This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 1 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. An attack on a computer system to steal data, disrupt service or cause damage A) Cyber attack. B) Cyber security. C) Trojan. D) Unpatched software. E) Spyware. Show Answer Correct Answer: A) Cyber attack. 2. Which of the following is NOT a password cracking software tool? A) John the Ripper. B) Hashcat. C) Honey Monkey. D) Cain & Abel. Show Answer Correct Answer: C) Honey Monkey. 3. One common type of a vulnerability scan is a port scan. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 4. A user need to remove an application from a windows computer. Which of the following is the BEST way to remove the application? A) Drag the application to the trash, and select Empty Trash. B) Right-click on the application and select Delete. C) Run the uninstaller provided by the application vendor. D) Delete the application binary. Show Answer Correct Answer: C) Run the uninstaller provided by the application vendor. 5. What does Chris do in his day-to-day activities? A) Managing social media accounts. B) Checking emails and helping with accounts. C) Writing code for applications. D) Designing websites. Show Answer Correct Answer: B) Checking emails and helping with accounts. 6. You need to be careful on the internet because people can create a fake account.True or False? A) False. B) True. C) All the above. D) None of the above. Show Answer Correct Answer: B) True. 7. Which of the following is a biometric verification method? A) Fingerprints. B) Email verification. C) Security tokens. D) Usernames. Show Answer Correct Answer: A) Fingerprints. 8. Programs and other operating information used by a computer. A) Software. B) IP address. C) Hardware. D) Cloud computer. Show Answer Correct Answer: A) Software. 9. Which is the latest version of Information security policy? A) BOB ISMS ISPO V5.6. B) BOB ISMS ISPO V5.3. C) BOB ISMS ISPO V5.5. D) BOB ISMS ISPO V5.4. Show Answer Correct Answer: D) BOB ISMS ISPO V5.4. 10. Which is not a component of a Information System? A) Network. B) Hardware. C) Data Encryption. D) Software. Show Answer Correct Answer: C) Data Encryption. 11. What is one way to gain knowledge and skills in cyber security? A) Take online courses. B) Participate in tech boot camps. C) Join competitions and challenges. D) All of the above. Show Answer Correct Answer: D) All of the above. 12. What kind of combinations should be use for creating a password? A) Letters. B) Numbers. C) Special Characters. D) All of them. Show Answer Correct Answer: D) All of them. 13. Fill in the blank:Stealing another person's personal information and using it to impersonate the victim is known as ..... A) Credit fraud. B) Cyber impersonation. C) Data hacking. D) Identity theft. Show Answer Correct Answer: D) Identity theft. 14. It runs security-critical code that authenticates users with increasing timeouts. "It" here refers to ..... A) Knox security Vault. B) Knox Mobile Enrollment. C) Knox Enterprise. D) Knox Vault. Show Answer Correct Answer: D) Knox Vault. 15. Chain emails are: A) A way to ensure you have good luck. B) A way to stay in touch with your friends. C) A way for you to help cybercriminals to spread scams & tricks. D) None of these are correct. Show Answer Correct Answer: C) A way for you to help cybercriminals to spread scams & tricks. 16. You received a message from someone posing as DIT officer/IT Tech Support to share the Domain ID & MAC ID of your PC for configuration. What kind of attack is being perpetrated A) Phishing. B) Insider Threat. C) Whaling. D) Social Engineering. Show Answer Correct Answer: D) Social Engineering. 17. Which one option is not type of cybercrime? A) Data thist. B) Damage to data and system. C) Forgery. D) Installing antivirus for protection. Show Answer Correct Answer: D) Installing antivirus for protection. 18. How can Priya, Riya, and Kriti protect their personal information while using social media? A) Share personal information with anyone who asks for it. B) Use strong and unique passwords for social media accounts, enable privacy settings, and avoid sharing sensitive information publicly. C) Ignore privacy settings and share all personal information publicly. D) Use the same password for all social media accounts. Show Answer Correct Answer: B) Use strong and unique passwords for social media accounts, enable privacy settings, and avoid sharing sensitive information publicly. 19. Which of the below is a popular victim of cyber attackers looking to gain the IP address of a target or victim user? A) Websites. B) Emails. C) IP tracer. D) Web pages. Show Answer Correct Answer: A) Websites. 20. What is the best way to use raspberry pi to block ads? A) An undertrained AI. B) A properly trained AI. C) An algorithim. D) None of the above. Show Answer Correct Answer: C) An algorithim. 21. Why is it risky to use the same password for multiple websites? A) If one password is stolen, all accounts can be hacked. B) It takes longer to type. C) It can confuse websites. D) It looks Unprofessional. Show Answer Correct Answer: A) If one password is stolen, all accounts can be hacked. 