This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 16 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 16 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. What devices can we use to go online? A) Refrigerators. B) Washing machines. C) Computers, smartphones, tablets, smart TVs, gaming consoles. D) Microwaves. Show Answer Correct Answer: C) Computers, smartphones, tablets, smart TVs, gaming consoles. 2. What type of key is not shared and computers cannot decrypt a message without it? A) Personal key. B) Free key. C) Private key. D) Public key. Show Answer Correct Answer: C) Private key. 3. Identify the firewall services A) Firewalking. B) Banner grabbing. C) Packet filter. D) Port-scanning. Show Answer Correct Answer: B) Banner grabbing. 4. Ms.Sheetal, an employee of the Bank has included a slogan & symbol for water conservation, as part of an initiative of dominant political party, in her email signature. Is it allowed as per the current IS Policy of the Bank? A) Yes. B) No. C) All the above. D) None of the above. Show Answer Correct Answer: B) No. 5. Phishing is a type of social engineering attack. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 6. After installing a new workstation and setting up a user account, Which of the following should be completed to harden the system property? A) Run software and security updates. B) Installing peripheral device. C) Add more user accounts. D) Configure cloud based storage. Show Answer Correct Answer: B) Installing peripheral device. 7. A web page on a website is created using HTML. True or False? A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 8. A computer virus may be used to- A) Access private data like user id and passwords. B) Log the user's keystrokes. C) Corrupt data in your computer. D) All of the above. Show Answer Correct Answer: D) All of the above. 9. In computer security, ..... means that computer system assets can be modified only by authorized parities. A) Integrity. B) Availability. C) Authenticity. D) Confidentiality. Show Answer Correct Answer: A) Integrity. 10. Which of the following media BEST deters data theft over a network connection? A) WIFI. B) Satellite. C) Wired. D) Cellular/mobile data. Show Answer Correct Answer: D) Cellular/mobile data. 11. Contoh Aplikasi dari VOIP ..... A) Email. B) Tiktok dan YouTube. C) Line, WhatsApp. D) M-banking, gopay. E) Lazada dan shopee. Show Answer Correct Answer: C) Line, WhatsApp. 12. A program hiding inside a useful program with malicious purposes. A) Ransomeware. B) Trojan. C) Worm. D) Phisphing. Show Answer Correct Answer: B) Trojan. 13. A name used to gain access to a computer system. A) Your Name. B) User Name. C) Password. D) Identification Name. Show Answer Correct Answer: B) User Name. 14. When the computer systems of an organization are deliberately attacked to find any weaknesses A) Social Engineering. B) Rootkit. C) Hackers. D) Pen Testing. Show Answer Correct Answer: D) Pen Testing. 15. Which phase of hacking performs actual attack on a network or system? A) Reconnaissance. B) Maintaining Access. C) Gaining Access. D) Scanning. Show Answer Correct Answer: C) Gaining Access. 16. Which of the following are the Cyber crimes? 1). Cyber crimes against persons. 2) . Cyber crimes against property. 3). Cyber crimes against government. 4). Cyber crimes against animal? A) 1, 3, 4 only. B) 2, 3 only. C) 2, 3, 4 only. D) 1, 2, 3 only. Show Answer Correct Answer: D) 1, 2, 3 only. 17. ..... is an overlay network that is not indexed by search engines. A) Dark web. B) IoC. C) STIX. D) OSINT. Show Answer Correct Answer: A) Dark web. 18. What should you do if you receive an email from an unknown sender with an attachment? A) Open and check it immediately. B) Forward it to friend and ask about it. C) Delete it or report to IT. D) Reply asking for more details. Show Answer Correct Answer: C) Delete it or report to IT. 19. Which of the below benefits of cyber security is not true? A) System getting slower. B) Computer lagging and crashes. C) Provide privacy to users. D) Secures system against viruses. Show Answer Correct Answer: A) System getting slower. 20. What is the main reason for using reversed character order in cyber security? A) To evade spam filters. B) To trick anti-virus programs. C) To communicate secretly. D) To confuse search engine bots. Show Answer Correct Answer: B) To trick anti-virus programs. 21. What is a rootkit? A) It locks your files and you receive a message asking for payment to release them. B) It tells the user their computer is infected with a virus to scare them into downloading malware. C) It changes permissions on the computer giving hackers administration rights. D) None of the above. Show Answer Correct Answer: C) It changes permissions on the computer giving hackers administration rights. 22. To keep your browser private, you can use the ..... mode. A) Encrypted. B) Incognito. C) Confidential. D) Deception. Show Answer Correct Answer: B) Incognito. 