Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 14 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. Is the unauthorised access to a computer system.
2. Which one of the following is most likely to manage the authentication, authorization and accounting within a computer network?
3. Which of the following is independent malicious program that need not any host program?
4. A networked group of computers used by hackers to steal information is referred to asa ..... ?
5. You just placed an order with:Orbitz, Priceline.com, Buy.com, 1-800Flowers, Continental Airlines, and Fandango. Because you entered your email in the "free coupon" pop-up ad afterwards you get .....
6. Which of the following is not true about cyber security?
7. Criminal hackers who access computer systems without permission for malicious (bad) reasons.
8. What is the technology in which the user feels that they are in a virtual environment?
9. Which group of cybercriminals is focused on control, power, and wealth, and may even provide cybercrime as a service?
10. What is a server in a computer network?
11. What is the primary function of a firewall in network security?
12. What does 'integrity of data' mean?
13. Which one of the following best describes a known security vulnerability of instant messaging (IM)?
14. What is a Trojan malware?
15. Able to attack the network using a smart device with low security like a thermostate, or home sercurity
16. Data is held hostage or threatened to be released by encrypting it through malware. To undo the encrcyption a ranson often needs to be paid
17. Passive scans compare the system you are scanning to a baseline.
18. In relation to computers, what is a virus?
19. What did Chris particularly enjoy in the course?
20. Which of the following is not a characteristic of a good encryption algorithm?
21. What is the punishment in India for stealing computer documents, assets or any software's source code from any organization, individual, or from any other means?
22. What does the acronym "HTTPS" stand for?
23. Key Logger is a .....
24. What would you do if a stranger sends you an E-mail saying that you won a Macbook Air Pro
25. The Act which specifies the rules about collecting and holding personal data is called:
26. Apa yang dimaksud dengan Cyber Security?
27. What is the function of the Application Layer?
28. Apa yang dimaksud dengan serangan DDoS (Distributed Denial of Service)?
29. An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
30. What is an attack vector?
31. The ..... cipher reorders the plain text characters to create a cipher text.
32. Companies have become more dependent on digital tools and systems. That makes them ..... to hacking:
33. What type of attack specifically targets availability?
34. You are looking through internet for downloading apps and find an interesting app to make free calls.
35. Unauthorized access to control over computer network security systems is called?
36. Which of the following is a phishing email??
37. Hak Kekayaan Intelektual (HKI) Dapat di golongkan menjadi 2 yaitu?
38. Explain the term 'digital properties'.
39. These hackers often look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found, they report them to the owner, sometimes requesting a small fee to fix the problem.
40. What does a Virtual Private Network (VPN) provide?
41. From which of the following types of network do file-sharing torrent application download information?
42. How does a VPN enhance online privacy?
43. Which of the following would be the BEST option for a few individuals who to collaborate remotely?
44. An image or recording that has been convincingly altered and manipulated.
45. Which cybersecurity practice involves disguising data to make it unreadable without the appropriate decryption key?
46. What is the primary motivation for most cybercriminals, according to the provided information?
47. Which of these will not put you at risk of malware attacks?
48. A system in which all computer programs and data is stored on a central server.
49. What type of malware is designed to replicate itself?
50. The objective of the ..... is to intentionally and illegally breach computer security for malicious intent, damage, financial profit or for fun.
51. What port number is used by the Secure Shell (SSH) protocol?
52. When the cybersecurity breach at AIIMS occur?
53. What protocol is used for reliable data transmission?
54. What is the best way to create a strong password?
55. ..... use capacitance, in a similar way to the touch screen, to detect ridges along the skin. The patterns of your finger print actually make up a number of ridges and valleys
56. Apa saja aspek keamanan yang disebutkan pak Budi dengan singkatan PPT?
57. Uses a number of computers over a network of infected machines which send req uests to a website which would bring it offline
58. Which of the following is not a type of cipher?
59. What is spear phising?
60. What must a user need to decrypt a file?