This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 15 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 15 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. Who social networks are organized primarily ..... A) Brands. B) People. C) Discussions. D) Intrests. Show Answer Correct Answer: B) People. 2. Which one of the following best describes what can be used to conceal malware on a computer? A) A modem. B) A driver. C) A trojan. D) A folder. Show Answer Correct Answer: C) A trojan. 3. 1) IoT devices pose an even greater risk than your other computing devices. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 4. Which of the following involves using someone's personal information, such as a Social Security number, to fraudulently establish bank or credit card accounts? A) Identity theft. B) Information theft. C) Property theft. D) Identity borrowing. Show Answer Correct Answer: A) Identity theft. 5. Hal yang diperbolehkan dalam penggunaan password kemenkeu adalah ..... A) Password mengandung kombinasi huruf, angka, dan karakter khusus. B) Menyimpan password di handphone/komputer. C) Password mirip dengan nama akun. D) Menuliskan password di kertas. Show Answer Correct Answer: A) Password mengandung kombinasi huruf, angka, dan karakter khusus. 6. Software that automatically displays advertisements on a computer is called ..... A) Freeware. B) Shareware. C) Malware. D) Adware. Show Answer Correct Answer: D) Adware. 7. Which of the following can be considered as the elements of cyber security? A) Network Security. B) Operational Security. C) Application Security. D) All of the above. Show Answer Correct Answer: D) All of the above. 8. What is a critical component of personal digital security? A) Creating strong, complex passwords. B) Sharing passwords with trusted friends. C) Using the same password for all accounts. D) Writing down passwords in a common area. Show Answer Correct Answer: A) Creating strong, complex passwords. 9. A series of characters used to gain access to a system or service A) Security. B) Password. C) Encryption. D) Protocol. E) Biometrics. Show Answer Correct Answer: B) Password. 10. ..... is a network or host-based cyber observables or artifacts of an incursion. A) OSINT. B) Dark web. C) STIX. D) IoC. Show Answer Correct Answer: D) IoC. 11. Physical and logical arrangement of networks called as ..... A) Tapealogy. B) Topology. C) Bus Topology. D) None of the above. Show Answer Correct Answer: B) Topology. 12. MobiShield is a mobile antivirus for which operating system? A) Android. B) Symbian. C) Windows Mobile. D) IOS. Show Answer Correct Answer: D) IOS. 13. Which one of the following should be used to change your password? A) Control Panel. B) Anti-virus software. C) Windows Firewall. D) Internet Explorer. Show Answer Correct Answer: A) Control Panel. 14. Which one of the following could lead to the spread of a malicious program? A) Using only software that has been checked for viruses. B) Using a USB Flash Drive from an unknown source to exchange data. C) Opening only virus-checked file attachments from known sources. D) Maintaining regularly updated anti-virus software. Show Answer Correct Answer: B) Using a USB Flash Drive from an unknown source to exchange data. 15. What is the term for computer programs that attack your computer? A) DangerDroids. B) RudeBots. C) Dangerware. D) Malware. Show Answer Correct Answer: D) Malware. 16. Where does cookies, back ups, biometrics, password belong A) Encryption software. B) Antivirus. C) Fire walls. D) None of the above. Show Answer Correct Answer: A) Encryption software. 17. I will be a good online citizen that won't post anything to hurt anyone and won't go against the law. True or False? A) False. B) True. C) All the above. D) None of the above. Show Answer Correct Answer: B) True. 18. ..... means the protection of data from modification unknown users A) Integrity. B) Non reputation. C) Confidentiality. D) Availablity. Show Answer Correct Answer: A) Integrity. 19. A program that appears to be harmless, but harmful in destroying data. A) Roman Horse. B) War Machine. C) Grasshoppers. D) Trojan Horse. Show Answer Correct Answer: D) Trojan Horse. 20. What is a firewall in the context of cybersecurity? A) A physical barrier around a computer. B) A software or hardware security system that monitors and controls incoming and outgoing network traffic. C) A type of encryption algorithm. D) A computer virus. Show Answer Correct Answer: B) A software or hardware security system that monitors and controls incoming and outgoing network traffic. 21. What is the main application of optical fibers in telecommunications? A) Carrying the majority of internet traffic. B) Providing power to devices. C) Storing data in cloud services. D) None of the above. Show Answer Correct Answer: A) Carrying the majority of internet traffic. 