MCQ
Q-00095520
View explanation
Q2.

Which of the following is a type of malware that replicates itself to spread to other systems?

Single Answer MCQ
Q-00095521
View explanation
Q3.

What is the primary function of antivirus software?

Single Answer MCQ
Q-00095522
View explanation
Q4.

Which of the following types of malware is often used to steal personal information covertly?

Single Answer MCQ
Q-00095523
View explanation
Q5.

Which is a common method for a ransomware attack?

Single Answer MCQ
Q-00095524
View explanation
Q6.

What security measure can help users identify whether a website is secure?

Single Answer MCQ
Q-00095525
View explanation
Q7.

Which of the following best describes a firewall?

Single Answer MCQ
Q-00095526
View explanation
Q8.

Which of the following is a characteristic of a worm?

Single Answer MCQ
Q-00095527
View explanation
Q9.

What is the main purpose of spam emails?

Single Answer MCQ
Q-00095528
View explanation
Q10.

What role do cookies play in web browsing?

Single Answer MCQ
Q-00095529
View explanation
Q11.

Which of the following attacks involves an unauthorized person gaining access to a computer network by exploiting vulnerabilities?

Single Answer MCQ
Q-00095530
View explanation
Q12.

What is the primary difference between a hacker and a cracker?

Single Answer MCQ
Q-00095531
View explanation
Q13.

What is a potential risk of using public Wi-Fi without a VPN?

Single Answer MCQ
Q-00095532
View explanation
Q14.

Which type of malware encrypts the user's files and demands payment for decryption?

Single Answer MCQ
Q-00095533
View explanation
Q15.

What is malware primarily designed to do?

Single Answer MCQ
Q-00095552
View explanation
Q16.

Which of the following is NOT a common method of malware distribution?

Single Answer MCQ
Q-00095554
View explanation
Q17.

Which of the following is a sign of possible malware infection?

Single Answer MCQ
Q-00095556
View explanation
Q18.

What does phishing typically use to deliver malware?

Single Answer MCQ
Q-00095558
View explanation
Q19.

Which type of malware is disguised as a legitimate program?

Single Answer MCQ
Q-00095560
View explanation
Q20.

What precaution can help prevent malware infections while browsing the internet?

Single Answer MCQ
Q-00095562
View explanation
Q21.

Which of the following describes ransomware?

Single Answer MCQ
Q-00095564
View explanation
Q22.

What is the primary purpose of anti-malware software?

Single Answer MCQ
Q-00095566
View explanation
Q23.

Eavesdropping on a network is best described as what?

Single Answer MCQ
Q-00095568
View explanation
Q24.

Which malware often collects personal information without the user's knowledge?

Single Answer MCQ
Q-00095570
View explanation
Q25.

How can removable storage devices spread malware?

Single Answer MCQ
Q-00095572
View explanation
Q26.

What is a primary goal of a firewall in relation to malware?

Single Answer MCQ
Q-00095574
View explanation
Q27.

What is the main difference between a virus and a worm?

Single Answer MCQ
Q-00095576
View explanation
Q28.

What is the primary function of antivirus software?

Single Answer MCQ
Q-00095578
View explanation
Q29.

Which of the following is a method used by antivirus programs to identify malware?

Single Answer MCQ
Q-00095579
View explanation
Q30.

What is a common symptom of a computer infected with malware?

Single Answer MCQ
Q-00095580
View explanation
Q31.

Which of the following is NOT a preventive measure against malware?

Single Answer MCQ
Q-00095581
View explanation
Q32.

What does the term 'adware' refer to in the context of computer security?

Single Answer MCQ
Q-00095582
View explanation
Q33.

In terms of malware, what is a Trojan horse?

Single Answer MCQ
Q-00095583
View explanation
Q34.

Which kind of malware is specifically designed to encrypt a user's files and demand payment for the decryption key?

Single Answer MCQ
Q-00095584
View explanation
Q35.

What is the best practice for dealing with suspicious email attachments?

