This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 12 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 12 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. Ann, a user, has, just set up a new computer. she noticed several icons for application she wants removed. Which of the following WOULD THE BEST removal method? A) Drag the icon in to the trash. B) Hide the icon from the desktop. C) Uninstalling the unneeded application. D) Run software and security updating. Show Answer Correct Answer: B) Hide the icon from the desktop. 2. You can erase your digital footprint. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 3. Tricking a victim into revealing sensitive information under false pretenses. A) Reconnaissance. B) Pretexting. C) Snooping. D) Wiretapping. Show Answer Correct Answer: B) Pretexting. 4. ..... is way of protecting internet-connected systems, including:hardware, software and data, from cyberattacks A) DDOS. B) Cyber Security. C) SPAM. D) Cyber Safe. Show Answer Correct Answer: B) Cyber Security. 5. Which protocol operates at the transport layer and uses port 53? A) FTP. B) UDP. C) HTTP. D) TCP. Show Answer Correct Answer: B) UDP. 6. Which one of the following details is considered unsafe to share on a social networking site? A) Your job. B) Favourite foods. C) Home address / location. D) Your nickname. Show Answer Correct Answer: C) Home address / location. 7. A change of one input or key bit results in changing approx half output bits is called ..... A) Crypto Effect. B) Belady's Effect. C) Avalanche Effect. D) Zener Effect. Show Answer Correct Answer: C) Avalanche Effect. 8. In which year India suffered the largest data breach in the banking sector? A) 2016. B) 2003. C) 1999. D) 1988. Show Answer Correct Answer: A) 2016. 9. Which topology requires a central controller or hub? A) Bus. B) Star. C) Mesh. D) Ring. Show Answer Correct Answer: B) Star. 10. In which field is the human intelligence of the machine tested? A) Psychology. B) Cognitive Science. C) Sociology. D) History. Show Answer Correct Answer: B) Cognitive Science. 11. What does SSL stand for? A) Secure Socket Layer. B) Secret Secure Layer. C) All the above. D) None of the above. Show Answer Correct Answer: A) Secure Socket Layer. 12. What should you check to ensure a website is secure? A) If it has many ads. B) If it loads quickly. C) If it uses HTTPS. D) If it has a contact page. Show Answer Correct Answer: C) If it uses HTTPS. 13. The weakest link in the security of an IT infrastructure is the server. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 14. Using a person's physical characteristic for identification A) Password. B) Protocol. C) Security. D) Biometrics. E) Encryption. Show Answer Correct Answer: D) Biometrics. 15. A technician is configure a SOHO router. Which of t following would be the purpose for updating the router's firmware? A) Enabling new functionality. B) Establishing a connection to the ISP. C) Applying wireless encryption. D) Creating the SSID. Show Answer Correct Answer: A) Enabling new functionality. 16. What are some tips for safe internet browsing? A) Click on every pop-up ad. B) Ignore software and antivirus updates. C) Be cautious of phishing scams, use strong and unique passwords, keep software and antivirus programs updated, and use secure websites (https). D) Use the same password for every account. Show Answer Correct Answer: C) Be cautious of phishing scams, use strong and unique passwords, keep software and antivirus programs updated, and use secure websites (https). 17. Which of the following email protocols holds incoming email messages on the server until they are retrieved by a mobile device? A) SNMP. B) IMAP. C) SMTP. D) POP3. Show Answer Correct Answer: C) SMTP. 18. Examples of ESA frameworks include: A) National Institute of Standards and Technology Special Publication (NIST SP) 800-37. B) Develop a baseline assessment using internal resources and professional assessment software. C) Information security supports the mission of the organization. D) Program management. Show Answer Correct Answer: A) National Institute of Standards and Technology Special Publication (NIST SP) 800-37. 19. Who is the owner of system that we work? A) Person working on system. B) Government of India. C) IT Department. D) Bank of Baroda. Show Answer Correct Answer: A) Person working on system. 20. Rules that state how a computer should be used. A) Computer ABC's. B) Computer Ethics. C) Technology Values. D) The Internet Guide. Show Answer Correct Answer: B) Computer Ethics. 21. What is one of the most common methods of physical security breach? A) Using a USB storage device with malicious code or sensitive data. B) Breaking into a locked room or cabinet where equipment or data is stored. C) Collecting passwords and other information by social-engineering methods such as phishing or impersonation. D) All of the above. Show Answer Correct Answer: D) All of the above. 