This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 11 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 11 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. Same keys are used for encryption and decryption in ..... cryptography scheme A) Symmetric. B) Asymmetric. C) Hash-based. D) All. Show Answer Correct Answer: A) Symmetric. 2. McAfee is an example of A) Virus. B) Photo editing software. C) Quick heal. D) Antivirus. Show Answer Correct Answer: D) Antivirus. 3. ..... is one of the safest Linux operating systems, offering invisibility and an incognito mode to protect user data. A) Fedora. B) Ubuntu. C) Tails. D) OpenSUSE. Show Answer Correct Answer: C) Tails. 4. When disposing of an old computer: A) It should be incinerated to ensure that sensitive data is destroyed. B) It should be taken to a recycling center. C) It should be taken to a landfill site. D) It should be taken apart and the outer casing recycled, the rest put in the bin. Show Answer Correct Answer: B) It should be taken to a recycling center. 5. Which one of the following best describes the purpose of a company network account? A) To provide users with a computer virus free area for secure file storage. B) To provide users with IP (Internet Protocol) telephony and text chat. C) To provide users with online entertainment like movies, music and games. D) To provide users with services like file sharing, e-mail and Internet access. Show Answer Correct Answer: D) To provide users with services like file sharing, e-mail and Internet access. 6. What is the primary purpose of a firewall in a computer network? A) To prevent unauthorized access and monitor incoming and outgoing traffic. B) To increase the speed of the internet connection. C) To store files and data securely. D) To create backups of important data. Show Answer Correct Answer: A) To prevent unauthorized access and monitor incoming and outgoing traffic. 7. What happens if you block a user on a social media platform? A) Their profile on the social media platform will be made public. B) They won't be able to say anything about you on the social media platform. C) Their social media account will be shut down. D) They won't be able to see your posts, and you won't be able to see theirs. Show Answer Correct Answer: D) They won't be able to see your posts, and you won't be able to see theirs. 8. What is the main concern regarding internal security threats, as mentioned in Chapter 1(1.4)? A) Lack of knowledge about network infrastructure. B) Unauthorized access to the building. C) Inability to centrally manage and update mobile devices. D) Potential for greater damage due to direct access. Show Answer Correct Answer: D) Potential for greater damage due to direct access. 9. Proses di mana data disembunyikan agar tidak dapat dibaca oleh orang yang tidak berwenang disebut A) Percatatan. B) Otentikasi. C) Enkripsi. D) Autorisasi. Show Answer Correct Answer: C) Enkripsi. 10. Name a common intrusion detection system used in network security. A) Nmap. B) Wireshark. C) Snort. D) Metasploit. Show Answer Correct Answer: C) Snort. 11. Which of the following should you do to restrict access to your files and devices? A) Update your software once a year. B) Share passwords only with colleagues you trust. C) Have your staff members access information via an open Wi-Fi network. D) Use multi-factor authentication. Show Answer Correct Answer: D) Use multi-factor authentication. 12. Which of the following is NOT a common type of cyber threat actor? A) Hacktivist. B) Malware. C) Insider threat. D) Nation-state actor. Show Answer Correct Answer: B) Malware. 13. What can we use to protect our computer from hackers A) Fire wall. B) A picture which says "stay away". C) Using a non approved VPN. D) All of the above. Show Answer Correct Answer: A) Fire wall. 14. How can a large company protect customer's personal details? A) Keep their data separate from a hard drive. B) Encryption. C) Keep the data on a floppy disk. D) None of the above. Show Answer Correct Answer: B) Encryption. 15. Why is it important to regularly update software for security? A) Software updates can slow down system performance. B) It is important to regularly update software for security to protect against vulnerabilities and known threats. C) Regular updates are only necessary for hardware. D) Updating software is only important for new features. Show Answer Correct Answer: B) It is important to regularly update software for security to protect against vulnerabilities and known threats. 16. What is two-factor authentication compared to? A) A double-edged sword. B) A backup plan. C) A second lock on your door. D) A secondary password. Show Answer Correct Answer: C) A second lock on your door. 17. Which of the following methods of connectivity provides the highest bandwidth speeds and best security from eavesdropping? A) Twisted pair. B) 802.11ac. C) CDMA. D) Fiber optical. Show Answer Correct Answer: D) Fiber optical. 18. "Checks the comments before they posted"Which type of forum is this? A) Moderated. B) Unmoderated. C) All the above. D) None of the above. Show Answer Correct Answer: A) Moderated. 