Edzy
AI TutorResourcesToolsCompareBuy
SearchDownload AppLogin
Edzy

Edzy for Classes 6-12

Edzy is a personal AI tutor for CBSE and State Board students, with curriculum-aligned guidance, practice, revision, and study plans that adapt to each learner.

  • Email: always@edzy.ai
  • Phone: +91 96256 68472
  • WhatsApp: +91 96256 68472
  • Address: Sector 63, Gurgaon, Haryana

Follow Edzy

Browse by Class

  • CBSE Class 6
  • CBSE Class 7
  • CBSE Class 8
  • CBSE Class 9
  • CBSE Class 10
  • CBSE Class 11
  • CBSE Class 12
Explore the CBSE resource hub

Explore Edzy

  • Study Resources
  • Free Study Tools
  • Best Apps for Board Exams
  • Edzy vs ChatGPT
  • About Us
  • Why We Built Edzy
  • Blog
  • CBSE AI Tutor

Support & Legal

  • Help & FAQs
  • Accessibility
  • Privacy Policy
  • Terms & Conditions
  • Refund Policy
  • Cookie Policy
  • Site Directory

© 2026 Edzy. All rights reserved.

Curriculum-aligned learning paths for students in Classes 6-12.

CBSE
Class 9
ICT
Information and Communication Technology
Safety and Security in the Cyber World
Question Bank

Question Bank - Safety and Sec...

Practice Hub

Question Bank: Safety and Security in the Cyber World

This chapter focuses on safety and security in the cyber world, highlighting the importance of being cautious online.

Structured practice

Question Bank - Safety and Security in the Cyber World

Q1.

What is a common indicator that an email might be a phishing attempt?

Single Answer MCQ
Q-00028892
View explanation
Q2.

Which action can help prevent identity theft online?

Single Answer MCQ
Q-00028893
View explanation
Q3.

What should you do if you receive an email from an unknown sender asking for personal information?

Single Answer MCQ
Q-00028894
View explanation
Q4.

Which term describes the practice of sending multiple unsolicited emails?

Single Answer MCQ
Q-00028895
View explanation
Q5.

Identifying a phishing email often involves checking which aspect?

Single Answer MCQ
Q-00028896
View explanation
Q6.

What is the best practice for posting on social networking sites?

Single Answer MCQ
Q-00028897
View explanation
Q7.

What does malware do?

Single Answer MCQ
Q-00028898
View explanation
Q8.

If you suspect your online account has been compromised, what is the first step you should take?

Single Answer MCQ
Q-00028899
View explanation
Q9.

What does a phishing attack typically aim to achieve?

Single Answer MCQ
Q-00028900
View explanation
Q10.

What kind of information should you never share online?

Single Answer MCQ
Q-00028901
View explanation
Q11.

Which of the following is a characteristic of strong passwords?

Single Answer MCQ
Q-00028902
View explanation
Q12.

What is the purpose of cybersecurity measures?

Single Answer MCQ
Q-00028903
View explanation
Q13.

If you encounter cyberbullying, what is the recommended action?

Single Answer MCQ
Q-00028904
View explanation
Q14.

What does it mean to have a secure website?

Single Answer MCQ
Q-00028905
View explanation
Q15.

Which of the following is NOT a type of cyber crime?

Single Answer MCQ
Q-00028906
View explanation
Q16.

Microorganism software designed to harm devices is generally known as what?

Single Answer MCQ
Q-00028907
View explanation
Q17.

What is the primary purpose of using a strong password for your email account?

Single Answer MCQ
Q-00112557
View explanation
Q18.

Which of the following is a sign that an email may be a phishing attempt?

Single Answer MCQ
Q-00112558
View explanation
Q19.

What is a digital footprint?

Single Answer MCQ
Q-00112559
View explanation
Q20.

Which action is advisable to take when you receive an unknown email with an attachment?

Single Answer MCQ
Q-00112560
View explanation
Q21.

Which of the following is a characteristic of spam emails?

Single Answer MCQ
Q-00112561
View explanation
Q22.

What is the benefit of enabling two-factor authentication on your email account?

Single Answer MCQ
Q-00112562
View explanation
Q23.

What should you do if you receive a suspicious email asking for personal information?

Single Answer MCQ
Q-00112563
View explanation
Q24.

Which of the following should you do when creating an email that contains sensitive information?

Single Answer MCQ
Q-00112564
View explanation
Q25.

What does phishing aim to accomplish?

Single Answer MCQ
Q-00112565
View explanation
Q26.

What should you look for in a sender's email address to determine its authenticity?

