This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 13 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 13 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. Which is the search engine for IoT? A) DuckDuckGo. B) Shodan. C) Bing. D) Google. Show Answer Correct Answer: B) Shodan. 2. Which of the following statements is true about the Trojans? A) Trojans perform tasks for which they are designed or programmed. B) Trojans replicates them self's or clone them self's through an infections. C) Trojans do nothing harmful to the user's computer systems. D) None of the above. Show Answer Correct Answer: A) Trojans perform tasks for which they are designed or programmed. 3. If a stranger messages you online what should you A) Give them your personal information. B) Chat with them. C) Ask an adult to block them. D) None of the above. Show Answer Correct Answer: C) Ask an adult to block them. 4. What does DDOS stand for? A) Dangerous dynamic open security. B) Distributed Denial of Service. C) Digital Distributed open security. D) Digital Default of Servers. Show Answer Correct Answer: B) Distributed Denial of Service. 5. Which one of the following is an example of a threat to data from extraordinary circumstances? A) Cracking. B) Fire. C) Lost password. D) Cyber crime. Show Answer Correct Answer: B) Fire. 6. What should you do if someone besides a trusted adult has your password? A) Give your password out to other people since somebody already knows it. B) Threaten them. C) Change your password. D) None of the above. Show Answer Correct Answer: C) Change your password. 7. You're browsing and on a random site a pop-up to get free access to Netflix appears. What's the most secure action? A) Follow the pop-up instructions to get the free access. B) Immediately close the pop-up and don't proceed. C) All the above. D) None of the above. Show Answer Correct Answer: B) Immediately close the pop-up and don't proceed. 8. What does sequencing refer to in the context of algorithms? A) The number of steps in an algorithm. B) The order things happen in. C) The speed of execution. D) The data processed by the algorithm. Show Answer Correct Answer: B) The order things happen in. 9. Text Phishing is called ..... A) Whaling. B) Spear Phishing. C) Smishing. D) Vishing. Show Answer Correct Answer: C) Smishing. 10. After clicking on a suspicious email the data on your system is locked/encrypted this can be? A) A Ransomeware attack. B) A Denial of service attack. C) Man in the middle attack. D) None of the above. Show Answer Correct Answer: A) A Ransomeware attack. 11. What are the elements of cybersecurity? A) Network security. B) Operational security. C) Application security. D) All of the above. Show Answer Correct Answer: D) All of the above. 12. The main function of the web browser is to: A) Display all the previous and existing online activities. B) Access the information and resources from the World Wide Web. C) Protect the system from online virus attacks. D) Promote and enhance Internet security. Show Answer Correct Answer: B) Access the information and resources from the World Wide Web. 13. Which option is a direct benefit of maintaining data integrity? A) Reduced data costs. B) Trustworthiness of data. C) Increased data storage. D) Faster data access. Show Answer Correct Answer: B) Trustworthiness of data. 14. Amazon pay me sum of money to try to hack into their systems and help improve security. Which hacker am I? A) White hat Hacker. B) Grey hat Hacker. C) Black hat Hacker. D) None of the above. Show Answer Correct Answer: A) White hat Hacker. 15. ..... is a structured language for cyber threat intelligence. A) Dark web. B) IoC. C) STIX. D) OSINT. Show Answer Correct Answer: C) STIX. 16. A Java class file is a file (with the . class filename extension) containing Java ..... that can be executed on the Java Virtual Machine (JVM) A) Scourcecode. B) Bytecode. C) Classcode. D) Object code. Show Answer Correct Answer: B) Bytecode. 17. Which are the attack surface for IoT? A) Firmware. B) Network Communication. C) Hardware. D) All the above. Show Answer Correct Answer: D) All the above. 18. Why is there a shortage of cyber security experts? A) There are too many hackers who are highly skilled. B) The internet is full of tutorials on cyber security. C) There is a lack of people with the necessary skills and training. D) Cyber security is not a profitable career. Show Answer Correct Answer: C) There is a lack of people with the necessary skills and training. 19. When entering personal data such as credit card information into a website, it is important to verify the url starts with 'https" to ensure the transaction is protected by SSL encryption. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 20. What was the First online Message? A) LO. B) OK. C) NO. D) IO. Show Answer Correct Answer: A) LO. 21. Why should you ensure you keep your firewall software updated? A) To prevent you sending anything on the Internet. B) To prevent any hackers getting your personal information. C) To prevent you from getting a virus. D) To prevent hackers from giving you money. Show Answer Correct Answer: B) To prevent any hackers getting your personal information. 22. Which of the following ensures that information is correct and no unauthorized person or malicious software has altered it? A) Integrity. B) Availability. C) Confidentiality. D) Protection. Show Answer Correct Answer: A) Integrity. 23. Is hijacking and hacking refers to same thing? A) TRUE. B) FALSE. C) All the above. D) None of the above. Show Answer Correct Answer: B) FALSE. 24. Malware is software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer system. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 25. If you walk away from a wireless router whilst surfing the internet on your tablet-what will happen to your internet speed? A) The internet connection will be quicker, the greater the distance. B) The internet connection will be slower as the signal gets weaker. C) All the above. D) None of the above. Show Answer Correct Answer: B) The internet connection will be slower as the signal gets weaker. 26. On the internet, security and loss of digital value are experienced as: A) Complicated. B) Less probable. C) Abstract. D) No answer. Show Answer Correct Answer: A) Complicated. 27. True or false? Employers never check social media platforms when they are considering who to hire. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 28. What are the risks associated with using public Wi-Fi? A) Can become a victim of Vishing attack. B) No risk if we use good anti Virus software. C) Can become a victim of Man in the middle attack. D) Public WiFi have their own security. Show Answer Correct Answer: C) Can become a victim of Man in the middle attack. 29. Why should you make sure you anti-virus software is up-to-date? A) Hackers want your data. B) New viruses are being written all the time. C) You don't need to, there are no new viruses, only old ones. D) Sometimes, even computers need a hanky. Show Answer Correct Answer: B) New viruses are being written all the time. 30. Cybersecurity also be referred to as? A) Information technology security. B) Incident security. C) Threat security. D) Internet security. Show Answer Correct Answer: A) Information technology security. 31. What is JavaScript commonly used for? A) Database management. B) Creating spreadsheets. C) Operating system development. D) Giving websites functionality. Show Answer Correct Answer: D) Giving websites functionality. 32. Which one of the following describes why users should lock their computer when leaving their desk? A) To prevent unauthorized access to data. B) To prevent the computer from malfunctioning. C) To prevent data from getting corrupted. D) To prevent the waste of electricity. Show Answer Correct Answer: A) To prevent unauthorized access to data. 33. Which one of the following prevents unauthorized users from accessing data? A) Using an unsecured network. B) Using file compression. C) Using a strong password. D) Using backup software. Show Answer Correct Answer: C) Using a strong password. 34. Which group poses even greater risks than major tech companies like Google and Facebook, according to the text? A) Schools and hospitals. B) Amateurs and script kiddies. C) Financial institutions and government agencies. D) Googles and Facebooks. Show Answer Correct Answer: C) Financial institutions and government agencies. 35. What is the full form of ISP? A) Internet Service Provider. B) Instant Service Provider. C) Internet System Provider. D) International Service Provider. Show Answer Correct Answer: A) Internet Service Provider. 36. What does the padlock symbol at the beginning of a URL in the address bar of a web browser indicate A) Site is encrypted. B) Site is secured. C) Site is secured & encrypted. D) Site has firewall. Show Answer Correct Answer: B) Site is secured. 37. What does the speaker use to illustrate the unpredictability of names in defining a person? A) A historical figure. B) A celebrity's name. C) His own name. D) A fictional character. Show Answer Correct Answer: C) His own name. 38. What role do ethical hackers play in cyber security? A) Ethical hackers create malware to exploit systems. B) Ethical hackers only work for government agencies. C) Ethical hackers focus solely on data encryption. D) Ethical hackers identify and fix vulnerabilities to enhance cyber security. Show Answer Correct Answer: D) Ethical hackers identify and fix vulnerabilities to enhance cyber security. 39. Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This Attack is called ..... A) Ransomware. B) Botnet. C) Spam. D) Driving. Show Answer Correct Answer: A) Ransomware. 