Single Answer MCQ
Q-00095585
View explanation
Q36.

What does 'heuristic analysis' refer to in antivirus software?

Single Answer MCQ
Q-00095586
View explanation
Q37.

Why is it important to regularly update antivirus software?

Single Answer MCQ
Q-00095587
View explanation
Q38.

Which of the following antivirus features offers real-time protection?

Single Answer MCQ
Q-00095588
View explanation
Q39.

In which situation would the use of sandbox detection be most effective?

Single Answer MCQ
Q-00095589
View explanation
Q40.

What is a potential consequence of using outdated antivirus software?

Single Answer MCQ
Q-00095590
View explanation
Q41.

Which of the following behaviors would most likely put a user at risk of a malware infection?

Single Answer MCQ
Q-00095591
View explanation
Q42.

What is the primary characteristic of spam emails?

Single Answer MCQ
Q-00095592
View explanation
Q43.

Which automated feature helps filter out spam messages in email services?

Single Answer MCQ
Q-00095593
View explanation
Q44.

What is it called when a user marks an email as spam?

Single Answer MCQ
Q-00095594
View explanation
Q45.

What can spam emails often trick users into doing?

Single Answer MCQ
Q-00095595
View explanation
Q46.

What does the term 'phishing' in spam contexts refer to?

Single Answer MCQ
Q-00095596
View explanation
Q47.

Why is spam a significant issue for email users?

Single Answer MCQ
Q-00095597
View explanation
Q48.

Which of the following is a common feature of spam emails?

Single Answer MCQ
Q-00095598
View explanation
Q49.

What method do spammers use to send emails to large groups of people?

Single Answer MCQ
Q-00095599
View explanation
Q50.

What can be a consequence of consistently clicking on spam links?

Single Answer MCQ
Q-00095600
View explanation
Q51.

Which of the following actions can help reduce spam in your inbox?

Single Answer MCQ
Q-00095601
View explanation
Q52.

Why is it important to verify links in suspicious emails?

Single Answer MCQ
Q-00095602
View explanation
Q53.

What could be a red flag indicating an email is spam?

Single Answer MCQ
Q-00095603
View explanation
Q54.

What type of phishing attack involves unsolicited messages on social media platforms?

Single Answer MCQ
Q-00095604
View explanation
Q55.

Which type of spam specifically refers to unsolicited messages sent via text messages?

Single Answer MCQ
Q-00095605
View explanation
Q56.

In the context of spam, what does 'opt-out' refer to?

Single Answer MCQ
Q-00095606
View explanation
Q57.

What does HTTPS stand for?

Single Answer MCQ
Q-00095607
View explanation
Q58.

What is the primary purpose of HTTPS?

Single Answer MCQ
Q-00095608
View explanation
Q59.

How does HTTPS enhance security compared to HTTP?

Single Answer MCQ
Q-00095609
View explanation
Q60.

Which additional component is needed for HTTPS?

Single Answer MCQ
Q-00095610
View explanation
Q61.

What does an SSL Certificate do?

Single Answer MCQ
Q-00095611
View explanation
Q62.

Why should sensitive information never be sent over HTTP?

Single Answer MCQ
Q-00095612
View explanation
Q63.

Which of the following is a characteristic of HTTP?

Single Answer MCQ
Q-00095613
View explanation
Q64.

What does the 's' in HTTPS signify?

Single Answer MCQ
Q-00095614
View explanation
Q65.

What role does the URL prefix 'https://' play?

Single Answer MCQ
Q-00095615
View explanation
Q66.

Which of the following is NOT a benefit of using HTTPS?

Single Answer MCQ
Q-00095616
View explanation
Q67.

What happens when data is encrypted in HTTPS?

Single Answer MCQ
Q-00095617
View explanation
Q68.

How might a user identify an HTTPS website?

Single Answer MCQ
Q-00095618
View explanation
Q69.

Which protocol is more suitable for e-commerce websites?

Single Answer MCQ
Q-00095619
View explanation
Q70.

