CBSE Class 12
Computer Science
12 Security Aspects
30
Total
0
Attempted
0
Correct
0
Wrong
00:00:00
Q-1
Which term refers to a potential danger that can harm a system?
Easy
Threats and Prevention
A
Threat
B
Firewall
C
Cookie
D
Protocol
Answer: Threat
Explanation: A threat is a possible danger to a system.
Q-2
Which of the following is a type of malware?
Easy
Malware
A
Firewall
B
Antivirus
C
Virus
D
HTTPS
Answer: Virus
Explanation: Virus is a type of malware.
Q-3
Which software is used to detect and remove malware?
Easy
Antivirus
A
Firewall
B
Antivirus
C
Browser
D
Router
Answer: Antivirus
Explanation: Antivirus protects against malware.
Q-4
Unwanted emails sent in bulk are called:
Easy
Spam
A
Cookies
B
Spam
C
Firewall
D
Virus
Answer: Spam
Explanation: Spam refers to unwanted emails.
Q-5
Which protocol provides secure communication over the internet?
Easy
HTTP vs HTTPS
A
HTTP
B
HTTPS
C
FTP
D
SMTP
Answer: HTTPS
Explanation: HTTPS is secure (uses encryption).
Q-6
Which device/software monitors and controls incoming and outgoing network traffic?
Easy
Firewall
A
Antivirus
B
Firewall
C
Router
D
Switch
Answer: Firewall
Explanation: Firewall filters network traffic.
Q-7
Cookies are used to:
Easy
Cookies
A
Delete data
B
Store user preferences
C
Spread viruses
D
Block websites
Answer: Store user preferences
Explanation: Cookies store user data/preferences.
Q-8
A person who gains unauthorized access for malicious purposes is called:
Medium
Hackers and Crackers
A
Hacker
B
Programmer
C
Cracker
D
User
Answer: Cracker
Explanation: Cracker has malicious intent.
Q-9
Which attack involves tricking users into revealing confidential information?
Medium
Network Security Threats
A
Phishing
B
Hacking
C
Spamming
D
Sniffing
Answer: Phishing
Explanation: Phishing tricks users.
Q-10
Which malware replicates itself and spreads across systems?
Medium
Malware
A
Trojan
B
Worm
C
Spyware
D
Adware
Answer: Worm
Explanation: Worm spreads automatically.
Q-11
Which malware disguises itself as legitimate software?
Medium
Malware
A
Virus
B
Worm
C
Trojan
D
Spyware
Answer: Trojan
Explanation: Trojan appears legitimate.
Q-12
Which attack involves capturing data packets?
Medium
Network Security Threats
A
Phishing
B
Sniffing
C
Spoofing
D
Spamming
Answer: Sniffing
Explanation: Sniffing captures packets.
Q-13
Which protocol is NOT secure?
Easy
HTTP vs HTTPS
A
HTTPS
B
HTTP
C
SSL
D
TLS
Answer: HTTP
Explanation: HTTP is not encrypted.
Q-14
Which type of hacker works ethically?
Easy
Hackers and Crackers
A
Black hat
B
White hat
C
Gray hat
D
Cracker
Answer: White hat
Explanation: White hat hackers are ethical.
Q-15
Which malware monitors user activity secretly?
Medium
Malware
A
Spyware
B
Virus
C
Worm
D
Firewall
Answer: Spyware
Explanation: Spyware tracks user activity.
Q-16
Which technique prevents unauthorized access to a network?
Easy
Firewall
A
Firewall
B
Spam
C
Cookies
D
Browser
Answer: Firewall
Explanation: Firewall blocks unauthorized access.
Q-17
Which term refers to sending fake identity data?
Medium
Network Security Threats
A
Sniffing
B
Spoofing
C
Spamming
D
Hacking
Answer: Spoofing
Explanation: Spoofing uses fake identity.
Q-18
Which is an example of strong password?
Easy
Threat Prevention
A
12345
B
password
C
Ab@123!
D
admin
Answer: Ab@123!
Explanation: Strong passwords have mix of characters.
Q-19
Which attack floods a network with traffic?
Medium
Network Security Threats
A
Phishing
B
DoS
C
Spoofing
D
Sniffing
Answer: DoS
Explanation: DoS overwhelms system.
Q-20
Which tool blocks unwanted websites?
Easy
Firewall
A
Firewall
B
Antivirus
C
Cookies
D
Protocol
Answer: Firewall
Explanation: Firewall filters traffic.
Q-21
A user clicks on a fake bank email link and enters credentials. What type of attack is this?
Medium
Scenario
A
Phishing
B
Sniffing
C
Spoofing
D
Spamming
Answer: Phishing
Explanation: Phishing tricks users to reveal data.
Q-22
A company installs a system to block unauthorized access from external networks. What is this system?
Easy
Scenario
A
Antivirus
B
Firewall
C
Router
D
Switch
Answer: Firewall
Explanation: Firewall protects network.
Q-23
A user installs software that secretly tracks browsing habits. What type of malware is this?
Medium
Scenario
A
Virus
B
Worm
C
Spyware
D
Trojan
Answer: Spyware
Explanation: Spyware monitors activity.
Q-24
A website uses HTTPS instead of HTTP. What is the main benefit?
Easy
Scenario
A
Faster speed
B
Encryption
C
More ads
D
Less data
Answer: Encryption
Explanation: HTTPS encrypts data.
Q-25
A hacker sends a large number of requests to crash a server. What attack is this?
Medium
Scenario
A
Phishing
B
DoS
C
Spoofing
D
Sniffing
Answer: DoS
Explanation: DoS overloads server.
Q-26
A user receives many unwanted promotional emails daily. What is this called?
Easy
Scenario
A
Cookies
B
Spam
C
Firewall
D
Virus
Answer: Spam
Explanation: Spam emails.
Q-27
A network admin installs antivirus software across all systems. What is the main purpose?
Easy
Scenario
A
Increase speed
B
Detect malware
C
Store cookies
D
Block IP
Answer: Detect malware
Explanation: Antivirus detects malware.
Q-28
A hacker pretends to be a trusted website to steal login details. Which attack is this?
Medium
Scenario
A
Spoofing
B
Sniffing
C
Phishing
D
Spamming
Answer: Spoofing
Explanation: Spoofing uses fake identity.
Q-29
A browser saves login information for future use. What is being used?
Easy
Scenario
A
Firewall
B
Cookies
C
Virus
D
Protocol
Answer: Cookies
Explanation: Cookies store user data.
Q-30
A security expert tests system vulnerabilities without harming it. What type of hacker is this?
Easy
Scenario
A
Black hat
B
White hat
C
Cracker
D
Attacker
Answer: White hat
Explanation: White hat hackers are ethical.
◀
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
▶