22. What is social engineering? A) A strategy for marketing products. B) A method for improving social skills. C) Social engineering is the psychological manipulation of people to obtain confidential information or access. D) A type of computer programming. Show Answer Correct Answer: C) Social engineering is the psychological manipulation of people to obtain confidential information or access. 23. What is two-factor authentication and how does it enhance security? A) It is a type of password that only requires one step for authentication. B) It is a method of authentication that does not add any extra layer of protection. C) It enhances security by adding an extra layer of protection, making it harder for unauthorized users to access accounts or systems. D) It is a security feature that makes it easier for unauthorized users to access accounts. Show Answer Correct Answer: C) It enhances security by adding an extra layer of protection, making it harder for unauthorized users to access accounts or systems. 24. Meminta izin orang tua untuk mengunduh aplikasi baru A) Benar. B) Salah. C) All the above. D) None of the above. Show Answer Correct Answer: A) Benar. 25. Which cannot self replicate? A) Virus. B) Trojan Horse. C) Worm. D) None of the above. Show Answer Correct Answer: B) Trojan Horse. 26. ..... are messages that try to trick you into providing sensitive information. A) Cookies. B) Plug-ins. C) Passwords. D) Phishing scams. Show Answer Correct Answer: D) Phishing scams. 27. In a scenario where Michael is sending confidential documents to William, what does integrity ensure about the documents during transmission? A) Data is accurate and untampered. B) Data is available all the time. C) Data is kept confidential. D) Data is distributed efficiently. Show Answer Correct Answer: A) Data is accurate and untampered. 28. After three unsuccessful login attempts, a website does not allow a user the ability to log in. This precaution prevents which of the following? A) Shoulder surfing. B) Social engineering. C) Password cracking. D) Phishing. Show Answer Correct Answer: C) Password cracking. 29. Meminta izin orang tua saat bermain games online A) Benar. B) Salah. C) All the above. D) None of the above. Show Answer Correct Answer: A) Benar. 30. ..... is a cybercrime in which a target is contacted by email, telephone or text message by someone posing as a legitimate institution to trap individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. A) CYBERL LIBEL. B) PHISHING. C) HACKING. D) CYBER CRIME. Show Answer Correct Answer: B) PHISHING. 31. What potential danger does the speaker associate with oversharing on networking sites? A) Enhanced digital identity. B) Identity theft or misrepresentation. C) Increased productivity. D) Improved online security. Show Answer Correct Answer: B) Identity theft or misrepresentation. 32. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. A) Anti-virus. B) Firewall. C) Encryption. D) Malware. Show Answer Correct Answer: B) Firewall. 33. The technology and process that is designed to protect networks and devices from attack, damage, or unauthorized access A) Cyber Security. B) White Hat Hacker. C) Domain Name Server. D) All of the above. Show Answer Correct Answer: A) Cyber Security. 34. Which of these statements is true regarding zero-day attacks? A) Most malicious code is accounted for today. B) The CVE is months behind in identifying these vulnerabilities. C) All malware and exploits were a zero-day at one time or another. D) The "zero" refers to the threat level on a scale of 0-10. Show Answer Correct Answer: C) All malware and exploits were a zero-day at one time or another. 35. Password is used mainly for A) Reliability. B) Performance. C) Security. D) Complexity. Show Answer Correct Answer: C) Security. 36. Who do you tell if you see something harmful online? A) Your parents. B) Your teacher. C) A trusted adult. D) All of the above. Show Answer Correct Answer: D) All of the above. 37. Nama Artis yang bersenjata? A) Iko Uwais. B) Jennifer Lawrence. C) Kerisdayanti. D) Johny Indo. Show Answer Correct Answer: C) Kerisdayanti. 38. Why is it recommended to use different passwords for different accounts? A) To use them across different devices. B) To ensure if one is hacked, others remain safe. C) To share them easily with friends. D) To make it easier to remember. Show Answer Correct Answer: B) To ensure if one is hacked, others remain safe. 39. It is a self-replicating program that is harmful to networks. A) Worm. B) Trojan Horse. C) Virus. D) None of the above. Show Answer Correct Answer: A) Worm. 40. If you find a USB by the hallway, you should plug it in the computer to check to owns it. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 41. Which one of the following would prevent the theft of a laptop? A) Anti-virus software. B) A security cable. C) Spyware. D) A webcam. Show Answer Correct Answer: B) A security cable. 42. What is the primary purpose of a firewall in network security? A) To prevent unauthorized access to or from a private network. B) To encrypt all data transmitted over the network. C) To block all incoming and outgoing traffic. D) To monitor network performance. Show Answer Correct Answer: A) To prevent unauthorized access to or from a private network. 