What is a potential risk of using only HTTP?

Single Answer MCQ
Q-00095620
View explanation
Q71.

What is the difference in port numbers between HTTP and HTTPS?

Single Answer MCQ
Q-00095621
View explanation
Q72.

In what way does HTTPS handle data retrieval?

Single Answer MCQ
Q-00095622
View explanation
Q73.

What is the primary purpose of a firewall?

Single Answer MCQ
Q-00095623
View explanation
Q74.

Which type of firewall is installed on individual computers to monitor traffic?

Single Answer MCQ
Q-00095624
View explanation
Q75.

What kind of attacks can a firewall prevent?

Single Answer MCQ
Q-00095625
View explanation
Q76.

In a school network, if a rule is set to block student access to the finance server, what type of firewall is being utilized?

Single Answer MCQ
Q-00095626
View explanation
Q77.

What is a common feature of hardware firewalls?

Single Answer MCQ
Q-00095627
View explanation
Q78.

Which filtering technique does a stateful firewall use?

Single Answer MCQ
Q-00095628
View explanation
Q79.

Which command-line utility on Windows can be used to manage the firewall?

Single Answer MCQ
Q-00095629
View explanation
Q80.

What does a firewall do when it encounters traffic that does not meet the predefined rules?

Single Answer MCQ
Q-00095630
View explanation
Q81.

True or False: A firewall can only be implemented in software.

Single Answer MCQ
Q-00095631
View explanation
Q82.

Which of the following is NOT a feature of a firewall?

Single Answer MCQ
Q-00095632
View explanation
Q83.

How does a packet-filtering firewall determine whether to allow or block a packet?

Single Answer MCQ
Q-00095633
View explanation
Q84.

What is a potential limitation of using a software firewall?

Single Answer MCQ
Q-00095634
View explanation
Q85.

When should a firewall be configured for specific applications?

Single Answer MCQ
Q-00095635
View explanation
Q86.

Which firewall type is more effective in managing multiple network devices?

Single Answer MCQ
Q-00095636
View explanation
Q87.

What is one of the key differences between stateful and stateless firewalls?

Single Answer MCQ
Q-00095637
View explanation
Q88.

What type of malware is specifically designed to replicate itself and spread to other computers?

Single Answer MCQ
Q-00095638
View explanation
Q89.

Which of the following describes a Denial of Service (DoS) attack?

Single Answer MCQ
Q-00095639
View explanation
Q90.

What is the primary function of a firewall in network security?

Single Answer MCQ
Q-00095640
View explanation
Q91.

Which type of attack uses compromised devices to conduct a simultaneous attack on a target?

Single Answer MCQ
Q-00095641
View explanation
Q92.

Snooping in network security refers to which of the following?

Single Answer MCQ
Q-00095642
View explanation
Q93.

In a buffer overflow attack, what does the attacker primarily manipulate?

Single Answer MCQ
Q-00095643
View explanation
Q94.

What type of malware disguises itself as legitimate software?

Single Answer MCQ
Q-00095644
View explanation
Q95.

What is a common method through which hackers conduct snooping?

Single Answer MCQ
Q-00095645
View explanation
Q96.

Which of the following types of attacks entails the attacker sending commands that manipulate the flow of execution of a program?

Single Answer MCQ
Q-00095646
View explanation
Q97.

Which is NOT a characteristic of a computer virus?

Single Answer MCQ
Q-00095647
View explanation
Q98.

What protocol is primarily used for secure communication over the internet?

Single Answer MCQ
Q-00095648
View explanation
Q99.

What is the primary goal of a phishing attack?

Single Answer MCQ
Q-00095649
View explanation
Q100.

Which of the following describes traffic flooding in network security?

Single Answer MCQ
Q-00095650
View explanation
Q101.

A common defense against malware infections includes which of the following?

Single Answer MCQ
Q-00095651
View explanation
Q102.

Intrusion Detection Systems (IDS) are primarily used to detect what?

