Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. An attack on a computer system to steal data, disrupt service or cause damage
2. Which of the following is NOT a password cracking software tool?
3. One common type of a vulnerability scan is a port scan.
4. A user need to remove an application from a windows computer. Which of the following is the BEST way to remove the application?
5. What does Chris do in his day-to-day activities?
6. You need to be careful on the internet because people can create a fake account.True or False?
7. Which of the following is a biometric verification method?
8. Programs and other operating information used by a computer.
9. Which is the latest version of Information security policy?
10. Which is not a component of a Information System?
11. What is one way to gain knowledge and skills in cyber security?
12. What kind of combinations should be use for creating a password?
13. Fill in the blank:Stealing another person's personal information and using it to impersonate the victim is known as .....
14. It runs security-critical code that authenticates users with increasing timeouts. "It" here refers to .....
15. Chain emails are:
16. You received a message from someone posing as DIT officer/IT Tech Support to share the Domain ID & MAC ID of your PC for configuration. What kind of attack is being perpetrated
17. Which one option is not type of cybercrime?
18. How can Priya, Riya, and Kriti protect their personal information while using social media?
19. Which of the below is a popular victim of cyber attackers looking to gain the IP address of a target or victim user?
20. What is the best way to use raspberry pi to block ads?
21. Why is it risky to use the same password for multiple websites?
22. Read the sentence below then choose the best response for you!"When I'm chatting with others online, I ..... "
23. Manakah dari berikut ini yang merupakan perilaku positif dalam kewargaan digital?
24. An organisation such as a school holds personal data about you. The organisation:
25. According to a reliable source, which industry sector saw a rise in phishing attacks?
26. When was Future Skills Portal started?
27. You are solving a problem with a desktop computer that was caused by human error. When is the appropriate time to implement preventive measures, according to the best practice methodology?
28. If you receive a suspicious email, should you?
29. Which one of the following is a method of identity theft?
30. Meretas komputer orang dengan membonceng link palsu disebut .....
31. What is the meaning of the term 'cyber'?
32. If you send company files from your office email to your personal email, what are you risking?
33. The latest security technologies of machine learning threast/ teknologi terkini.
34. Preventive measures that can be used include
35. *may open a "back door" into your computer system through which your personal information can be harvested.*It can also use your computer power and network bandwidth to send thousands of spam emails to others.
36. Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access
37. What type of attacker is most likely to use information you have posted about yourself on a social networking site?
38. Which of the following is not an advantage of cyber security?
39. What is blagging?
40. ..... is an internet scam done by cybercriminals where the user is convinced digitally to provide confidential information.
41. A discussion forum on the internet will filter posts that are inappropriate, rude, off-topic or offensive. Such forum is called
42. If a website is using HTTPS it means that .....
43. What is a DDoS attack?
44. When working remotely, or working from home, I can use my personal laptop, without any prior approval.
45. Proses menjatuhkan sistem pihak lain dengan cara membombardir pesan disebut .....
46. Fill in the blank:Registering a fake website for use when a victim misspells the web address of an actual site is called .....
47. Who is responsible for the technology used in school?
48. What is cybersecurity?
49. Which of the below is a hacking technique in which cybercriminals create fictitious web pages or domains to deceive or obtain more traffic?
50. Which URL(s) bring(s) you to Google's Home Page?
51. What is the key point to note about webpages and the information they contain?
52. ..... are programmes or procedures that enable hackers to maintain control of a computer system.?
53. At which OSI layer does the IP protocol function?
54. Which of the following options is the best for securing your router?
55. What is the purpose of encryption?
56. The internet or the storage on the internet
57. Ensures that only authorized parties can view the information
58. Which one of the following should be reported to the national fraud and cyber crime agency?
59. What does the term 'bandwidth' refer to in networking?
60. Which of the following is a type of attack on encryption that tries every possible key combination?