Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 13 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. Which is the search engine for IoT?
2. Which of the following statements is true about the Trojans?
3. If a stranger messages you online what should you
4. What does DDOS stand for?
5. Which one of the following is an example of a threat to data from extraordinary circumstances?
6. What should you do if someone besides a trusted adult has your password?
7. You're browsing and on a random site a pop-up to get free access to Netflix appears. What's the most secure action?
8. What does sequencing refer to in the context of algorithms?
9. Text Phishing is called .....
10. After clicking on a suspicious email the data on your system is locked/encrypted this can be?
11. What are the elements of cybersecurity?
12. The main function of the web browser is to:
13. Which option is a direct benefit of maintaining data integrity?
14. Amazon pay me sum of money to try to hack into their systems and help improve security. Which hacker am I?
15. ..... is a structured language for cyber threat intelligence.
16. A Java class file is a file (with the . class filename extension) containing Java ..... that can be executed on the Java Virtual Machine (JVM)
17. Which are the attack surface for IoT?
18. Why is there a shortage of cyber security experts?
19. When entering personal data such as credit card information into a website, it is important to verify the url starts with 'https" to ensure the transaction is protected by SSL encryption.
20. What was the First online Message?
21. Why should you ensure you keep your firewall software updated?
22. Which of the following ensures that information is correct and no unauthorized person or malicious software has altered it?
23. Is hijacking and hacking refers to same thing?
24. Malware is software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer system.
25. If you walk away from a wireless router whilst surfing the internet on your tablet-what will happen to your internet speed?
26. On the internet, security and loss of digital value are experienced as:
27. True or false? Employers never check social media platforms when they are considering who to hire.
28. What are the risks associated with using public Wi-Fi?
29. Why should you make sure you anti-virus software is up-to-date?
30. Cybersecurity also be referred to as?
31. What is JavaScript commonly used for?
32. Which one of the following describes why users should lock their computer when leaving their desk?
33. Which one of the following prevents unauthorized users from accessing data?
34. Which group poses even greater risks than major tech companies like Google and Facebook, according to the text?
35. What is the full form of ISP?
36. What does the padlock symbol at the beginning of a URL in the address bar of a web browser indicate
37. What does the speaker use to illustrate the unpredictability of names in defining a person?
38. What role do ethical hackers play in cyber security?
39. Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This Attack is called .....
40. ..... creates an isolated passage across a public network that enables computing devices to communicate and receive data discreetly as though they were directly linked to the private network.
41. Who can receive SPAM?
42. What is another term for a zombie computer army?
43. What month has been declared as Cybersecurity Awareness Month?
44. Which of the following is true about the Internet of Things?I. The Internet of Things is the network of devices with the ability to connect and exchange data.II. The Internet of Things increases our vulnerability to cyber attacks.III. The Internet of Things is purely positive-there are no negative consequences to increased connectivity
45. Which of the following peripherals is used to optically convert printed information?
46. It requires expensive dedicated software.
47. A user has received a file that will not open when it is selected.Which of the following should the user do to open the file?
48. Related to data security most
49. A set of rules for appropriate behavior while on the internet.
50. ..... is a set of rules followed for communicating data in a networking environment.
51. Which of the following is not a digital wallet?
52. Provides a connection oriented reliable service for sending messages
53. Which of the following doesn't fall under the category of digital marketing
54. A data recovery program can:
55. Everyone receives the same email in the office stating that they need to download the app to to prevent their computer for viruses. Thus allowing attacker gain access to your computer
56. Fill in the blank:An attack in which the same account is continuously attacked by entering different passwords is called .....
57. Which one of the following best describes a direct consequence of identity theft?
58. Before you enter your private and personal information online, you should find out:
59. Menyebarkan informasi tanpa mengecek kebenarannya melalui media sosial
60. You turn on a laptop computer and the hard drive is not recognized. Where should you go to troubleshoot the issue?