This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 14 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 14 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. Is the unauthorised access to a computer system. A) Hacking. B) Cracking. C) Firewall. D) Keylogger. E) Spam. Show Answer Correct Answer: A) Hacking. 2. Which one of the following is most likely to manage the authentication, authorization and accounting within a computer network? A) The support staff. B) The CEO of the company. C) The network administrator. D) The IT manager. Show Answer Correct Answer: C) The network administrator. 3. Which of the following is independent malicious program that need not any host program? A) Virus. B) Worm. C) Trap doors. D) Trojan horse. Show Answer Correct Answer: B) Worm. 4. A networked group of computers used by hackers to steal information is referred to asa ..... ? A) Rootkit. B) Operating system. C) Botnet. D) DDoS. Show Answer Correct Answer: C) Botnet. 5. You just placed an order with:Orbitz, Priceline.com, Buy.com, 1-800Flowers, Continental Airlines, and Fandango. Because you entered your email in the "free coupon" pop-up ad afterwards you get ..... A) A $ 10 off coupon on your next order sent to your email. B) A $ 10 off coupon on your next order sent with your order. C) A repeating charge from a "web loyalty" company on your credit card. D) None of these are correct. Show Answer Correct Answer: C) A repeating charge from a "web loyalty" company on your credit card. 6. Which of the following is not true about cyber security? A) Recent data breaches have released personal information of hundreds of millions of people. B) Cyber security is the protection of computer systems, networks, and data from digital attacks. C) As we rely more on computing devices to store and send data, we increase our vulnerability to cyber attacks. D) Cyber attacks can devastate large organizations, but individuals are largely unaffected. Show Answer Correct Answer: D) Cyber attacks can devastate large organizations, but individuals are largely unaffected. 7. Criminal hackers who access computer systems without permission for malicious (bad) reasons. A) Black hat. B) White hat. C) Grey hat. D) None of the above. Show Answer Correct Answer: A) Black hat. 8. What is the technology in which the user feels that they are in a virtual environment? A) VR. B) AI. C) IR. D) RA. Show Answer Correct Answer: A) VR. 9. Which group of cybercriminals is focused on control, power, and wealth, and may even provide cybercrime as a service? A) Gray hat hackers. B) Hacktivists. C) Amateurs. D) Organized Hackers. Show Answer Correct Answer: D) Organized Hackers. 10. What is a server in a computer network? A) Someone who manages the network. B) The name for a large number of computer cables. C) A powerful computer that provides centralized file storage. D) None of the above. Show Answer Correct Answer: C) A powerful computer that provides centralized file storage. 11. What is the primary function of a firewall in network security? A) To safeguard against unauthorized access. B) To ensure secure data storage. C) To facilitate file backups. D) To enhance internet connection speed. Show Answer Correct Answer: A) To safeguard against unauthorized access. 12. What does 'integrity of data' mean? A) "Accuracy and completeness of the data". B) "Data should be viewable at all times". C) "Data should be access by only the right people". D) "None of the above". Show Answer Correct Answer: A) "Accuracy and completeness of the data". 13. Which one of the following best describes a known security vulnerability of instant messaging (IM)? A) Messages can shut down the firewall. B) Message text can be a virus in itself. C) Messages can disable the power supply. D) Message attachments can contain malware. Show Answer Correct Answer: D) Message attachments can contain malware. 14. What is a Trojan malware? A) A type of malware that appears to be a legitimate program, but actually causes harm. B) A type of malware that deletes programs on the system each time replacing them with itself. C) A type of malware that spies on users without their knowledge. D) A type of malware that removes and sends all of your files to a third party, over time so you don't notice. Show Answer Correct Answer: A) A type of malware that appears to be a legitimate program, but actually causes harm. 15. Able to attack the network using a smart device with low security like a thermostate, or home sercurity A) Rootkits. B) Zero Day Exploit. C) Denial of Service. D) IOT Attack. Show Answer Correct Answer: D) IOT Attack. 16. Data is held hostage or threatened to be released by encrypting it through malware. To undo the encrcyption a ranson often needs to be paid A) IOT Attacks. B) Phisphing. C) Ransomeware. D) Spyware. Show Answer Correct Answer: C) Ransomeware. 17. Passive scans compare the system you are scanning to a baseline. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 18. In relation to computers, what is a virus? A) A program that is useful to download from the Internet. B) A URL that may lead the user to download a video file. C) A self-replicating program that damages the hard drive and affects the computer's operation. D) A program that secretly watches your computer activity and sends the information over the Internet. Show Answer Correct Answer: C) A self-replicating program that damages the hard drive and affects the computer's operation. 