40. ..... creates an isolated passage across a public network that enables computing devices to communicate and receive data discreetly as though they were directly linked to the private network. A) Visual Private Network. B) Virtual Private Network. C) Virtual Protocol Network. D) Virtual Protocol Networking. Show Answer Correct Answer: B) Virtual Private Network. 41. Who can receive SPAM? A) Businesses. B) Children. C) Anyone. D) Adults. Show Answer Correct Answer: C) Anyone. 42. What is another term for a zombie computer army? A) Scareware. B) Botnet. C) Rootkits. D) Ransomware. Show Answer Correct Answer: B) Botnet. 43. What month has been declared as Cybersecurity Awareness Month? A) June. B) December. C) October. D) January. Show Answer Correct Answer: C) October. 44. Which of the following is true about the Internet of Things?I. The Internet of Things is the network of devices with the ability to connect and exchange data.II. The Internet of Things increases our vulnerability to cyber attacks.III. The Internet of Things is purely positive-there are no negative consequences to increased connectivity A) I only. B) I and II. C) I and III. D) None of the above. Show Answer Correct Answer: B) I and II. 45. Which of the following peripherals is used to optically convert printed information? A) Touchpad. B) Monitor. C) Scanner. D) Printer. Show Answer Correct Answer: C) Scanner. 46. It requires expensive dedicated software. A) Peer-to-peer Network. B) Client-Server Network. C) All the above. D) None of the above. Show Answer Correct Answer: B) Client-Server Network. 47. A user has received a file that will not open when it is selected.Which of the following should the user do to open the file? A) Change the file extension. B) Updates the OS. C) Install an appropriate program. D) Create a desktop. Show Answer Correct Answer: A) Change the file extension. 48. Related to data security most A) VPN. B) IDS. C) SQL injection. D) Firewall. Show Answer Correct Answer: C) SQL injection. 49. A set of rules for appropriate behavior while on the internet. A) Identity. B) Social Network. C) Dossier. D) Netiquette. Show Answer Correct Answer: D) Netiquette. 50. ..... is a set of rules followed for communicating data in a networking environment. A) URL. B) Internet. C) Home. D) Protocols. Show Answer Correct Answer: D) Protocols. 51. Which of the following is not a digital wallet? A) Quick Heal. B) Paytm. C) Apple Pay. D) PayPal. Show Answer Correct Answer: A) Quick Heal. 52. Provides a connection oriented reliable service for sending messages A) TCP. B) UDP. C) IP. D) All of the above. Show Answer Correct Answer: A) TCP. 53. Which of the following doesn't fall under the category of digital marketing A) Billboard. B) Banners. C) Tv. D) All of them. Show Answer Correct Answer: D) All of them. 54. A data recovery program can: A) Recover files that you have deleted from your hard drive. B) Recover files even if you have reformatted your hard drive. C) Recover emails that you have sent. D) All of the above. Show Answer Correct Answer: D) All of the above. 55. Everyone receives the same email in the office stating that they need to download the app to to prevent their computer for viruses. Thus allowing attacker gain access to your computer A) Phisphing. B) Worms. C) Ransomware. D) Man in the Middle Attack. Show Answer Correct Answer: A) Phisphing. 56. Fill in the blank:An attack in which the same account is continuously attacked by entering different passwords is called ..... A) Dictionary attack. B) SQL injection. C) Phishing attack. D) Online brute force attack:. Show Answer Correct Answer: D) Online brute force attack:. 57. Which one of the following best describes a direct consequence of identity theft? A) Your keyboard or mouse may stop working. B) Your broadband connection may suffer from reduced speed. C) Your computer may take longer to start. D) Your e-mail account may be accessed by someone else. Show Answer Correct Answer: D) Your e-mail account may be accessed by someone else. 58. Before you enter your private and personal information online, you should find out: A) How the company collecting your information will protect it. B) Why the company needs it. C) With whom it might be shared. D) All of the above. Show Answer Correct Answer: D) All of the above. 59. Menyebarkan informasi tanpa mengecek kebenarannya melalui media sosial A) Benar. B) Salah. C) All the above. D) None of the above. Show Answer Correct Answer: B) Salah. 60. You turn on a laptop computer and the hard drive is not recognized. Where should you go to troubleshoot the issue? A) S.M.A.R.T. diagnostics. B) Boot sector manager. C) BIOS/UEFI. D) Windows Device Manager. Show Answer Correct Answer: C) BIOS/UEFI. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books