Single Answer MCQ
Q-00095652
View explanation
Q103.

What is the primary purpose of cookies in web browsing?

Single Answer MCQ
Q-00095653
View explanation
Q104.

Which type of cookie is temporarily stored and deleted when the browser is closed?

Single Answer MCQ
Q-00095654
View explanation
Q105.

What kind of information can cookies store about a user?

Single Answer MCQ
Q-00095655
View explanation
Q106.

Why is it important to manage cookies in a web browser?

Single Answer MCQ
Q-00095656
View explanation
Q107.

What happens when a website creates a cookie?

Single Answer MCQ
Q-00095657
View explanation
Q108.

What is a major risk associated with the use of cookies?

Single Answer MCQ
Q-00095658
View explanation
Q109.

Which type of cookie allows a website to remember a user’s login information over multiple visits?

Single Answer MCQ
Q-00095659
View explanation
Q110.

What is a potential solution for users concerned about cookie privacy?

Single Answer MCQ
Q-00095660
View explanation
Q111.

What distinguishes third-party cookies from first-party cookies?

Single Answer MCQ
Q-00095661
View explanation
Q112.

Which of the following is NOT a function of cookies?

Single Answer MCQ
Q-00095662
View explanation
Q113.

Why do websites use cookies for the shopping cart feature?

Single Answer MCQ
Q-00095663
View explanation
Q114.

Which security measure could help reduce cookie misuse?

Single Answer MCQ
Q-00095664
View explanation
Q115.

How does the SameSite attribute enhance cookie security?

Single Answer MCQ
Q-00095665
View explanation
Q116.

Which of the following is true regarding secure cookies?

Single Answer MCQ
Q-00095666
View explanation
Q117.

Which method can websites use to enhance user privacy related to cookies?

Single Answer MCQ
Q-00095667
View explanation
Q118.

What is a hacker typically known for?

Single Answer MCQ
Q-00095678
View explanation
Q119.

Which type of hacker exclusively finds security flaws to assist organizations?

Single Answer MCQ
Q-00095680
View explanation
Q120.

Which of the following best describes Black Hat hackers?

Single Answer MCQ
Q-00095682
View explanation
Q121.

What term is used for unauthorized access of a computer or network with malicious intent?

Single Answer MCQ
Q-00095684
View explanation
Q122.

Which of the following is characteristic of Grey Hat hackers?

Single Answer MCQ
Q-00095686
View explanation
Q123.

Which of the following malicious software programs requires a user to execute a file to spread?

Single Answer MCQ
Q-00095687
View explanation
Q124.

What does a Denial of Service (DoS) attack aim to achieve?

Single Answer MCQ
Q-00095688
View explanation
Q125.

What distinctive action characterizes a worm compared to a virus?

Single Answer MCQ
Q-00095689
View explanation
Q126.

A hacker who breaks into systems for social or political activism is known as a:

Single Answer MCQ
Q-00095690
View explanation
Q127.

Which of the following is NOT an example of malware?

Single Answer MCQ
Q-00095691
View explanation
Q128.

What is the main purpose of a Cracker?

Single Answer MCQ
Q-00095692
View explanation
Q129.

What is the primary goal of an ethical hacker?

Single Answer MCQ
Q-00095693
View explanation
Q130.

Which malware type disguises itself as legitimate software to trick users?

Single Answer MCQ
Q-00095694
View explanation
Q131.

A collective of compromised computers used to perform DDoS attacks is known as a:

Single Answer MCQ
Q-00095695
View explanation
Q132.

In context of cybersecurity, what does 'phishing' refer to?

Single Answer MCQ
Q-00095696
View explanation
Q133.

Which of the following statements is true regarding ethical hackers and black hats?

Single Answer MCQ
Q-00095697
View explanation
Learn Better On The App
Exam-ready preparation

PYQs Made Easy

Solve previous year CBSE questions in a way that feels organized and approachable.

Previous year papers
Clear practice flow

Faster access to practice, revision, and daily study flow.

Edzy mobile app preview