19. What did Chris particularly enjoy in the course? A) Networking. B) Graphic Design. C) Programming. D) Database Management. Show Answer Correct Answer: A) Networking. 20. Which of the following is not a characteristic of a good encryption algorithm? A) Authenticity. B) Availability. C) Integrity. D) Confidentiality. Show Answer Correct Answer: B) Availability. 21. What is the punishment in India for stealing computer documents, assets or any software's source code from any organization, individual, or from any other means? A) 6 months of imprisonment and a fine of Rs. 50, 000. B) 1 year of imprisonment and a fine of Rs. 100, 000. C) 2 years of imprisonment and a fine of Rs. 250, 000. D) 3 years of imprisonment and a fine of Rs. 500, 000. Show Answer Correct Answer: D) 3 years of imprisonment and a fine of Rs. 500, 000. 22. What does the acronym "HTTPS" stand for? A) Hypertext Transfer Protocol Secure. B) Hypertext Transmission Privacy System. C) Hyperlink Text Security. D) High-Tech Secure Protocol. Show Answer Correct Answer: A) Hypertext Transfer Protocol Secure. 23. Key Logger is a ..... A) Antivirus. B) Hardware. C) Firmware. D) Spyware. Show Answer Correct Answer: D) Spyware. 24. What would you do if a stranger sends you an E-mail saying that you won a Macbook Air Pro A) Open the E-mail and agree to claim the prize. B) Delete as soon as you see the subject. C) Delete after opening it. D) Ask If you need my address and phone number. Show Answer Correct Answer: B) Delete as soon as you see the subject. 25. The Act which specifies the rules about collecting and holding personal data is called: A) The Criminal Misuse Act. B) The Data Protection Act. C) The Personal Data Act. D) The Health and Safety Act. Show Answer Correct Answer: B) The Data Protection Act. 26. Apa yang dimaksud dengan Cyber Security? A) Segala proses dan praktek yang melindungi pangan dari pencemaran. B) Tidak tahu karena tidak mendengarkan. C) Segala proses dan praktek yang melindungi kekayaan intelektual dari mereka yang tidak berhak. D) Keamanan Bapak Cyber. Show Answer Correct Answer: C) Segala proses dan praktek yang melindungi kekayaan intelektual dari mereka yang tidak berhak. 27. What is the function of the Application Layer? A) Translates data between different formats. B) Provides network services directly to users. C) Routes packets through the network. D) Establishes sessions between applications. Show Answer Correct Answer: B) Provides network services directly to users. 28. Apa yang dimaksud dengan serangan DDoS (Distributed Denial of Service)? A) Serangan yang meretas akun media sosial. B) Serangan yang melumpuhkan layanan dengan membanjiri server dengan permintaan palsu. C) Serangan yang mencuri data pribadi. D) Serangan yang menginstal malware pada perangkat. Show Answer Correct Answer: B) Serangan yang melumpuhkan layanan dengan membanjiri server dengan permintaan palsu. 29. An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients. A) Denial of Service. B) Replay Attack. C) Password Attack. D) Man-in-the-Middle Attack. Show Answer Correct Answer: A) Denial of Service. 30. What is an attack vector? A) A method or pathway used by an attacker to gain access to a system or network. B) A tool or technique used by an attacker to exploit a vulnerability in a system or network. C) A goal or objective pursued by an attacker to compromise a system or network. D) All of the above. Show Answer Correct Answer: A) A method or pathway used by an attacker to gain access to a system or network. 31. The ..... cipher reorders the plain text characters to create a cipher text. A) Encryption. B) Transposition. C) Hashing. D) Substitution. Show Answer Correct Answer: B) Transposition. 32. Companies have become more dependent on digital tools and systems. That makes them ..... to hacking: A) Vulnerable. B) Unattractive. C) Resistant. D) Less of a target. Show Answer Correct Answer: A) Vulnerable. 33. What type of attack specifically targets availability? A) SQL injection attack. B) Man-in-the-middle attack. C) Denial of Service attack. D) Phishing attack. Show Answer Correct Answer: C) Denial of Service attack. 34. You are looking through internet for downloading apps and find an interesting app to make free calls. A) Download it and never pay to recharge again!. B) Don't trust, don't download. C) Download the app just to check if it works or not. D) Forward it to your friends also, otherwise it won't work. Show Answer Correct Answer: B) Don't trust, don't download. 35. Unauthorized access to control over computer network security systems is called? A) Hacking. B) Surfing. C) Dancing. D) Security. Show Answer Correct Answer: A) Hacking. 36. Which of the following is a phishing email?? A) You have won a lottery!! Follow this link to claim it!!. B) Your bank account has been compromised. Login here to protect yourself. C) Help.I am stuck aboard and urgently need money transferred to me to get home. D) All of the above. Be careful. Show Answer Correct Answer: D) All of the above. Be careful. 37. Hak Kekayaan Intelektual (HKI) Dapat di golongkan menjadi 2 yaitu? A) Hak bersama. B) Hak cipta dan Hak waris. C) Hak cipta dan Hak kekayaan industri. D) Hak waris dan Hak dagang. E) Hak kekayaan industri dan Hak dagang. Show Answer Correct Answer: C) Hak cipta dan Hak kekayaan industri. 