43. Systemic risk the risk of A) Failure of two banks simultaneously due to bankruptcy of one bank. B) Where a group of banks fail due to contagion effect. C) Failure of entire banking system. D) Failure of a bank, which is not adhering to regulations. Show Answer Correct Answer: C) Failure of entire banking system. 44. Using which social engineering principle might an attacker impersonate a CEO of a company? A) Scarcity. B) Trust. C) Authority. D) Urgency. Show Answer Correct Answer: C) Authority. 45. What is the main activity in dumpster diving? A) Recycling electronic waste. B) Obtaining confidential information from trash. C) Searching for food. D) Looking for software vulnerabilities. Show Answer Correct Answer: B) Obtaining confidential information from trash. 46. What are the ethical considerations in cyber security? A) Network security protocols. B) Malware detection techniques. C) Key ethical considerations in cyber security include privacy, informed consent, data protection, surveillance implications, transparency, and accountability. D) User interface design principles. Show Answer Correct Answer: C) Key ethical considerations in cyber security include privacy, informed consent, data protection, surveillance implications, transparency, and accountability. 47. One example of this is a corporate environment in which employees use a company e-mail server to send, receive, and store e-mail. A) Peer-to-peer Network. B) Client-Server Network. C) All the above. D) None of the above. Show Answer Correct Answer: B) Client-Server Network. 48. Which one of the following is an example of phishing? A) An email directing the recipient to download an attachment. B) An email warning the recipient of a computer virus threat. C) An email directing the recipient to forward the email to friends. D) An email directing the recipient to enter personal details on a fake website. Show Answer Correct Answer: D) An email directing the recipient to enter personal details on a fake website. 49. Which of these is a scam? A) Become a laptop tester. B) Free sports equipment for filling out a survey. C) Bank of America security asking you to change your password. D) All of these are scams. Show Answer Correct Answer: D) All of these are scams. 50. Indicate whether the statement is true or false.4. Script kiddies typically have advanced knowledge of computers and networks. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 51. Which of the following is NOT a term associated with cybersecurity? A) Goal. B) Malware. C) Information assurance. D) Risk. Show Answer Correct Answer: A) Goal. 52. What is a Steganography A) A Software that draws Graphs. B) A way of concealing text. C) A type of malware. D) A Dinosaur. Show Answer Correct Answer: B) A way of concealing text. 53. Malware is the term used to describe mail that is phishing for personal data. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 54. When ..... and ..... are in charge of data, the integrity of the data is imperilled? A) Network, system. B) Access control, file deletion. C) Access control, file permission. D) Network, file permission. Show Answer Correct Answer: C) Access control, file permission. 55. What is two-factor authentication (2FA)? A) Using a password plus another method like OTP. B) Two people using the same login. C) Typing your password twice. D) Using one password for two accounts. Show Answer Correct Answer: A) Using a password plus another method like OTP. 56. A scam by which an email user is duped into revealing personal information. A) Fishing. B) Pharming. C) Phishing. D) Farming. Show Answer Correct Answer: C) Phishing. 57. What is the main function of the DHCP protocol? A) Assigning IP addresses dynamically. B) Translating domain names to IP addresses. C) Monitoring network devices. D) Synchronizing network time. Show Answer Correct Answer: A) Assigning IP addresses dynamically. 58. The BizzFad organization develops and sells software. Occasionally they update the software to fix security vulnerabilities and/or add additional features. However, before resealing these updates to customers, they test them in different environments. Which of the following solutions provides the BEST method to test the updates? A) Baseline configuration. B) BYOD. C) Sandbox. D) Change management. Show Answer Correct Answer: C) Sandbox. 59. DNS stands for ..... A) Domain Name Service. B) Data Networking System. C) Domain Name Server. D) Domain Name System. Show Answer Correct Answer: D) Domain Name System. 60. JRE: ..... ::IDE: ..... A) JAVA RUNNABLE ENVIRONMENT, INTEGRATED DEVELOPMENT ENVIRONMENT. B) JAVA RUNTIME ENVIRONMENT, INTEGRATED DEVELOPMENT ENVIRONMENT. C) JAVA RUNTIME ENVIRONMENT, INTEGRATED DEVELOPING ENVIRONMENT. D) JAVA RUNTIME ENVIRONMENT, INTEGRATED DEPLOYING ENVIRONMENT. Show Answer Correct Answer: B) JAVA RUNTIME ENVIRONMENT, INTEGRATED DEVELOPMENT ENVIRONMENT. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books