Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 16 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. What devices can we use to go online?
2. What type of key is not shared and computers cannot decrypt a message without it?
3. Identify the firewall services
4. Ms.Sheetal, an employee of the Bank has included a slogan & symbol for water conservation, as part of an initiative of dominant political party, in her email signature. Is it allowed as per the current IS Policy of the Bank?
5. Phishing is a type of social engineering attack.
6. After installing a new workstation and setting up a user account, Which of the following should be completed to harden the system property?
7. A web page on a website is created using HTML. True or False?
8. A computer virus may be used to-
9. In computer security, ..... means that computer system assets can be modified only by authorized parities.
10. Which of the following media BEST deters data theft over a network connection?
11. Contoh Aplikasi dari VOIP .....
12. A program hiding inside a useful program with malicious purposes.
13. A name used to gain access to a computer system.
14. When the computer systems of an organization are deliberately attacked to find any weaknesses
15. Which phase of hacking performs actual attack on a network or system?
16. Which of the following are the Cyber crimes? 1). Cyber crimes against persons. 2) . Cyber crimes against property. 3). Cyber crimes against government. 4). Cyber crimes against animal?
17. ..... is an overlay network that is not indexed by search engines.
18. What should you do if you receive an email from an unknown sender with an attachment?
19. Which of the below benefits of cyber security is not true?
20. What is the main reason for using reversed character order in cyber security?
21. What is a rootkit?
22. To keep your browser private, you can use the ..... mode.
23. What should never be used in your password?
24. What is the use of VPN
25. A system that is setup for attracting and monitoring intruders is called
26. Apa yang dimaksud dengan kewargaan digital?
27. If you receive a phone call from a stranger asking for information about your invoice payment process, you should
28. Which of the following malicious program do not replicate automatically?
29. A Router operates in which layer of the OSI Reference Model?
30. Attempting to secretively discover private information about a person, company, or other entity.
31. Phishing happens
32. Which of the following is a method to ensure confidentiality?
33. A company stores customer credit card information on their servers. Hackers have gained unauthorized access to these servers and stolen the credit card information.Which legislation has been violated in this cyber security attack?
34. What software can we use to protect our device from hackers?
35. Getting back deleted data is what kind of technique?
36. Which one of the following actions is most likely to spread malware?
37. Apa salah satu contoh keamanan yang perlu diterapkan oleh warga digital?
38. A customer wants to use an internet connection to make and receive phone calls. This technology is known as:
39. Which protocol is primarily used for transferring web pages over the Internet?
40. Which of the following support team/s of DIT, CO are responsible for granting access for CyM/CBS in a PC?
41. What is one advantage of having grown up with technology?
42. A secure website can be identified by the web address if it begins with:
43. Which language is known as one of the most popular programming languages used today, especially for websites, apps, games, and other software?
44. This ensures that files are copied to another medium and can be used to return the files if necessary
45. Which one of the following best describes the term pharming?
46. Why is it important for Tara to regularly update her antivirus software and operating system?
47. Which of the following is considered a strong password?
48. A ..... is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks
49. 5) The VPN service provides you secure access to the Internet, with an encrypted connection between your computer and the VPN service provider's VPN server
50. Which of these best describes social engineering?
51. What does the Domain Name System (DNS) do?
52. Computer network is
53. Which of the following is the best way to remove unneeded software?
54. Hal yang perlu dilakukan untuk menjaga keamanan dalam penggunaan email, kecuali .....
55. Mana yang paling aman .....
56. An automatic apparatus or device that performs functions ordinarily ascribed to humans or operate with what appears to be almost human intelligence is called
57. This is a malicious software that cyber criminals use to infect computers and devices. Once your system is infected, cyber criminals can often do whatever they want to it.
58. Which of the following is a "strong" password for someone named Justin Smith?
59. Software that records every character typed and sends it to a criminal
60. Software or hardware to control traffic in and out of a network