23. What should never be used in your password? A) My name. B) My address. C) My birthday. D) All of the above. Show Answer Correct Answer: D) All of the above. 24. What is the use of VPN A) Connect you with internet. B) Establish a secure connection between you and the internet. C) Stop you from using the internet. D) Let you know any hackers on a website. Show Answer Correct Answer: B) Establish a secure connection between you and the internet. 25. A system that is setup for attracting and monitoring intruders is called A) Honeypot. B) Tracert. C) Router. D) Host Based. Show Answer Correct Answer: A) Honeypot. 26. Apa yang dimaksud dengan kewargaan digital? A) Penggunaan internet tanpa mempertimbangkan dampaknya. B) Penggunaan internet untuk tujuan hiburan semata. C) Penggunaan teknologi secara etis dan bertanggung jawab untuk kepentingan masyarakat. D) Mengakses informasi tanpa membayar apapun. E) Kemampuan untuk menggunakan teknologi hanya untuk kepentingan pribadi. Show Answer Correct Answer: C) Penggunaan teknologi secara etis dan bertanggung jawab untuk kepentingan masyarakat. 27. If you receive a phone call from a stranger asking for information about your invoice payment process, you should A) Provide full and complete answers to all questions. B) Take all questions down and send answer via email. C) Answer only questions for which you know the answer for sure. D) Do not answer questions, but consult your IT department. Show Answer Correct Answer: D) Do not answer questions, but consult your IT department. 28. Which of the following malicious program do not replicate automatically? A) Worm. B) Zombie. C) Virus. D) Trojan Horse. Show Answer Correct Answer: D) Trojan Horse. 29. A Router operates in which layer of the OSI Reference Model? A) Layer 3 (Network Layer). B) Layer 7 (Application Layer). C) Layer 1 (Physical Layer). D) Layer 4 (Transport Layer). Show Answer Correct Answer: A) Layer 3 (Network Layer). 30. Attempting to secretively discover private information about a person, company, or other entity. A) Social Engineering. B) Pretexting. C) Snooping. D) Wiretapping. Show Answer Correct Answer: C) Snooping. 31. Phishing happens A) When you receive an email that looks real and authentic, but it tries to steal sensitive information from your computer such as passwords and credit card numbers. B) When someone tries to contact you in private while playing games. C) When you catch a big fish with a fishing net. D) None of the above. Show Answer Correct Answer: A) When you receive an email that looks real and authentic, but it tries to steal sensitive information from your computer such as passwords and credit card numbers. 32. Which of the following is a method to ensure confidentiality? A) Increasing bandwidth. B) Regular data backups. C) Installing antivirus software. D) Multi-factor authentication. Show Answer Correct Answer: D) Multi-factor authentication. 33. A company stores customer credit card information on their servers. Hackers have gained unauthorized access to these servers and stolen the credit card information.Which legislation has been violated in this cyber security attack? A) Computer Misuse Act 1990. B) Data Protection Act 1998. C) GDPR 2018. D) Identity Theft and Assumption Deterrence Act. Show Answer Correct Answer: C) GDPR 2018. 34. What software can we use to protect our device from hackers? A) Fortnite. B) Firewall. C) Microsoft Office. D) Google Chrome. Show Answer Correct Answer: B) Firewall. 35. Getting back deleted data is what kind of technique? A) Disk recovery. B) Data carving. C) Slacking. D) Header manipulation. Show Answer Correct Answer: B) Data carving. 36. Which one of the following actions is most likely to spread malware? A) Deleting a suspicious e-mail without opening it first. B) Receiving a cookie while visiting a web site for the first time. C) Opening an e-mail attachment from an unknown sender. D) Setting up a firewall with a 6-character long password. Show Answer Correct Answer: C) Opening an e-mail attachment from an unknown sender. 37. Apa salah satu contoh keamanan yang perlu diterapkan oleh warga digital? A) Membuka semua data sensitif kepada publik. B) Menggunakan teknologi tanpa batas waktu. C) Membackup data dan menyebarkan data sensitif ke publik. D) Membackup data dan menginstal antivirus. E) Membagikan privasi orang lain. Show Answer Correct Answer: D) Membackup data dan menginstal antivirus. 38. A customer wants to use an internet connection to make and receive phone calls. This technology is known as: A) Telepresence. B) Virtualizing. C) VoIP. D) Streaming. Show Answer Correct Answer: C) VoIP. 39. Which protocol is primarily used for transferring web pages over the Internet? A) SNMP. B) SMTP. C) FTP. D) HTTPS. Show Answer Correct Answer: D) HTTPS. 40. Which of the following support team/s of DIT, CO are responsible for granting access for CyM/CBS in a PC? A) Perimeter Security Solution Team. B) MSEA Helpdesk. C) End Point Protecting System. D) ISOC Team. Show Answer Correct Answer: A) Perimeter Security Solution Team. 41. What is one advantage of having grown up with technology? A) You have more opportunities to make money. B) You already have years of experience using computers. C) You have a higher chance of becoming a hacker. D) You don't need to learn how to code. Show Answer Correct Answer: B) You already have years of experience using computers. 