22. What type of authentication method identifies and recognizes people based on physical traits such as fingerprints? A) Digital certificates. B) Biometrics. C) WEP. D) RADIUS. Show Answer Correct Answer: B) Biometrics. 23. Which encryption method is commonly used to secure data? A) RSA (Rivest-Shamir-Adleman). B) AES (Advanced Encryption Standard). C) Blowfish. D) DES (Data Encryption Standard). Show Answer Correct Answer: B) AES (Advanced Encryption Standard). 24. What is part of Chris's role as an IT technician? A) Handling customer complaints. B) Managing employee schedules. C) Ensuring IT equipment is functioning and repaired. D) Repairing office furniture. Show Answer Correct Answer: C) Ensuring IT equipment is functioning and repaired. 25. Indicate whether the statement is true or false. 6. When creating passwords, the most important principle is that length is more important than complexity. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 26. What stands for NAT in networking? A) Network address translation. B) Network address transpose. C) Network analyzetool. D) Network andtransportation. Show Answer Correct Answer: A) Network address translation. 27. What is Internet Protocol (IP) used for? A) To send mail across the internet. B) To transmit webpages across the internet. C) To ensure that information is sent to the correct computer. D) To send information across the internet in packets. Show Answer Correct Answer: C) To ensure that information is sent to the correct computer. 28. Similar to Phishing but instead of using email it uses SMS A) Cookies. B) Pharming. C) Smishing. D) Vishing. Show Answer Correct Answer: C) Smishing. 29. What does two-factor authentication commonly use? A) Security questions. B) Sending a text message or push notification. C) Password only. D) Antivirus software. Show Answer Correct Answer: B) Sending a text message or push notification. 30. What is two-factor authentication? A) A method to reset your password securely. B) A single password used for account access. C) A way to encrypt your data online. D) Two-factor authentication is a security measure that requires two forms of identification to access an account. Show Answer Correct Answer: D) Two-factor authentication is a security measure that requires two forms of identification to access an account. 31. What is meant by block chain? A) A digital exchange. B) A type of cryptocurrency. C) A central ledger. D) A ledger distributed over peer to peer network. Show Answer Correct Answer: D) A ledger distributed over peer to peer network. 32. What is the role of the TLS (Transport Layer Security) protocol? A) Routing network traffic. B) Secure communication over a network. C) Dynamic IP assignment. D) Packet fragmentation and reassembly. Show Answer Correct Answer: B) Secure communication over a network. 33. Phishing is ..... A) Any attempt to get information from you. B) The claw machine at Dave & Busters that gets you a prize. C) Harmless. D) None of the above. Show Answer Correct Answer: A) Any attempt to get information from you. 34. A technical needs to connect a computer to a network using an ethernet cable. To which of th following connector types does the technician connect the cable? A) Rj11. B) Serial. C) Rj45. D) USB. Show Answer Correct Answer: C) Rj45. 35. What is a password? A) A password is a type of computer virus. B) A password is a physical key for a door. C) A password is a username used for login. D) A password is a secret string of characters used for authentication. Show Answer Correct Answer: D) A password is a secret string of characters used for authentication. 36. Which of the following certifying authorities are not authorized by Ministry of Corporate Affairs for issuance of DSCs under IT Act 2000 A) (n) Code Solutions. B) EMudra. C) IDRBT. D) EnTrust. Show Answer Correct Answer: D) EnTrust. 37. If someone suspects that a company holds inaccurate information about them: A) They have a right to see what data the company holds about them. B) They will be unable to get the data corrected. C) They can correct the data themselves. D) They can log on any time to find out what data is held about them. Show Answer Correct Answer: A) They have a right to see what data the company holds about them. 38. Use a single backbone cable A) Ring. B) Mesh. C) Star. D) Bus. Show Answer Correct Answer: D) Bus. 39. Unauthorized access to control over computer network security systems A) Surfing. B) Security. C) Hacking. D) Dancing. Show Answer Correct Answer: C) Hacking. 40. What is the benefit of enabling 2FA (Two Factor Authentication)? A) Faster login. B) Protection from hacking. C) Better design. D) More storage. Show Answer Correct Answer: B) Protection from hacking. 