Single Answer MCQ
Q-00112566
View explanation
Q27.

Which URL indicates a potential phishing website?

Single Answer MCQ
Q-00112567
View explanation
Q28.

What does 'spam' refer to in the context of email?

Single Answer MCQ
Q-00112568
View explanation
Q29.

What is the primary aim of strong passwords?

Single Answer MCQ
Q-00112569
View explanation
Q30.

If you accidentally send an email with a sensitive attachment, what should you do first?

Single Answer MCQ
Q-00112570
View explanation
Q31.

Which technique is commonly associated with cyberbullying?

Single Answer MCQ
Q-00112571
View explanation
Q32.

What does an 'email signature' typically contain?

Single Answer MCQ
Q-00112572
View explanation
Q33.

What should you do if you encounter cyberbullying?

Single Answer MCQ
Q-00112573
View explanation
Q34.

When is it appropriate to use 'Reply All' in an email thread?

Single Answer MCQ
Q-00112574
View explanation
Q35.

How often should you change your online passwords for better security?

Single Answer MCQ
Q-00112575
View explanation
Q36.

What can you do to reduce the likelihood of becoming a victim of email scams?

Single Answer MCQ
Q-00112576
View explanation
Q37.

What does 'digital footprint' refer to in relation to online safety?

Single Answer MCQ
Q-00112577
View explanation
Q38.

Why should you avoid using public Wi-Fi to access your email?

Single Answer MCQ
Q-00112578
View explanation
Q39.

Which of the following can help enhance your privacy on social networking sites?

Single Answer MCQ
Q-00112579
View explanation
Q40.

Which of the following is NOT a benefit of using email encryption?

Single Answer MCQ
Q-00112580
View explanation
Q41.

Which statement is true about spam emails?

Single Answer MCQ
Q-00112581
View explanation
Q42.

What does 'identity theft' entail?

Single Answer MCQ
Q-00112582
View explanation
Q43.

When accessing online platforms, what should you always be cautious of?

Single Answer MCQ
Q-00112583
View explanation
Q44.

What is the best way to handle a password you believe has been compromised?

Single Answer MCQ
Q-00112584
View explanation
Q45.

What is the purpose of cybersecurity software?

Single Answer MCQ
Q-00112585
View explanation
Q46.

What is the primary reason to use privacy settings on social networking sites?

Single Answer MCQ
Q-00112586
View explanation
Q47.

Which of the following is a safe practice when creating a password for a social networking account?

Single Answer MCQ
Q-00112587
View explanation
Q48.

What should you do if you receive a friend request from someone you don't know?

Single Answer MCQ
Q-00112588
View explanation
Q49.

Which of the following describes a potential risk of sharing personal information on social media?

Single Answer MCQ
Q-00112589
View explanation
Q50.

Why is it important to verify the identity of people before accepting them as friends online?

Single Answer MCQ
Q-00112590
View explanation
Q51.

What action should you take if someone is harassing you on a social networking site?

Single Answer MCQ
Q-00112591
View explanation
Q52.

What does the term 'phishing' refer to in the context of social networking safety?

Single Answer MCQ
Q-00112592
View explanation
Q53.

Which type of content is generally considered unsafe to post on social media?

Single Answer MCQ
Q-00112593
View explanation
Q54.

What should you do if a social networking site asks for excessive personal information during account setup?

Single Answer MCQ
Q-00112594
View explanation
Q55.

When using public Wi-Fi to access social networking sites, what is a recommended action?

Single Answer MCQ
Q-00112595
View explanation
Q56.

Which of the following should you NOT share on social media?

Single Answer MCQ
Q-00112596
View explanation
Q57.

What does it mean to 'tag' someone in a post?

Single Answer MCQ
Q-00112597
View explanation
Q58.

Why is it harmful to have a public profile on social networking sites?

Single Answer MCQ
Q-00112598
View explanation
Q59.

What should you do with old posts that reveal personal information?

Single Answer MCQ
Q-00112599
View explanation
Q60.

What best defines a digital footprint?

Single Answer MCQ
Q-00112600
View explanation
Q61.

Which of the following can contribute to a person's digital footprint?

Single Answer MCQ
Q-00112601
View explanation
Q62.

Why is it important to manage your digital footprint?

Single Answer MCQ
Q-00112602
View explanation
Q63.

What would be an example of a negative consequence of a poor digital footprint?

Single Answer MCQ
Q-00112603
View explanation
Q64.

Which of the following actions can help reduce your digital footprint?

Single Answer MCQ
Q-00112604
View explanation
Q65.

