Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 12 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. Ann, a user, has, just set up a new computer. she noticed several icons for application she wants removed. Which of the following WOULD THE BEST removal method?
2. You can erase your digital footprint.
3. Tricking a victim into revealing sensitive information under false pretenses.
4. ..... is way of protecting internet-connected systems, including:hardware, software and data, from cyberattacks
5. Which protocol operates at the transport layer and uses port 53?
6. Which one of the following details is considered unsafe to share on a social networking site?
7. A change of one input or key bit results in changing approx half output bits is called .....
8. In which year India suffered the largest data breach in the banking sector?
9. Which topology requires a central controller or hub?
10. In which field is the human intelligence of the machine tested?
11. What does SSL stand for?
12. What should you check to ensure a website is secure?
13. The weakest link in the security of an IT infrastructure is the server.
14. Using a person's physical characteristic for identification
15. A technician is configure a SOHO router. Which of t following would be the purpose for updating the router's firmware?
16. What are some tips for safe internet browsing?
17. Which of the following email protocols holds incoming email messages on the server until they are retrieved by a mobile device?
18. Examples of ESA frameworks include:
19. Who is the owner of system that we work?
20. Rules that state how a computer should be used.
21. What is one of the most common methods of physical security breach?
22. What is social engineering?
23. What is two-factor authentication and how does it enhance security?
24. Meminta izin orang tua untuk mengunduh aplikasi baru
25. Which cannot self replicate?
26. ..... are messages that try to trick you into providing sensitive information.
27. In a scenario where Michael is sending confidential documents to William, what does integrity ensure about the documents during transmission?
28. After three unsuccessful login attempts, a website does not allow a user the ability to log in. This precaution prevents which of the following?
29. Meminta izin orang tua saat bermain games online
30. ..... is a cybercrime in which a target is contacted by email, telephone or text message by someone posing as a legitimate institution to trap individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
31. What potential danger does the speaker associate with oversharing on networking sites?
32. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
33. The technology and process that is designed to protect networks and devices from attack, damage, or unauthorized access
34. Which of these statements is true regarding zero-day attacks?
35. Password is used mainly for
36. Who do you tell if you see something harmful online?
37. Nama Artis yang bersenjata?
38. Why is it recommended to use different passwords for different accounts?
39. It is a self-replicating program that is harmful to networks.
40. If you find a USB by the hallway, you should plug it in the computer to check to owns it.
41. Which one of the following would prevent the theft of a laptop?
42. What is the primary purpose of a firewall in network security?
43. Systemic risk the risk of
44. Using which social engineering principle might an attacker impersonate a CEO of a company?
45. What is the main activity in dumpster diving?
46. What are the ethical considerations in cyber security?
47. One example of this is a corporate environment in which employees use a company e-mail server to send, receive, and store e-mail.
48. Which one of the following is an example of phishing?
49. Which of these is a scam?
50. Indicate whether the statement is true or false.4. Script kiddies typically have advanced knowledge of computers and networks.
51. Which of the following is NOT a term associated with cybersecurity?
52. What is a Steganography
53. Malware is the term used to describe mail that is phishing for personal data.
54. When ..... and ..... are in charge of data, the integrity of the data is imperilled?
55. What is two-factor authentication (2FA)?
56. A scam by which an email user is duped into revealing personal information.
57. What is the main function of the DHCP protocol?
58. The BizzFad organization develops and sells software. Occasionally they update the software to fix security vulnerabilities and/or add additional features. However, before resealing these updates to customers, they test them in different environments. Which of the following solutions provides the BEST method to test the updates?
59. DNS stands for .....
60. JRE: ..... ::IDE: .....