41. Say our email id password to some stranger is safe A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 42. The term 'cybersecurity' was coined in which year? A) 1969. B) 1995. C) 1971. D) 1988. Show Answer Correct Answer: D) 1988. 43. A ..... is a computer that provides services to clients or workstations. A) Main Computer. B) Server/ Central Hub. C) Service provider. D) None of the above. Show Answer Correct Answer: B) Server/ Central Hub. 44. What year marked a significant increase in data creation, posing new challenges for data protection? A) 2020. B) 2017. C) 2019. D) 2015. Show Answer Correct Answer: B) 2017. 45. Identify the legal type of hacking A) Ethical hacking. B) Non ethical hacking. C) Hacktivism. D) Cracking. Show Answer Correct Answer: A) Ethical hacking. 46. If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of ..... years. A) 5. B) 3. C) 2. D) 4. Show Answer Correct Answer: A) 5. 47. You're at collage and you come across inappropriate or illegal content on the computer. What do you do? A) Click on the content and look through it with your friends. B) Tell your teacher. C) Ignore it and exit the window. D) None of the above. Show Answer Correct Answer: B) Tell your teacher. 48. Apa yang menjadi aspek hukum siber di Indonesia? A) Transaksi di situs jual beli. B) Kesehatan tubuh dan mental. C) Privasi, hak cipta, dan merek dagang. D) Etika berkomunikasi secara daring. E) Privasi, fitnah, pencurian. Show Answer Correct Answer: C) Privasi, hak cipta, dan merek dagang. 49. You receive a link that is going to give you a free gift. What could this be? A) Trojan. B) Worm. C) Phishing. D) Malware. Show Answer Correct Answer: A) Trojan. 50. You are searching for some latest movie/song video on the internet. You find a link to download free movies! What is the link actually going to give you? A) FREE MOVIES FOR LIFE!. B) Virus / Malware. C) Download everything for free. D) Music / Videos Downloads. Show Answer Correct Answer: B) Virus / Malware. 51. Given the IP address 192.168.1.5, is the IP address 192.167.1.6 in the same network? A) Yes. B) No. C) All the above. D) None of the above. Show Answer Correct Answer: B) No. 52. Ajith, newly recruited employee in RBI has used RBI's logo as his profile picture in Linkedin. Is it allowed as per Bank's Social Media Policy? A) Yes. B) No. C) All the above. D) None of the above. Show Answer Correct Answer: B) No. 53. What was Chris's previous job before starting the IT and cyber security traineeship? A) Data Analyst. B) Software Developer. C) Lettings Administrator. D) Network Engineer. Show Answer Correct Answer: C) Lettings Administrator. 54. You can protect your files from unauthorised access by? A) Only allowing your friends and family to know your passwords. B) Never using computers in a public place such as a library. C) Choosing a strong password and changing it regularly. D) None of the above. Show Answer Correct Answer: C) Choosing a strong password and changing it regularly. 55. What does phishing mean? A) Phishing is a fraudulent attempt to obtain sensitive information by pretending to be a trustworthy source. B) Phishing is a secure way to share passwords. C) Phishing is a type of fishing technique. D) Phishing refers to a method of online shopping. Show Answer Correct Answer: A) Phishing is a fraudulent attempt to obtain sensitive information by pretending to be a trustworthy source. 56. Which is the strongest password, Giving below A) Mypet123. B) WMesgh1234435xxw. C) 1234435. D) 3345986. Show Answer Correct Answer: B) WMesgh1234435xxw. 57. What is brute force in the context of cyber threats? A) A physical attack on computer hardware. B) When the criminal uses extensive trial and error methods to guess a password or other important information. C) A method of protecting personal data by encrypting it. D) Sending unsolicited emails to large numbers of people. Show Answer Correct Answer: B) When the criminal uses extensive trial and error methods to guess a password or other important information. 58. Sita is getting messages to win money. She just has to share her social media password. What should she do? A) Share the Password. B) Tell an adult and ask for help. C) Talk to the stranger. D) None of the above. Show Answer Correct Answer: B) Tell an adult and ask for help. 59. ..... are the network points that acts as an entrance to another network A) Bridge. B) Router. C) Gateway. D) Switch. Show Answer Correct Answer: C) Gateway. 60. Which of the below does not qualify as a form of peer-to-peer cybercrime? A) Phishing. B) On the deep web, payment information is leaked. C) Mm. D) Trojans are implanted into a targeted device. Show Answer Correct Answer: B) On the deep web, payment information is leaked. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books