19. Several users have called the help desk to complain that they are being redirected to websites different from the addresses they entered. Which type of attack is taking place? A) IP spoofing. B) DNS spoofing. C) Man-in-the-middle. D) ARP spoofing. Show Answer Correct Answer: B) DNS spoofing. 20. What layer of the OSI model does the TCP protocol operate on? A) Application layer. B) Network layer. C) Data link layer. D) Transport layer. Show Answer Correct Answer: D) Transport layer. 21. Which of the following file type is associated with a windows executable? A) .rtf. B) .msi. C) .iso. D) .dmg. Show Answer Correct Answer: B) .msi. 22. If you receive an email from a well-known company, but its name is misspelt in the sender's address, you should: A) Report it as a possible phishing scam. B) Click on the link in the email to check if it's genuine. C) Reply, pointing out the error. D) Forward the email to a friend to check. Show Answer Correct Answer: A) Report it as a possible phishing scam. 23. Owned and legally controlled by a particular company A) Property. B) Proprietor. C) Proprietary. D) None of the above. Show Answer Correct Answer: C) Proprietary. 24. What is the port number for the Simple Mail Transfer Protocol (SMTP)? A) 25. B) 50. C) 30. D) 20. Show Answer Correct Answer: A) 25. 25. What is ransomware? A) Carrying out DoS attack. B) Holding a network until company pay. C) Asking for money for nothing. D) Shutting off a company website. Show Answer Correct Answer: B) Holding a network until company pay. 26. Which of the below can be classified as a type of computer threat? A) Dos Attack. B) Phishing. C) Soliciting. D) Both A and C. Show Answer Correct Answer: A) Dos Attack. 27. What is a virus? A) Something that damages your computer. B) Something that kills people. C) All the above. D) None of the above. Show Answer Correct Answer: A) Something that damages your computer. 28. A software is sent to target computer. The software gathers data by monitoring keyboard presses. The data sent back to the one who sent the software. A) Ransomware. B) Spamware. C) Adware. D) Key-logging software. Show Answer Correct Answer: D) Key-logging software. 29. Out of the following, what is not a digital asset? A) Digital Cameras. B) Social Media Account. C) Name Plates. D) Domain Names. Show Answer Correct Answer: C) Name Plates. 30. A cookie is used to remember settings from your last visit to a website? Such as items added to a shopping basket. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 31. Security has to protect and keep the password secure A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 32. Similar to Phishing but instead of using email it uses voice mail A) Cookies. B) Pharming. C) Vishing. D) Smishing. Show Answer Correct Answer: C) Vishing. 33. What is a router? A) A router is a device used for printing documents. B) A router is a type of computer that stores data. C) A router is a device that connects multiple networks and routes data between them. D) A router is a software application for editing photos. Show Answer Correct Answer: C) A router is a device that connects multiple networks and routes data between them. 34. What is the purpose of an acceptable use policy? A) To recover lost data. B) To scan for viruses. C) To dictate who can access computers and networks. D) To identify vulnerabilities in systems. Show Answer Correct Answer: C) To dictate who can access computers and networks. 35. These are possible signs that your computer might be infected, except: A) Browser taking you to unwanted sites. B) Intrusive Pop Up ads. C) Unfamiliar toolbars. D) Anti Virus update. Show Answer Correct Answer: D) Anti Virus update. 36. 1)Reasons to implement ERM/ sebab-sebab untuk melaksanakan ERM; A) A. Avoiding legal trouble/ mengelakkan masalah undang-undang. B) B. preventing marketing abroad/ menghalang pemasaran ke luar negara. C) C. Reduce job opportunities/mengurangkan peluang pekerjaan. D) None of the above. Show Answer Correct Answer: A) A. Avoiding legal trouble/ mengelakkan masalah undang-undang. 37. Which of the following procedures not useful for preventing brute force attack of hacking passwords? A) Set a Lengthy Password. B) Set a High Complexity Password. C) Set a Limit for Login Failures. D) None of these. Show Answer Correct Answer: D) None of these. 38. Is it okay to download files from unknown websites? A) Yes. B) No. C) All the above. D) None of the above. Show Answer Correct Answer: B) No. 39. Select the correct dropdowns to describe TikTok's purpose and audience.TikTok is largely aimed at A) Older people. B) People of all ages. C) Younger people. D) None of the above. Show Answer Correct Answer: C) Younger people. 40. Manakah dari berikut ini yang merupakan praktik terbaik untuk menghindari serangan Phishing? A) Mengklik link di email yang tidak dikenal. B) Memverifikasi alamat pengirim email dan tidak mengklik link yang mencurigakan. C) Menggunakan software bajakan. D) Mengabaikan update keamanan. Show Answer Correct Answer: B) Memverifikasi alamat pengirim email dan tidak mengklik link yang mencurigakan. 