Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 17 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. Which of the following is not a type of cloud server
2. How many pillars are there in digital marketing
3. Which act governs the IT security in India?
4. FTP and HTTP protocols operate at which layer of the OSI model?
5. ..... gets propagated through networks and technologyies like SMS, bluetooth, wireless medium, USBs and infrared to affect mobile phones
6. CompTia Security+
7. Apa yang harus dilakukan jika Anda mencurigai akun media sosial Anda diretas?
8. Which one of the following is a typical threat to data from using cloud computing?
9. Which of the following stage of cryptography are the non readable encrypted data?
10. What type of attack is when a small number of common passwords are used to attempt to log in to multiple user accounts?
11. What does A.U.P. stand for?
12. Working at your desk, you've received an email from Paypal or Apple explaining that your password it out of date, and you must set a new one. The link within the email will guide you through it. Your next step is?
13. What is the purpose of mixing up characters in cyber security?
14. In your game chat you see ..... Hey guys ..... you've gotta see this super cute bunny video! Click the link to view.https://be.chewy.com/product-roundup/the-best-rabbit-toys-to-keep-your-bunny-entertained/
15. What is the main challenge for computers in understanding natural language?
16. The MQTT protocol is used for
17. What does Chris do for new starters in the logistics department?
18. Which of the following is not a type of server?
19. Businesses, Banks, Shops, Schools and Exam Boards all keep data on you and are required to keep it safe?
20. What is the best statement for taking advantage of a weakness in the security of an IT system?
21. What is the primary advantage of optical fibers over copper wires?
22. What type of key can be freely shared with anyone so that they can encrypt a message?
23. Which type of computer program is designed to autonomously replicate itself and propagate to other systems, typically exploiting vulnerabilities in network security to gain access?
24. Tidak menyebarkan informasi dari sosial media yang belum benar penjelasannya
25. Employers who ignore Health and Safety rules regarding computer use may:
26. What did Chris notice while setting up a workstation for a new starter?
27. Detecting Vulnerabilities in a computer system/network also includes employee behaviours and procedures?
28. I'm online and I get a message from my Internet service provider asking for my password. They say they need it to fix my account. I should give it to them.
29. How many characters should be in a password?
30. A cypher (or cypher script) is
31. Do Scipt kiddies make their own tools and scripts?
32. What is the main technique used by anti-virus programs to spot viruses?
33. Which password is stronger?
34. Which one of the following is NOT a security threat?
35. Before switching from a corded optical mouse to a Bluetooth mouse, which of the following activities MUST be performed on the host?
36. Which one of the following is an example of how a digital signature might be used?
37. Indicate whether the statement is true or false. 3. Security questions should be answered with a fictious answer instead of the accurate answer.
38. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the .....
39. 99% of all firewall breaches will be caused by ..... , not vulnerabilities.
40. All are signs of phishing email except:
41. Which of the followings are the types of scanning?
42. How can strong passwords contribute to network security?
43. If someone you meet online asks you for your address you should tell them no.
44. Perangkat lunak yang dirancang untuk mencegah, mendeteksi, dan menghapus program jahat disebut
45. What are the main functions of the Application Layer in the TCP/IP model?
46. Imagine the status/service of a bank if its customers are unable to make transactions using their accounts. This scenario refers to what goals of network security .....
47. Symmetric encryption is an .....
48. Which of the following involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?
49. Which of the following options indicates that a website is secure?
50. Indicate whether the statement is true or false. 7. FACTA grants consumers the right to request one free credit report from each of the three national credit-reporting firms every 12 months.
51. Cyber security is a technique used to protect computers and the data connected through thenetwork/Internet from an unauthorised user.
52. Passwords are used to improve the ..... of a network
53. Berikut ini pemicu utama meningkatnya resiko keamanan, kecuali .....
54. Your organization recently updated its security policy to prohibit the use of external storage devices. The goal is to reduce threats from insiders.Which of the following methods would have the BEST chance of reducing the risk of data exfiltration using external storage devices?
55. Which of the following are activities that a hacker might attempt?
56. Which of the following is not used as a backup method?
57. Security measures prevent .....
58. Windows firewall is ..... firewall.
59. ..... is a security system that protects your computer bu preventing unauthorised users from gaining access to it through network
60. Indicate whether the statement is true or false.3. Spying on computer input over an extended period of time is usually accomplished by the work of state actors.