This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 10 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 10 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. The system deliver message using ..... message queue. A) LILO (Last In Last Out). B) LIFO (Last In First Out). C) FIFO (First In First Out). D) FILO (First In Last Out). Show Answer Correct Answer: C) FIFO (First In First Out). 2. ..... locks the user's access to data in exchange for money A) Virus. B) Spyware. C) Beware. D) Ransomware. Show Answer Correct Answer: D) Ransomware. 3. Which of the following is a method to identify secure websites? A) Checking for a padlock icon in the browser's address bar. B) Seeing a lot of advertisements on the page. C) Looking for a high loading speed. D) Finding a website with a colorful design. Show Answer Correct Answer: A) Checking for a padlock icon in the browser's address bar. 4. A virus is a network ..... issue A) Security. B) Scam. C) Password. D) Report. Show Answer Correct Answer: A) Security. 5. Backdoor refers to: A) A technique in which a system security mechanism is bypassed without detection to access computer data. B) An encryption algorithm for securing files. C) An Anti-spamming tool. D) None of the above. Show Answer Correct Answer: A) A technique in which a system security mechanism is bypassed without detection to access computer data. 6. A ..... has the same intent as a cracker but often uses pre written hacking/cracking programs because he/she does not have technical skills and knowledge. A) SCRIPT KIDDIES. B) CYBER TERRORIST. C) CRACKER. D) HACKER. Show Answer Correct Answer: A) SCRIPT KIDDIES. 7. You have installed a program which needs internet access. The software can be started but does not seem to connect to the internet. Which one of the following actions is most likely needed to solve the problem? A) Restart the computer. B) Re-install the software. C) Make a complete anti-virus scan of your computer. D) Allow the program access through the firewall. Show Answer Correct Answer: D) Allow the program access through the firewall. 8. What is the primary purpose of encryption in data security? A) To shift letters by a predetermined number (as in the Caesar Cipher). B) To convert text into ASCII code. C) To translate text into hexadecimal format. D) To apply a mathematical algorithm that transforms text into a scrambled format. Show Answer Correct Answer: D) To apply a mathematical algorithm that transforms text into a scrambled format. 9. What will Attackers always search for within your systems and networks? A) A. Exploits. B) B. Vulnerabilities. C) All the above. D) None of the above. Show Answer Correct Answer: B) B. Vulnerabilities. 10. Which is the most important asset under It security. A) Softwares including antivirus. B) Computer hardware and its peripherals. C) Information/Data. D) IT Security Policy. Show Answer Correct Answer: C) Information/Data. 11. What does SMTP stand for? A) Simple Mail Transfer Protocol. B) Strategic Medium Term Plan. C) Small Mail Transfer Protocol. D) Safe Mail Transfer Protocol. Show Answer Correct Answer: A) Simple Mail Transfer Protocol. 12. Who has the responsibility for the development of a security policy? A) Clerical staff. B) Middle management. C) Senior management. D) Executives. Show Answer Correct Answer: C) Senior management. 13. Hacking is illegal under: A) The Data Protection Act. B) The Computer Misuse Act. C) Copyright Law. D) Health and Safety Law. Show Answer Correct Answer: B) The Computer Misuse Act. 14. It's OK for organisations to pass your data on to other organisations if they ask your permission first. A) True. B) False. C) Under certain conditions. D) None of the above. Show Answer Correct Answer: A) True. 15. A doorbell camera is an example of a universally connected device and can be hacked. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 16. An attack on a network that is designed to slow the network down by flooding it with useless traffic. A) Spam. B) Spyware. C) Malware. D) Virus. Show Answer Correct Answer: A) Spam. 17. Eavesdropping is related to man-in-the-middle attacks. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 18. How does a zero-day vulnerability differ from malware? A) It is a flaw in software when it was released, not an infection. B) It is not a security concern, where malware is a concern. C) It can be passed from one computer to another, where malware cannot. D) They are the same type of threat. Show Answer Correct Answer: A) It is a flaw in software when it was released, not an infection. 19. What does phising typically involve? A) Using malware to access data. B) Pysical intrusion into a building. C) Sending fake emails to obtain information. D) Creating fake websites for transactions. Show Answer Correct Answer: C) Sending fake emails to obtain information. 