41. Which one of the following is a security implication when connecting to a network? A) Your hard drive will be more likely to malfunction. B) Your computer will be more prone to theft. C) Your web browsing history may be deleted. D) Your private information may be at risk. Show Answer Correct Answer: D) Your private information may be at risk. 42. Reconnaissance is a primary step of a computer attack. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 43. Which measure is used to guarantee the availability of data? A) Two-factor authentication. B) Implementing firewalls. C) Using file permissions. D) Data encryption. Show Answer Correct Answer: B) Implementing firewalls. 44. How can individuals protect their digital rights? A) Share passwords with friends, ignore software updates, use public Wi-Fi for sensitive transactions, and disable privacy settings. B) Use strong passwords, enable two-factor authentication, be cautious with personal information, update software, use privacy tools, and understand data rights. C) All the above. D) None of the above. Show Answer Correct Answer: B) Use strong passwords, enable two-factor authentication, be cautious with personal information, update software, use privacy tools, and understand data rights. 45. What are the motives behind cyber crime? A) Demanding ransom. B) Propagating religious or political beliefs. C) Financial loss to the target. D) Information thefts and manipulating data. E) All of the above. Show Answer Correct Answer: E) All of the above. 46. What is a phishing attack? A) A virus that crashes your system. B) A fake message or email to trick you into giving personal info. C) A type of antivirus software. D) A method to hack passwords using Wi-Fi. Show Answer Correct Answer: B) A fake message or email to trick you into giving personal info. 47. How can we protect our tablets and phones? A) Share passwords with strangers online. B) Use screen protectors, cases, enable locks, update software, and avoid public Wi-Fi. C) Leave it in direct sunlight for better performance. D) Use a microwave to clean the device. Show Answer Correct Answer: B) Use screen protectors, cases, enable locks, update software, and avoid public Wi-Fi. 48. Authentication that relies on unique characteristics of human beings such as voice, face, iris, etc. A) Biometrics. B) Digital Certificate. C) Secure Socket Layer (SSL). D) Handshake Protocol. Show Answer Correct Answer: A) Biometrics. 49. Disabling unused features such as Bluetooth and Near Field Communication is an example of? A) Password Management. B) Device Hardening. C) Malware. D) None of the above. Show Answer Correct Answer: B) Device Hardening. 50. Which of these is an indicator that the website is secure. A) The http://. B) The https:. C) Bruce Lee photo. D) The https://. Show Answer Correct Answer: D) The https://. 51. 7) To prevent unauthorized physical access to your computing devices, use passphrases, rather than passwords. A) False. B) True. C) All the above. D) None of the above. Show Answer Correct Answer: B) True. 52. DDoS stands for ..... A) Destroyed Denial of Service. B) Distributed Denial of Service. C) Delivered Denial of Service. D) Distributed Delivery of Service. Show Answer Correct Answer: B) Distributed Denial of Service. 53. Someone that you don't know sends you a friend request on Facebook. You see that you have some mutual friends. Do you accept it? A) Yes. B) No. C) All the above. D) None of the above. Show Answer Correct Answer: B) No. 54. Which of the following is most important in design of secure system? A) Both A & B. B) Assessing vulnerability. C) Changing or Updating System according to vulnerability. D) None of the above. Show Answer Correct Answer: A) Both A & B. 55. Which of the below measures can help reduce the risk of data leakage? A) Chorography. B) Cryptography. C) Authentication. D) Steganography. Show Answer Correct Answer: D) Steganography. 56. What are the potential risks of sharing personal information on social media? A) To increase social media followers. B) To receive more targeted advertisements. C) To protect privacy and security. D) To make new friends. Show Answer Correct Answer: C) To protect privacy and security. 57. When you are using social networking sites, which information should you never post publicly? A) Your address or phone number. B) Your favorite athletic teams. C) Your high scores on popular games. D) Your favorite places to explore. Show Answer Correct Answer: A) Your address or phone number. 58. What component will typically store the instances of all organizational configuration items? A) CASB. B) CMDB. C) SCADA. D) APT. Show Answer Correct Answer: B) CMDB. 59. How do attackers today make it difficult to distinguish an attack from legitimate traffic? A) By using a common language. B) By using diverse interfaces. C) By using universally connected devices. D) By using simple scripting. Show Answer Correct Answer: C) By using universally connected devices. 60. Which of the below implemented is not a good means of safeguarding privacy? A) Biometric verification. B) ID and password-based verification. C) 2-factor authentication. D) Switching off the phone. Show Answer Correct Answer: D) Switching off the phone. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books