22. Read the sentence below then choose the best response for you!"When I'm chatting with others online, I ..... " A) Never chat with others online. B) Share too much private information. C) Share some private information. D) Share no private information. Show Answer Correct Answer: D) Share no private information. 23. Manakah dari berikut ini yang merupakan perilaku positif dalam kewargaan digital? A) Menggunakan media sosial untuk menyerang pribadi orang lain. B) Menyebarkan berita yang belum diverifikasi. C) Membagikan informasi pribadi tanpa izin. D) Mengakses situs web ilegal. E) Menghormati pendapat oang lain di dunia maya. Show Answer Correct Answer: E) Menghormati pendapat oang lain di dunia maya. 24. An organisation such as a school holds personal data about you. The organisation: A) Must register with the Local Authority. B) Must register with the Data Protection Registrar. C) Has to ask your permission to keep your data on their computer. D) Must delete the data when you leave. Show Answer Correct Answer: B) Must register with the Data Protection Registrar. 25. According to a reliable source, which industry sector saw a rise in phishing attacks? A) Social networking. B) Gaming. C) Financial institutions. D) None of these. Show Answer Correct Answer: B) Gaming. 26. When was Future Skills Portal started? A) 9th February 2018. B) 19th November 2018. C) 29th February 2018. D) 19th February 2018. Show Answer Correct Answer: D) 19th February 2018. 27. You are solving a problem with a desktop computer that was caused by human error. When is the appropriate time to implement preventive measures, according to the best practice methodology? A) When documenting findings, actions, and outcomes. B) When testing the theory to determine cause. C) When verifying full system functionality. D) When questioning the user to identify user changes. Show Answer Correct Answer: C) When verifying full system functionality. 28. If you receive a suspicious email, should you? A) Open the attachments. B) Click the links. C) Reply to it. D) Report it to the phishing reporting. Show Answer Correct Answer: D) Report it to the phishing reporting. 29. Which one of the following is a method of identity theft? A) Formatting. B) Skimming. C) Erasing. D) Downloading. Show Answer Correct Answer: B) Skimming. 30. Meretas komputer orang dengan membonceng link palsu disebut ..... A) DDOS. B) Phising. C) Zeus Trojan Virus. D) Spamming. Show Answer Correct Answer: C) Zeus Trojan Virus. 31. What is the meaning of the term 'cyber'? A) Computer related. B) Hacking. C) Viruses. D) Antivirus. Show Answer Correct Answer: A) Computer related. 32. If you send company files from your office email to your personal email, what are you risking? A) You may accidentally Leak the data. B) Nothing, if you trust yourself. C) It can full your email storage. D) Manager will give you more work to do from home. Show Answer Correct Answer: A) You may accidentally Leak the data. 33. The latest security technologies of machine learning threast/ teknologi terkini. A) A. cloud access security/ keselamatan akses. B) B. Face scan/ pengimbas muka. C) C. Thumb print/ cetakan ibu jari. D) None of the above. Show Answer Correct Answer: A) A. cloud access security/ keselamatan akses. 34. Preventive measures that can be used include A) Using anti-virus, anti-spyware software and a firewall. B) Thinking twice before opening attachments and clicking links even from people and companies I know. C) Telling everyone who uses a computer about ways to protect themselves and their computer. D) All answers listed. Show Answer Correct Answer: D) All answers listed. 35. *may open a "back door" into your computer system through which your personal information can be harvested.*It can also use your computer power and network bandwidth to send thousands of spam emails to others. A) Worm. B) Virus. C) WAN. D) Trojan Horse. Show Answer Correct Answer: D) Trojan Horse. 36. Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 37. What type of attacker is most likely to use information you have posted about yourself on a social networking site? A) Phisher. B) Identity thief. C) Cracker. D) Hoaxer. Show Answer Correct Answer: B) Identity thief. 38. Which of the following is not an advantage of cyber security? A) Minimizes computer freezing and crashes. B) Makes the system slower. C) Gives privacy to users. D) Protects system against viruses. Show Answer Correct Answer: B) Makes the system slower. 39. What is blagging? A) Cyber attack to redirect a website's traffic to another, fake site. B) Observing a person's private info over their shoulder. C) Inventing a scenario to target someone into divulging information. D) A virus that registers key strokes. Show Answer Correct Answer: C) Inventing a scenario to target someone into divulging information. 40. ..... is an internet scam done by cybercriminals where the user is convinced digitally to provide confidential information. A) Website attack. B) Phishing attack. C) DoS attack. D) MiTM attack. Show Answer Correct Answer: B) Phishing attack. 