Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 15 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. Who social networks are organized primarily .....
2. Which one of the following best describes what can be used to conceal malware on a computer?
3. 1) IoT devices pose an even greater risk than your other computing devices.
4. Which of the following involves using someone's personal information, such as a Social Security number, to fraudulently establish bank or credit card accounts?
5. Hal yang diperbolehkan dalam penggunaan password kemenkeu adalah .....
6. Software that automatically displays advertisements on a computer is called .....
7. Which of the following can be considered as the elements of cyber security?
8. What is a critical component of personal digital security?
9. A series of characters used to gain access to a system or service
10. ..... is a network or host-based cyber observables or artifacts of an incursion.
11. Physical and logical arrangement of networks called as .....
12. MobiShield is a mobile antivirus for which operating system?
13. Which one of the following should be used to change your password?
14. Which one of the following could lead to the spread of a malicious program?
15. What is the term for computer programs that attack your computer?
16. Where does cookies, back ups, biometrics, password belong
17. I will be a good online citizen that won't post anything to hurt anyone and won't go against the law. True or False?
18. ..... means the protection of data from modification unknown users
19. A program that appears to be harmless, but harmful in destroying data.
20. What is a firewall in the context of cybersecurity?
21. What is the main application of optical fibers in telecommunications?
22. What type of authentication method identifies and recognizes people based on physical traits such as fingerprints?
23. Which encryption method is commonly used to secure data?
24. What is part of Chris's role as an IT technician?
25. Indicate whether the statement is true or false. 6. When creating passwords, the most important principle is that length is more important than complexity.
26. What stands for NAT in networking?
27. What is Internet Protocol (IP) used for?
28. Similar to Phishing but instead of using email it uses SMS
29. What does two-factor authentication commonly use?
30. What is two-factor authentication?
31. What is meant by block chain?
32. What is the role of the TLS (Transport Layer Security) protocol?
33. Phishing is .....
34. A technical needs to connect a computer to a network using an ethernet cable. To which of th following connector types does the technician connect the cable?
35. What is a password?
36. Which of the following certifying authorities are not authorized by Ministry of Corporate Affairs for issuance of DSCs under IT Act 2000
37. If someone suspects that a company holds inaccurate information about them:
38. Use a single backbone cable
39. Unauthorized access to control over computer network security systems
40. What is the benefit of enabling 2FA (Two Factor Authentication)?
41. Say our email id password to some stranger is safe
42. The term 'cybersecurity' was coined in which year?
43. A ..... is a computer that provides services to clients or workstations.
44. What year marked a significant increase in data creation, posing new challenges for data protection?
45. Identify the legal type of hacking
46. If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of ..... years.
47. You're at collage and you come across inappropriate or illegal content on the computer. What do you do?
48. Apa yang menjadi aspek hukum siber di Indonesia?
49. You receive a link that is going to give you a free gift. What could this be?
50. You are searching for some latest movie/song video on the internet. You find a link to download free movies! What is the link actually going to give you?
51. Given the IP address 192.168.1.5, is the IP address 192.167.1.6 in the same network?
52. Ajith, newly recruited employee in RBI has used RBI's logo as his profile picture in Linkedin. Is it allowed as per Bank's Social Media Policy?
53. What was Chris's previous job before starting the IT and cyber security traineeship?
54. You can protect your files from unauthorised access by?
55. What does phishing mean?
56. Which is the strongest password, Giving below
57. What is brute force in the context of cyber threats?
58. Sita is getting messages to win money. She just has to share her social media password. What should she do?
59. ..... are the network points that acts as an entrance to another network
60. Which of the below does not qualify as a form of peer-to-peer cybercrime?