Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 10 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. The system deliver message using ..... message queue.
2. ..... locks the user's access to data in exchange for money
3. Which of the following is a method to identify secure websites?
4. A virus is a network ..... issue
5. Backdoor refers to:
6. A ..... has the same intent as a cracker but often uses pre written hacking/cracking programs because he/she does not have technical skills and knowledge.
7. You have installed a program which needs internet access. The software can be started but does not seem to connect to the internet. Which one of the following actions is most likely needed to solve the problem?
8. What is the primary purpose of encryption in data security?
9. What will Attackers always search for within your systems and networks?
10. Which is the most important asset under It security.
11. What does SMTP stand for?
12. Who has the responsibility for the development of a security policy?
13. Hacking is illegal under:
14. It's OK for organisations to pass your data on to other organisations if they ask your permission first.
15. A doorbell camera is an example of a universally connected device and can be hacked.
16. An attack on a network that is designed to slow the network down by flooding it with useless traffic.
17. Eavesdropping is related to man-in-the-middle attacks.
18. How does a zero-day vulnerability differ from malware?
19. What does phising typically involve?
20. Which of the following is a recommended password practice?
21. If you receive an attachment from someone you don't know, you should never open it.
22. What is the botnet I talked about?
23. Fill in the blank:Using two different credentials for authorization is known as .....
24. Select the correct dropdowns to describe YouTube's purpose and audience.YouTube is designed for sharing
25. Why is it important for Shaan, Ria, and Kavya to regularly back up their data?
26. Which of the following is NOT a type of cyber security threat?
27. The authenticity and security of data travelling over a network are ensured by?
28. Name one common type of malware that can infect computers.
29. Which approach is used to implements security with no particulars aspects or criteria.
30. Which layer of the OSI model is responsible for end-to-end communication and error checking?
31. Apa langkah yang paling penting dalam menjaga keamanan jaringan Wi-Fi rumah Anda?
32. Which of the following people should you share your password with when they ask?
33. To avoid your computer being infected by malware, you should not:
34. The practice of allowing users to use their own personal devices to connect to an organizational network.
35. Those that attack for financial gain
36. What should you do if you think you have been hacked?
37. In the United States, if a consumer finds a problem on their credit report, they must first send a letter to the credit-reporting agency. Under federal law, how many days does the agency have to investigate and respond to the alleged inaccuracy and issue a corrected report?
38. Sending requests to a single server using hijacked machines
39. Is name, address, email and phone number part of private information?
40. What should you do if your device is lost or stolen?
41. Another name for a zombie computer is:
42. An occurrence in which thieves steal other people's personal and financial information for their own personal gain.
43. Which of the following question protocols are used to exchange data securely.?
44. A type of action that has the potential to cause harm
45. Which of the following database is queried by Whois?
46. What are the features of cyber security?
47. What is the main goal of cyber security?
48. A field technician reports back that the computer they are troubleshooting has exposed distended capacitors. Which component has most likely failed?
49. Which of the following does not result in the loss of data?
50. The following security risk has the least severity
51. The Latest Threats and Exploits goes through a rigorous testing process as they grow and are developed?
52. Which of the following is a type of software that is designed to detect, prevent, and remove malicious software?
53. Anti Virus software are powerful tools. It could catch everything. It can defend us from all possible virus attack.
54. Launched from several infected host machines looding systems, servers, and/or networks with traffic to overload resources and bandwidth
55. Which of the folllowing is a secure password?
56. What was the SkillSoft Video Training Topic of Day 3?
57. Which of the following is a type of software that allows users to create, edit, and manage databases?
58. ..... is the information, only authorize users are capable of accessing the information.
59. Which of the following best describes a Trojan Horse
60. Which one of the following best describes the purpose of decrypting e-mail?