38. Explain the term 'digital properties'. A) Digital properties are only related to software applications and coding. B) Digital properties refer to physical assets like real estate and vehicles. C) Digital properties are temporary files stored on a computer's hard drive. D) Digital properties are assets in a digital format that can be owned and managed, such as websites, social media accounts, and digital content. Show Answer Correct Answer: D) Digital properties are assets in a digital format that can be owned and managed, such as websites, social media accounts, and digital content. 39. These hackers often look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem. A) A white hat hacker. B) A black hat hacker. C) A grey hat hacker. D) A yellow hat hacker. Show Answer Correct Answer: C) A grey hat hacker. 40. What does a Virtual Private Network (VPN) provide? A) A recovery plan for disasters. B) A method for hackers to gain access. C) A private connection within a larger network for authorized users. D) A public connection for all users. Show Answer Correct Answer: C) A private connection within a larger network for authorized users. 41. From which of the following types of network do file-sharing torrent application download information? A) Direct link (PC-to PC) network. B) Bluetooth sharing. C) AD hoc network. D) Peer-to peer network. Show Answer Correct Answer: D) Peer-to peer network. 42. How does a VPN enhance online privacy? A) A VPN allows users to access more websites without restrictions. B) A VPN speeds up internet connection by reducing latency. C) A VPN provides free internet access to all users. D) A VPN enhances online privacy by encrypting internet traffic and masking the user's IP address. Show Answer Correct Answer: D) A VPN enhances online privacy by encrypting internet traffic and masking the user's IP address. 43. Which of the following would be the BEST option for a few individuals who to collaborate remotely? A) Cloud based software. B) Homegroup. C) Workgoup. D) Ad hoc networke. Show Answer Correct Answer: A) Cloud based software. 44. An image or recording that has been convincingly altered and manipulated. A) Deepfake. B) Pen Testing. C) Social Engineering. D) Clickjacking. Show Answer Correct Answer: A) Deepfake. 45. Which cybersecurity practice involves disguising data to make it unreadable without the appropriate decryption key? A) Hacking. B) Intrusion detection. C) Phishing. D) Encryption. Show Answer Correct Answer: D) Encryption. 46. What is the primary motivation for most cybercriminals, according to the provided information? A) Political statements. B) Curiosity and skill demonstration. C) Financial gain. D) Improving system security. Show Answer Correct Answer: C) Financial gain. 47. Which of these will not put you at risk of malware attacks? A) Opening email attachments from unknown sources. B) Downloading pirate movies from torrent services. C) Not installing updates for your operating system. D) Using a free operating system like Linux, as opposed to using Windows. Show Answer Correct Answer: D) Using a free operating system like Linux, as opposed to using Windows. 48. A system in which all computer programs and data is stored on a central server. A) Software. B) Cloud Computing. C) Server. D) Data Table. Show Answer Correct Answer: B) Cloud Computing. 49. What type of malware is designed to replicate itself? A) Virus. B) Spyware. C) Worm. D) Trojan. Show Answer Correct Answer: C) Worm. 50. The objective of the ..... is to intentionally and illegally breach computer security for malicious intent, damage, financial profit or for fun. A) CRACKER. B) SCRIPT KIDDIES. C) HACKER. D) CYBER TERRORIST. Show Answer Correct Answer: A) CRACKER. 51. What port number is used by the Secure Shell (SSH) protocol? A) 21. B) 23. C) 80. D) 22. Show Answer Correct Answer: D) 22. 52. When the cybersecurity breach at AIIMS occur? A) 2021. B) March 2022. C) March 2020. D) No information available. Show Answer Correct Answer: B) March 2022. 53. What protocol is used for reliable data transmission? A) Ethernet. B) IP. C) TCP. D) UDP. Show Answer Correct Answer: C) TCP. 54. What is the best way to create a strong password? A) Use your name and birthdate. B) Use "Password@1234" for easy remembering. C) Use a mix of letters, numbers, and symbols. D) Use the same password everywhere. Show Answer Correct Answer: C) Use a mix of letters, numbers, and symbols. 55. ..... use capacitance, in a similar way to the touch screen, to detect ridges along the skin. The patterns of your finger print actually make up a number of ridges and valleys A) Facial recognition. B) Finger print scanners. C) All the above. D) None of the above. Show Answer Correct Answer: B) Finger print scanners. 56. Apa saja aspek keamanan yang disebutkan pak Budi dengan singkatan PPT? A) Person, People, Technology. B) People, Permission, Technology. C) Person, Permission, Tracebility. D) People, Process, Technology. Show Answer Correct Answer: D) People, Process, Technology. 57. Uses a number of computers over a network of infected machines which send req uests to a website which would bring it offline A) SQL. B) USB. C) WLAN. D) DoS. Show Answer Correct Answer: D) DoS. 58. Which of the following is not a type of cipher? A) Vigenere cipher. B) RSA cipher. C) Substitution cipher. D) Transposition cipher. Show Answer Correct Answer: B) RSA cipher. 59. What is spear phising? A) Phising using voice calls. B) Phising through social media. C) Phising with fake websites. D) Phising targeting a specific individual. Show Answer Correct Answer: D) Phising targeting a specific individual. 60. What must a user need to decrypt a file? A) Graph. B) Token. C) Key. D) Coin. Show Answer Correct Answer: C) Key. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books