41. A discussion forum on the internet will filter posts that are inappropriate, rude, off-topic or offensive. Such forum is called A) Unmoderated forum. B) Moderated forum. C) Mailing list. D) Newsgroup. Show Answer Correct Answer: B) Moderated forum. 42. If a website is using HTTPS it means that ..... A) Data sent and received is encrypted. B) Data sent and received can be viewed by others. C) Data received is encrypted. D) Data sent is encrypted. Show Answer Correct Answer: A) Data sent and received is encrypted. 43. What is a DDoS attack? A) A DDoS attack is a security measure to protect against unauthorized access. B) A DDoS attack is a type of software used for data encryption. C) A DDoS attack is a malicious attempt to disrupt a service by overwhelming it with traffic from multiple sources. D) A DDoS attack is a method to enhance service performance by distributing traffic. Show Answer Correct Answer: C) A DDoS attack is a malicious attempt to disrupt a service by overwhelming it with traffic from multiple sources. 44. When working remotely, or working from home, I can use my personal laptop, without any prior approval. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 45. Proses menjatuhkan sistem pihak lain dengan cara membombardir pesan disebut ..... A) DDOS. B) Phising. C) Electromagnatic Pulse (EMP). D) Hijacking. Show Answer Correct Answer: A) DDOS. 46. Fill in the blank:Registering a fake website for use when a victim misspells the web address of an actual site is called ..... A) URL phishing. B) Misspelling trap. C) Domain hijacking. D) Typo-squatting. Show Answer Correct Answer: D) Typo-squatting. 47. Who is responsible for the technology used in school? A) Mr. Zimmerman. B) Mrs. Martucci. C) Me (the student). D) My Parents. Show Answer Correct Answer: C) Me (the student). 48. What is cybersecurity? A) Protecting physical security. B) Protecting data and computer systems from cyber threats. C) Protecting against natural disasters. D) Protecting against identity theft. Show Answer Correct Answer: B) Protecting data and computer systems from cyber threats. 49. Which of the below is a hacking technique in which cybercriminals create fictitious web pages or domains to deceive or obtain more traffic? A) Spamming. B) Mimicking. C) Pharming. D) Website-Duplication. Show Answer Correct Answer: C) Pharming. 50. Which URL(s) bring(s) you to Google's Home Page? A) Https://google.com. B) Https://gogle.com. C) Https://gooogle.com. D) All of above. Show Answer Correct Answer: A) Https://google.com. 51. What is the key point to note about webpages and the information they contain? A) What you see is all a computer will see. B) There's usually a lot of extra information for computers to work with. C) There's no hidden data on webpages. D) Computers cannot understand natural language. Show Answer Correct Answer: B) There's usually a lot of extra information for computers to work with. 52. ..... are programmes or procedures that enable hackers to maintain control of a computer system.? A) Exploits. B) Antivirus. C) Firewall. D) Worms. Show Answer Correct Answer: A) Exploits. 53. At which OSI layer does the IP protocol function? A) Transport layer. B) Network layer. C) Data link layer. D) Application layer. Show Answer Correct Answer: B) Network layer. 54. Which of the following options is the best for securing your router? A) Disable remote management on your router. B) Once the router is configured, log out as the administrator. C) Change the router's default name and password. D) All of the above. Show Answer Correct Answer: C) Change the router's default name and password. 55. What is the purpose of encryption? A) To speed up data transfer. B) To create backups of data. C) To improve the quality of images. D) To make data unreadable to unauthorized users. Show Answer Correct Answer: D) To make data unreadable to unauthorized users. 56. The internet or the storage on the internet A) Cloud. B) Gateway. C) Proxy. D) Cookies. Show Answer Correct Answer: A) Cloud. 57. Ensures that only authorized parties can view the information A) Cyberterrorism:. B) Cybersecurity:. C) Cybercriminal:. D) Confidentiality:. Show Answer Correct Answer: D) Confidentiality:. 58. Which one of the following should be reported to the national fraud and cyber crime agency? A) Phishing attempt. B) Trolling attempt. C) Broadband faults. D) Pop-up advertisements. Show Answer Correct Answer: A) Phishing attempt. 59. What does the term 'bandwidth' refer to in networking? A) The physical distance between two network devices. B) The type of data being transmitted. C) The maximum rate of data transfer across a network. D) The number of devices connected to a network. Show Answer Correct Answer: C) The maximum rate of data transfer across a network. 60. Which of the following is a type of attack on encryption that tries every possible key combination? A) Brute force attack. B) Dictionary attack. C) Rainbow table attack. D) Collision attack. Show Answer Correct Answer: A) Brute force attack. Next →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 9 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books