Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 11 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. Same keys are used for encryption and decryption in ..... cryptography scheme
2. McAfee is an example of
3. ..... is one of the safest Linux operating systems, offering invisibility and an incognito mode to protect user data.
4. When disposing of an old computer:
5. Which one of the following best describes the purpose of a company network account?
6. What is the primary purpose of a firewall in a computer network?
7. What happens if you block a user on a social media platform?
8. What is the main concern regarding internal security threats, as mentioned in Chapter 1(1.4)?
9. Proses di mana data disembunyikan agar tidak dapat dibaca oleh orang yang tidak berwenang disebut
10. Name a common intrusion detection system used in network security.
11. Which of the following should you do to restrict access to your files and devices?
12. Which of the following is NOT a common type of cyber threat actor?
13. What can we use to protect our computer from hackers
14. How can a large company protect customer's personal details?
15. Why is it important to regularly update software for security?
16. What is two-factor authentication compared to?
17. Which of the following methods of connectivity provides the highest bandwidth speeds and best security from eavesdropping?
18. "Checks the comments before they posted"Which type of forum is this?
19. Several users have called the help desk to complain that they are being redirected to websites different from the addresses they entered. Which type of attack is taking place?
20. What layer of the OSI model does the TCP protocol operate on?
21. Which of the following file type is associated with a windows executable?
22. If you receive an email from a well-known company, but its name is misspelt in the sender's address, you should:
23. Owned and legally controlled by a particular company
24. What is the port number for the Simple Mail Transfer Protocol (SMTP)?
25. What is ransomware?
26. Which of the below can be classified as a type of computer threat?
27. What is a virus?
28. A software is sent to target computer. The software gathers data by monitoring keyboard presses. The data sent back to the one who sent the software.
29. Out of the following, what is not a digital asset?
30. A cookie is used to remember settings from your last visit to a website? Such as items added to a shopping basket.
31. Security has to protect and keep the password secure
32. Similar to Phishing but instead of using email it uses voice mail
33. What is a router?
34. What is the purpose of an acceptable use policy?
35. These are possible signs that your computer might be infected, except:
36. 1)Reasons to implement ERM/ sebab-sebab untuk melaksanakan ERM;
37. Which of the following procedures not useful for preventing brute force attack of hacking passwords?
38. Is it okay to download files from unknown websites?
39. Select the correct dropdowns to describe TikTok's purpose and audience.TikTok is largely aimed at
40. Manakah dari berikut ini yang merupakan praktik terbaik untuk menghindari serangan Phishing?
41. Which one of the following is a security implication when connecting to a network?
42. Reconnaissance is a primary step of a computer attack.
43. Which measure is used to guarantee the availability of data?
44. How can individuals protect their digital rights?
45. What are the motives behind cyber crime?
46. What is a phishing attack?
47. How can we protect our tablets and phones?
48. Authentication that relies on unique characteristics of human beings such as voice, face, iris, etc.
49. Disabling unused features such as Bluetooth and Near Field Communication is an example of?
50. Which of these is an indicator that the website is secure.
51. 7) To prevent unauthorized physical access to your computing devices, use passphrases, rather than passwords.
52. DDoS stands for .....
53. Someone that you don't know sends you a friend request on Facebook. You see that you have some mutual friends. Do you accept it?
54. Which of the following is most important in design of secure system?
55. Which of the below measures can help reduce the risk of data leakage?
56. What are the potential risks of sharing personal information on social media?
57. When you are using social networking sites, which information should you never post publicly?
58. What component will typically store the instances of all organizational configuration items?
59. How do attackers today make it difficult to distinguish an attack from legitimate traffic?
60. Which of the below implemented is not a good means of safeguarding privacy?