How can deleting online accounts impact your digital footprint?

Single Answer MCQ
Q-00112605
View explanation
Q66.

What is a key characteristic of spam emails?

Single Answer MCQ
Q-00112606
View explanation
Q67.

What is a prudent step to take when encountering an email from an unknown sender?

Single Answer MCQ
Q-00112607
View explanation
Q68.

What type of information should you avoid sharing on social media to protect your digital footprint?

Single Answer MCQ
Q-00112608
View explanation
Q69.

How does understanding digital footprints help in cybersecurity?

Single Answer MCQ
Q-00112609
View explanation
Q70.

What happens to your digital footprint when you leave a social media platform?

Single Answer MCQ
Q-00112610
View explanation
Q71.

What term describes emails that trick you into providing personal information?

Single Answer MCQ
Q-00112611
View explanation
Q72.

What is one common misconception about deleting digital footprints?

Single Answer MCQ
Q-00112612
View explanation
Q73.

What role does privacy settings play in managing your digital footprint?

Single Answer MCQ
Q-00112613
View explanation
Q74.

What is one way to improve your digital footprint?

Single Answer MCQ
Q-00112614
View explanation
Q75.

What is identity theft?

Single Answer MCQ
Q-00112615
View explanation
Q76.

Which of the following is NOT a precaution against identity theft?

Single Answer MCQ
Q-00112617
View explanation
Q77.

What type of information should you avoid sharing on social media?

Single Answer MCQ
Q-00112619
View explanation
Q78.

How can you create a strong password?

Single Answer MCQ
Q-00112621
View explanation
Q79.

Why is identity theft considered a serious cyber crime?

Single Answer MCQ
Q-00112623
View explanation
Q80.

What should you do if you suspect you are a victim of identity theft?

Single Answer MCQ
Q-00112625
View explanation
Q81.

Which of the following is a common method of committing identity theft?

Single Answer MCQ
Q-00112627
View explanation
Q82.

What can strong privacy settings on social media do?

Single Answer MCQ
Q-00112629
View explanation
Q83.

What should be the length of a strong password?

Single Answer MCQ
Q-00112631
View explanation
Q84.

Which of the following actions should you take to monitor for identity theft?

Single Answer MCQ
Q-00112633
View explanation
Q85.

Which of the following is a sign of possible identity theft?

Single Answer MCQ
Q-00112635
View explanation
Q86.

Which of these is a reliable way to develop a secure online identity?

Single Answer MCQ
Q-00112637
View explanation
Q87.

What is social engineering in the context of identity theft?

Single Answer MCQ
Q-00112639
View explanation
Q88.

What role does antivirus software play in preventing identity theft?

Single Answer MCQ
Q-00112641
View explanation
Q89.

Why is it important to act quickly if you realize you've been a victim of identity theft?

Single Answer MCQ
Q-00112643
View explanation
Q90.

What is cyber bullying?

Single Answer MCQ
Q-00112644
View explanation
Q91.

Which of the following is a common form of cyber bullying?

Single Answer MCQ
Q-00112645
View explanation
Q92.

What should you do if you encounter cyber bullying?

Single Answer MCQ
Q-00112647
View explanation
Q93.

Under which law can cyber bullying be prosecuted?

Single Answer MCQ
Q-00112649
View explanation
Q94.

Which action can best help someone being bullied online?

Single Answer MCQ
Q-00112651
View explanation
Q95.

Cyber bullying can lead to which of the following outcomes?

Single Answer MCQ
Q-00112653
View explanation
Q96.

Which behavior is NOT a sign of cyber bullying?

Single Answer MCQ
Q-00112655
View explanation
Q97.

What is an effective measure to prevent cyber bullying?

Single Answer MCQ
Q-00112657
View explanation
Q98.

Which is a true statement about the anonymity of cyber bullies?

Single Answer MCQ
Q-00112660
View explanation
Q99.

What is a common emotional response of victims of cyber bullying?

Single Answer MCQ
Q-00112662
View explanation
Q100.

Which of the following is a characteristic of a cyber bully?

Single Answer MCQ
Q-00112664
View explanation
Q101.

What can be an effective response to combat cyber bullying in schools?

Single Answer MCQ
Q-00112666
View explanation
Q102.

Which online platform is commonly associated with incidents of cyber bullying?

Single Answer MCQ
Q-00112668
View explanation
Learn Better On The App
Built for collaborative learning

Study With Friends

Join classmates, challenge them in duels, and make practice more engaging.

Quick duels
Shared momentum

Faster access to practice, revision, and daily study flow.

Edzy mobile app preview