42. A secure website can be identified by the web address if it begins with: A) Www. B) Https. C) Wwws. D) Http. Show Answer Correct Answer: B) Https. 43. Which language is known as one of the most popular programming languages used today, especially for websites, apps, games, and other software? A) Java. B) PHP. C) Python. D) C++. Show Answer Correct Answer: C) Python. 44. This ensures that files are copied to another medium and can be used to return the files if necessary A) Data backup. B) Data corruption. C) Data image. D) Data sync. Show Answer Correct Answer: A) Data backup. 45. Which one of the following best describes the term pharming? A) Sending unsolicited e-mail to a large number of users. B) Deliberately misdirecting users to a fraudulent website. C) Collecting browser habit information via malware. D) Using instant messaging to gather personal information. Show Answer Correct Answer: B) Deliberately misdirecting users to a fraudulent website. 46. Why is it important for Tara to regularly update her antivirus software and operating system? A) To protect against new viruses and security threats. B) To save money on software updates. C) To make the computer more vulnerable to viruses. D) To make the computer run slower. Show Answer Correct Answer: A) To protect against new viruses and security threats. 47. Which of the following is considered a strong password? A) Letmein. B) Password. C) 123456. D) 9v!Pq#4w. Show Answer Correct Answer: D) 9v!Pq#4w. 48. A ..... is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks A) Trap doors. B) Virus. C) Zombie. D) Worm. Show Answer Correct Answer: C) Zombie. 49. 5) The VPN service provides you secure access to the Internet, with an encrypted connection between your computer and the VPN service provider's VPN server A) False. B) True. C) All the above. D) None of the above. Show Answer Correct Answer: B) True. 50. Which of these best describes social engineering? A) An employee hacks into a computer in their workplace to steal sensitive data. B) An employee installs a virus on a work computer. C) An employee receives a fake email, phone call or message that tricks them into giving sensitive data away. D) None of the above. Show Answer Correct Answer: C) An employee receives a fake email, phone call or message that tricks them into giving sensitive data away. 51. What does the Domain Name System (DNS) do? A) Assigns IP addresses to devices. B) Encrypts data for secure communication. C) Translates human-readable domain names into IP addresses. D) Manages email messages. Show Answer Correct Answer: C) Translates human-readable domain names into IP addresses. 52. Computer network is A) Collection of hardware components and computers. B) Interconnected by communication channel. C) Sharing of resources and information. D) All of the above. Show Answer Correct Answer: D) All of the above. 53. Which of the following is the best way to remove unneeded software? A) Use the OS's uninstall. B) Delete the folder connection the application. C) Install the latest vertion of the software. D) Remove the application icon. Show Answer Correct Answer: A) Use the OS's uninstall. 54. Hal yang perlu dilakukan untuk menjaga keamanan dalam penggunaan email, kecuali ..... A) Tidak sembarangan mengklik url/link yang terdapat pada email. B) Tidak membuka attachments dari pengirim yang tidak jelas. C) Mengubah password email secara berkala. D) Menggunakan email kedinasan untuk sosial media. Show Answer Correct Answer: D) Menggunakan email kedinasan untuk sosial media. 55. Mana yang paling aman ..... A) PASSw0rd123. B) P@S5w()12d. C) Password123. D) P455w0rdIZ3. Show Answer Correct Answer: B) P@S5w()12d. 56. An automatic apparatus or device that performs functions ordinarily ascribed to humans or operate with what appears to be almost human intelligence is called A) Reptile. B) Mammal. C) Monkey. D) Robot. Show Answer Correct Answer: D) Robot. 57. This is a malicious software that cyber criminals use to infect computers and devices. Once your system is infected, cyber criminals can often do whatever they want to it. A) Phils. B) Malware. C) Ransom Ware. D) Virus. Show Answer Correct Answer: B) Malware. 58. Which of the following is a "strong" password for someone named Justin Smith? A) JustinSmith. B) Justin123456. C) ASDFGHpoiuy. D) Softcatsears. Show Answer Correct Answer: D) Softcatsears. 59. Software that records every character typed and sends it to a criminal A) Hacking. B) Cracking. C) Firewall. D) Keylogger. E) Spam. Show Answer Correct Answer: D) Keylogger. 60. Software or hardware to control traffic in and out of a network A) Hacking. B) Cracking. C) Firewall. D) Keylogger. E) Spam. Show Answer Correct Answer: C) Firewall. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books