20. Which of the following is a recommended password practice? A) Share passwords with others. B) Use simple dictionary words. C) Change passwords regularly. D) Use the same password for all accounts. Show Answer Correct Answer: C) Change passwords regularly. 21. If you receive an attachment from someone you don't know, you should never open it. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 22. What is the botnet I talked about? A) A Cyber attack. B) MIRAI. C) Josephine White. D) Paras Jha. Show Answer Correct Answer: B) MIRAI. 23. Fill in the blank:Using two different credentials for authorization is known as ..... A) Dual factor verification. B) Biometric verification. C) Multifactor authentication. D) Multi-credential verification. E) Two-factor authorization (2FA). Show Answer Correct Answer: E) Two-factor authorization (2FA). 24. Select the correct dropdowns to describe YouTube's purpose and audience.YouTube is designed for sharing A) Professional Networking. B) Long Videos. C) Photos. D) Short Videos. Show Answer Correct Answer: B) Long Videos. 25. Why is it important for Shaan, Ria, and Kavya to regularly back up their data? A) To protect against data loss in case of hardware failure, accidental deletion, or security breaches. B) To increase the risk of data loss. C) To save money on storage devices. D) To make the computer run faster. Show Answer Correct Answer: A) To protect against data loss in case of hardware failure, accidental deletion, or security breaches. 26. Which of the following is NOT a type of cyber security threat? A) Antivirus software. B) Spyware. C) Worm. D) Trojan horse. Show Answer Correct Answer: A) Antivirus software. 27. The authenticity and security of data travelling over a network are ensured by? A) Firewall. B) Antivirus. C) Pentesting Tools. D) Network-security protocols. Show Answer Correct Answer: D) Network-security protocols. 28. Name one common type of malware that can infect computers. A) Worm. B) Trojan. C) Virus. D) Adware. Show Answer Correct Answer: C) Virus. 29. Which approach is used to implements security with no particulars aspects or criteria. A) Adhoc approach. B) Risk-based security. C) Compliance based security. D) Risk-Free approach. Show Answer Correct Answer: A) Adhoc approach. 30. Which layer of the OSI model is responsible for end-to-end communication and error checking? A) Transport Layer. B) Session Layer. C) Network Layer. D) Data Link Layer. Show Answer Correct Answer: A) Transport Layer. 31. Apa langkah yang paling penting dalam menjaga keamanan jaringan Wi-Fi rumah Anda? A) Menggunakan kata sandi yang kuat dan enkripsi WPA2 atau lebih tinggi. B) Menggunakan nama jaringan yang menarik. C) Mengaktifkan firewall di perangkat. D) Menghindari mengunduh aplikasi. Show Answer Correct Answer: A) Menggunakan kata sandi yang kuat dan enkripsi WPA2 atau lebih tinggi. 32. Which of the following people should you share your password with when they ask? A) Network managers. B) Call centre workers. C) Security experts. D) Company managers. E) Nobody. Show Answer Correct Answer: E) Nobody. 33. To avoid your computer being infected by malware, you should not: A) Open email attachments. B) Open emails from people you don't know. C) Download music, movies or software from illegal sites. D) Post personal details on social networking sites. Show Answer Correct Answer: C) Download music, movies or software from illegal sites. 34. The practice of allowing users to use their own personal devices to connect to an organizational network. A) Servers. B) Software. C) RootKit. D) BYOD. Show Answer Correct Answer: D) BYOD. 35. Those that attack for financial gain A) Cybercriminal:. B) Cybersecurity:. C) Cyberterrorism:. D) None of the above. Show Answer Correct Answer: A) Cybercriminal:. 36. What should you do if you think you have been hacked? A) Report the problem to the company. B) Change your password. C) Tell your parents or a trusted adult. D) All of the above. Show Answer Correct Answer: D) All of the above. 37. In the United States, if a consumer finds a problem on their credit report, they must first send a letter to the credit-reporting agency. Under federal law, how many days does the agency have to investigate and respond to the alleged inaccuracy and issue a corrected report? A) 60. B) 15. C) 45. D) 30. Show Answer Correct Answer: D) 30. 38. Sending requests to a single server using hijacked machines A) DDOS. B) Worm. C) Phishing. D) Virus. Show Answer Correct Answer: A) DDOS. 39. Is name, address, email and phone number part of private information? A) Yes. B) NO. C) All the above. D) None of the above. Show Answer Correct Answer: A) Yes. 40. What should you do if your device is lost or stolen? A) Report it to the authorities and remotely wipe the data if possible. B) Ignore it and hope for the best. C) Post about it on social media. D) Keep using it as if nothing happened. Show Answer Correct Answer: A) Report it to the authorities and remotely wipe the data if possible. 