google.com, pub-6167773875660516, DIRECT, f08c47fec0942fa0 security aspects mcq | security aspects class 12 mcq | mcq on security aspects - 2nd puc computer science

security aspects mcq | security aspects class 12 mcq | mcq on security aspects

security aspects mcq,security aspects class 12 mcq,security aspects,mcq on security aspects,mcq on security aspects with answers pdf,mcq on security aspects with answers,mcq on security aspects pdf free download,mcq on security aspects pdf,mcq on security aspects pdf download,security aspects mcq with answers pdf,security aspects class 12 mcq with answers pdf

security aspects class 12 mcq

1. Which term describes software developed specifically to damage hardware, steal data, or cause other trouble?





ANSWER= B) Malware

2. What is the ideal but impractical way to eliminate network security threats?





ANSWER= B) Isolate the computer from all external links

3. In network security, a vulnerability is best defined as:





ANSWER= C) A weakness that can be exploited

4. Which of the following is NOT a type of malware listed in the chapter?





ANSWER= C) Rootkit

5. Who coined the term “computer virus” in 1985?





ANSWER= B) Fred Cohen

6. What characteristic distinguishes a worm from a virus?





ANSWER= B) Self-replicates without a host program

7. Which malware type encrypts user data and demands payment for decryption?





ANSWER= C) Ransomware

8. The WannaCry outbreak in May 2017 spread by:





ANSWER= B) Encrypting data and demanding Bitcoin ransom

9. A Trojan spreads primarily by:





ANSWER= C) Tricking users into installing false software

10. Spyware is designed to:





ANSWER= B) Record and send user information without consent

11. Adware generates revenue by:





ANSWER= C) Displaying advertisements and pay-per-click ads

12. Which countermeasure thwarts software keyloggers by randomizing key layout?





ANSWER= C) Online virtual keyboard

13. A keylogger’s primary function is to:





ANSWER= B) Record every keystroke made by a user

14. Which of the following is a common malware distribution channel?





ANSWER= B) Spam email

15. What sign might indicate a malware infection?





ANSWER= B) Frequent pop-ups prompting software downloads

16. Which preventive measure ensures malware definitions stay current?





ANSWER= B) Regularly updating antivirus software

17. Signature-based detection relies on:





ANSWER= C) Known virus signature database

18. Sandbox detection identifies malware by:





ANSWER= B) Observing behavior in an isolated environment

19. Heuristic analysis in antivirus software compares code against:





ANSWER= B) Known malware patterns in a heuristic database

20. Real-time protection monitors:





ANSWER= B) Active memory for suspicious behavior

21. Spam is most commonly associated with:





ANSWER= B) Unsolicited email messages

22. Which protocol sends data without encryption?





ANSWER= C) HTTP

23. Which protocol encrypts data in transit?





ANSWER= C) HTTPS

24. HTTPS requires which of the following on the server?





ANSWER= A) SSL digital certificate

25. A firewall placed between two networks is called a:





ANSWER= B) Network firewall

26. A firewall on an individual computer is known as:





ANSWER= C) Host-based firewall

27. The original term “magic cookie” referred to:





ANSWER= C) A data packet sent and returned unchanged

28. Session cookies are primarily used to:





ANSWER= B) Maintain a user’s session and expire on timeout

29. Zombie cookies are characterized by:





ANSWER= B) Recreation after deletion

30. Which cookie type may share data with third parties without consent?





ANSWER= D) Third-party cookies

31. Ethical hackers hired to fix security flaws are known as:





ANSWER= B) White hats

32. Hackers who exploit flaws for illegal gain are:





ANSWER= C) Black hats

33. Hackers who operate between ethical and malicious intent are:





ANSWER= B) Grey hats

34. A DoS attack aims to:





ANSWER= B) Make a service unavailable by flooding with requests

35. In a DDoS attack, traffic originates from:





ANSWER= B) Multiple compromised machines worldwide

36. Asymmetric routing in intrusion involves:





ANSWER= B) Sending packets via multiple paths to bypass sensors

37. A buffer overflow attack works by:





ANSWER= B) Overwriting memory with malicious code during an overflow

38. Traffic flooding against an intrusion detection system causes:





ANSWER= B) Inability to monitor packets properly

39. Snooping (sniffing) refers to:





ANSWER= B) Capturing and analyzing network traffic secretly

40. Eavesdropping differs from snooping by being:





ANSWER= A) Real-time interception rather than stored traffic

41. Which tool or feature may legitimately be used for snooping by administrators?





ANSWER= B) SPAN port on a switch

42. An example of network propagation of malware is:





ANSWER= B) Worm spreading across connected systems

43. One sign of malware infection is:





ANSWER= B) Mass emails sent from your account without consent

44. Which practice helps prevent malware via removable media?





ANSWER= C) Scan any removable device before transferring data

45. A common preventive measure against ransomware is:





ANSWER= B) Regularly backing up important data

46. Which method does NOT identify polymorphic malware effectively?





ANSWER= B) Signature-based detection

47. Which method uses machine learning to classify files?





ANSWER= B) Data mining techniques

48. An authentication cookie is used to:





ANSWER= A) Track sessions and keep users logged in

49. Which attack involves secretly listening via a hidden microphone?





ANSWER= B) Eavesdropping

50. The first barrier against network-based malware like worms is typically the:





ANSWER= B) Firewall

51. Assertion (A): A worm does not require a host program to spread. Reason (R): Worms are standalone programs capable of self-replication across networks without user intervention.





ANSWER= A) Both A and R are true, and R is the correct explanation of A

52. Assertion (A): A Trojan can self-replicate and infect other files. Reason (R): A Trojan disguises itself as legitimate software and spreads only when a user installs it.





ANSWER= D) A is false, R is true

53. Assertion (A): Ransomware always encrypts data before demanding payment. Reason (R): Some ransomware simply blocks access to data without encryption.





ANSWER= D) A is false, R is true

54. Assertion (A): Signature-based detection fails against polymorphic malware. Reason (R): Polymorphic malware changes its code signature with each infection.





ANSWER= A) Both A and R are true, and R is the correct explanation of A

55. Assertion (A): Heuristic analysis can detect previously unknown malware. Reason (R): Heuristics compare suspect code against a database of known behavioural patterns.





ANSWER= A) Both A and R are true, and R is the correct explanation of A

56. Assertion (A): An online virtual keyboard uses a fixed QWERTY layout. Reason (R): A fixed layout can be exploited by sophisticated keylogger software.





ANSWER= D) A is false, R is true

57. Assertion (A): Session cookies expire when a browser session ends. Reason (R): Session cookies store user preferences permanently across visits.





ANSWER= C) A is true, R is false

58. Assertion (A): HTTPS encrypts data before transmission. Reason (R): HTTPS requires an SSL digital certificate on the server for encryption and decryption.





ANSWER= A) Both A and R are true, and R is the correct explanation of A

59. Assertion (A): A host-based firewall monitors traffic between networks. Reason (R): Host-based firewalls are installed on individual machines to filter their own traffic.





ANSWER= D) A is false, R is true

60. Assertion (A): Grey hat hackers exploit vulnerabilities for political gains. Reason (R): Grey hats hack systems for challenge rather than monetary or political motives.





ANSWER= D) A is false, R is true

61. Assertion (A): A DDoS attack is easier to mitigate than a DoS attack. Reason (R): DDoS uses multiple distributed sources, complicating traffic filtering.





ANSWER= D) A is false, R is true

62. Assertion (A): Buffer overflow attacks overwrite memory with malicious code. Reason (R): Intrusion sensors detect buffer overflow by monitoring packet size only.





ANSWER= C) A is true, R is false

63. Assertion (A): Snooping requires real-time interception of live communication. Reason (R): Snooping captures network traffic for later analysis rather than live monitoring.





ANSWER= D) A is false, R is true

64. Assertion (A): Eavesdropping can occur via rootkit malware on devices. Reason (R): Rootkits enable unauthorized access to built-in microphones and cameras.





ANSWER= A) Both A and R are true, and R is the correct explanation of A

65. Assertion (A): Spam filters learn from user-marked spam to block future messages. Reason (R): Marking spam trains the service’s automatic detection algorithm.





ANSWER= A) Both A and R are true, and R is the correct explanation of A

66. Assertion (A): Supercookies resemble legitimate cookies and evade deletion. Reason (R): Zombie cookies are recreated after deletion by websites.





ANSWER= B) Both A and R are true, but R is not the correct explanation of A

67. Assertion (A): Signature-based antivirus requires real-time monitoring to detect dormant malware. Reason (R): Signature-based detection only scans files at rest, not active memory behaviour.





ANSWER= D) A is false, R is true

68. Assertion (A): Data mining techniques in antivirus use machine learning models. Reason (R): Machine learning can classify unknown files as benign or malicious based on features.





ANSWER= A) Both A and R are true, and R is the correct explanation of A

69. Assertion (A): An on-screen keyboard randomizes key placement each use. Reason (R): Randomization prevents recording of actual keys pressed by hardware keyloggers.





ANSWER= D) A is false, R is true

70. Assertion (A): Regular backups are a preventive measure against ransomware. Reason (R): Backups allow recovery of data without paying ransom.





ANSWER= A) Both A and R are true, and R is the correct explanation of A

security aspects mcq | security aspects class 12 mcq | mcq on security aspects security aspects mcq | security aspects class 12 mcq | mcq on security aspects Reviewed by Vision Academy on August 01, 2025 Rating: 5

No comments:

CheckOut

Powered by Blogger.