41. Another name for a zombie computer is: A) Virtual Computer. B) Bot. C) Network System. D) Packet Sniffer. Show Answer Correct Answer: B) Bot. 42. An occurrence in which thieves steal other people's personal and financial information for their own personal gain. A) Impersonation. B) Reconnaissance. C) Wiretapping. D) Identify Theft. Show Answer Correct Answer: D) Identify Theft. 43. Which of the following question protocols are used to exchange data securely.? A) TFTP. B) SFTP. C) SMTP. D) IMAP. Show Answer Correct Answer: B) SFTP. 44. A type of action that has the potential to cause harm A) Threat actor:. B) Threat agent:. C) Threat likelihood:. D) Threat:. Show Answer Correct Answer: D) Threat:. 45. Which of the following database is queried by Whois? A) ICANN. B) DNS. C) ARIN. D) APNIC. Show Answer Correct Answer: A) ICANN. 46. What are the features of cyber security? A) Compliance. B) Defense against internal threats. C) Threat Prevention. D) All Of The Above. Show Answer Correct Answer: D) All Of The Above. 47. What is the main goal of cyber security? A) To protect data networks and systems from attack. B) To hack into other people's computers. C) To create eye-catching images and posters. D) To monitor social media for potential threats. Show Answer Correct Answer: A) To protect data networks and systems from attack. 48. A field technician reports back that the computer they are troubleshooting has exposed distended capacitors. Which component has most likely failed? A) CPU. B) Power supply. C) Motherboard. D) RAM. Show Answer Correct Answer: C) Motherboard. 49. Which of the following does not result in the loss of data? A) Human Error. B) System Malfunction. C) Hardware Theft. D) Uninstalling Web Browser. Show Answer Correct Answer: D) Uninstalling Web Browser. 50. The following security risk has the least severity A) Phishing. B) Hacking. C) Pharming. D) Spamming. Show Answer Correct Answer: D) Spamming. 51. The Latest Threats and Exploits goes through a rigorous testing process as they grow and are developed? A) TRUE. B) FALSE. C) All the above. D) None of the above. Show Answer Correct Answer: B) FALSE. 52. Which of the following is a type of software that is designed to detect, prevent, and remove malicious software? A) Ransomware software. B) Antivirus software. C) Malware software. D) Spyware software. Show Answer Correct Answer: B) Antivirus software. 53. Anti Virus software are powerful tools. It could catch everything. It can defend us from all possible virus attack. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 54. Launched from several infected host machines looding systems, servers, and/or networks with traffic to overload resources and bandwidth A) Worms. B) Zero Day Exploit. C) Denial of Service(DOS). D) Trojan. Show Answer Correct Answer: C) Denial of Service(DOS). 55. Which of the folllowing is a secure password? A) H%$ 3(n. B) Password123. C) Leo@777. D) Qwerty. Show Answer Correct Answer: A) H%$ 3(n. 56. What was the SkillSoft Video Training Topic of Day 3? A) Social Engineering Techniques & Attack Types. B) Implementing Secure Protocols & Application Security Solutions. C) Threat Actors, Intelligence Sources, & Vulnerabilities. D) Identifying Different Cyber Attacks. Show Answer Correct Answer: C) Threat Actors, Intelligence Sources, & Vulnerabilities. 57. Which of the following is a type of software that allows users to create, edit, and manage databases? A) Spreadsheet management software. B) Presentation software. C) Word processing software. D) Database management software. Show Answer Correct Answer: D) Database management software. 58. ..... is the information, only authorize users are capable of accessing the information. A) Non reputation. B) Availablity. C) Confidentiality. D) Integrity. Show Answer Correct Answer: B) Availablity. 59. Which of the following best describes a Trojan Horse A) Malicious software that misleads users of its intent, which is to allow unauthorised access to your system. B) Malicious software that replicates itself and spreads through your network to steal data. C) Malicious software that it usually attached to an email and sends itself around a network to allow unauthorised access to your system. D) Malicious software that sets your computer on fire. Show Answer Correct Answer: A) Malicious software that misleads users of its intent, which is to allow unauthorised access to your system. 60. Which one of the following best describes the purpose of decrypting e-mail? A) It reduces the size of file attachments in e-mail. B) It removes the need for anti-virus protection of e-mail. C) It automatically corrects wrong e-mail addresses. D) It makes encrypted e-mail readable. Show Answer Correct Answer: D) It makes encrypted e-mail readable. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books