This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 17 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 17 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. Which of the following is not a type of cloud server A) Merged cloud server. B) Public Cloud Servers. C) Private cloud servers. D) Unkonwn cloud server. Show Answer Correct Answer: A) Merged cloud server. 2. How many pillars are there in digital marketing A) 123. B) 5. C) 202. D) 2. Show Answer Correct Answer: D) 2. 3. Which act governs the IT security in India? A) IT Act 2000 and its amendment. B) IT Act 2002 and its amendment. C) IT Act 2016 and its amendment. D) IT Act 2021 and its amendment. Show Answer Correct Answer: A) IT Act 2000 and its amendment. 4. FTP and HTTP protocols operate at which layer of the OSI model? A) Session Layer. B) Network Layer. C) Transport Layer. D) Application Layer. Show Answer Correct Answer: D) Application Layer. 5. ..... gets propagated through networks and technologyies like SMS, bluetooth, wireless medium, USBs and infrared to affect mobile phones A) Worms. B) Antivirus. C) Malware. D) None of these above. Show Answer Correct Answer: C) Malware. 6. CompTia Security+ A) Entry level certification for computer security, available through MVUSD cyber pathway program in High School. B) A certification to become a night security guard. C) An advanced certification in assessing cyber security threats. D) None of the above. Show Answer Correct Answer: A) Entry level certification for computer security, available through MVUSD cyber pathway program in High School. 7. Apa yang harus dilakukan jika Anda mencurigai akun media sosial Anda diretas? A) Mengabaikannya dan tidak melakukan apa-apa. B) Melaporkan kejadian tersebut kepada penyedia layanan. C) Mengganti kata sandi dengan yang lebih sederhana. D) Berbagi informasi dengan teman-teman untuk meminta bantuan. Show Answer Correct Answer: B) Melaporkan kejadian tersebut kepada penyedia layanan. 8. Which one of the following is a typical threat to data from using cloud computing? A) Restricted access. B) Shredding. C) Identity theft. D) Loss of privacy. Show Answer Correct Answer: D) Loss of privacy. 9. Which of the following stage of cryptography are the non readable encrypted data? A) Hash. B) Ciphertext. C) Key. D) Plaintext. Show Answer Correct Answer: B) Ciphertext. 10. What type of attack is when a small number of common passwords are used to attempt to log in to multiple user accounts? A) Password cracking. B) Typo squatting. C) Password spraying. D) Social networking. Show Answer Correct Answer: A) Password cracking. 11. What does A.U.P. stand for? A) Acceptable Use Policy. B) Acceptable User Password. C) Any Unit Password. D) Awesome User Profile. Show Answer Correct Answer: A) Acceptable Use Policy. 12. Working at your desk, you've received an email from Paypal or Apple explaining that your password it out of date, and you must set a new one. The link within the email will guide you through it. Your next step is? A) Follow the link and reset your password. B) Ignore the email and delete it. C) Reset your password manually. D) None of the above. Show Answer Correct Answer: C) Reset your password manually. 13. What is the purpose of mixing up characters in cyber security? A) To confuse search engine bots. B) To communicate secretly. C) To evade spam filters. D) To trick anti-virus programs. Show Answer Correct Answer: C) To evade spam filters. 14. In your game chat you see ..... Hey guys ..... you've gotta see this super cute bunny video! Click the link to view.https://be.chewy.com/product-roundup/the-best-rabbit-toys-to-keep-your-bunny-entertained/ A) Report this message. It might be phishing. B) Click the link who doesn't like cute bunnies?. C) Ignore it, it's nothing. D) Type the entire website address into your browser and watch it that way. Show Answer Correct Answer: A) Report this message. It might be phishing. 15. What is the main challenge for computers in understanding natural language? A) Encryption. B) Reversed characters. C) Jumbled up letters. D) Pattern-matching. Show Answer Correct Answer: C) Jumbled up letters. 16. The MQTT protocol is used for A) Publish / Subscribe. B) Request / Responses. C) Machine to Machine. D) Mesh Networking. Show Answer Correct Answer: A) Publish / Subscribe. 17. What does Chris do for new starters in the logistics department? A) Develop new software applications. B) Analyze sales data. C) Set up their workstations. D) Create marketing campaigns. Show Answer Correct Answer: C) Set up their workstations. 18. Which of the following is not a type of server? A) PowerPoint Server. B) File Server. C) Email Server. D) Webpage Server. Show Answer Correct Answer: A) PowerPoint Server. 19. Businesses, Banks, Shops, Schools and Exam Boards all keep data on you and are required to keep it safe? A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 20. What is the best statement for taking advantage of a weakness in the security of an IT system? A) Vulnerability. B) Attack. C) Threat. D) Exploit. Show Answer Correct Answer: D) Exploit. 21. What is the primary advantage of optical fibers over copper wires? A) Incredible speed and high capacity. B) Lower cost and easier installation. C) More flexibility and less weight. D) Better compatibility with older systems. Show Answer Correct Answer: A) Incredible speed and high capacity. 22. What type of key can be freely shared with anyone so that they can encrypt a message? A) Free key. B) Private key. C) Public key. D) Personal key. Show Answer Correct Answer: C) Public key. 23. Which type of computer program is designed to autonomously replicate itself and propagate to other systems, typically exploiting vulnerabilities in network security to gain access? A) Anti Virus Software. B) Malicious Code. C) Computer Worm. D) Computer Virus. Show Answer Correct Answer: C) Computer Worm. 24. Tidak menyebarkan informasi dari sosial media yang belum benar penjelasannya A) Benar. B) Salah. C) All the above. D) None of the above. Show Answer Correct Answer: A) Benar. 25. Employers who ignore Health and Safety rules regarding computer use may: A) At worst, face a prison sentence. B) Have their company closed down. C) At worst, have to pay a fine. D) Have their computer equipment confiscated. Show Answer Correct Answer: A) At worst, face a prison sentence. 26. What did Chris notice while setting up a workstation for a new starter? A) Faulty keyboards. B) Printer out of ink. C) Slow internet connection. D) Damaged network cables. Show Answer Correct Answer: D) Damaged network cables. 27. Detecting Vulnerabilities in a computer system/network also includes employee behaviours and procedures? A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 28. I'm online and I get a message from my Internet service provider asking for my password. They say they need it to fix my account. I should give it to them. A) Yes. B) No. C) All the above. D) None of the above. Show Answer Correct Answer: B) No. 29. How many characters should be in a password? A) 7+. B) 5+. C) 8+. D) 6+. Show Answer Correct Answer: C) 8+. 30. A cypher (or cypher script) is A) Encrypted text. B) Decrypted text. C) Encryption key. D) Un-encrypted text. Show Answer Correct Answer: A) Encrypted text. 31. Do Scipt kiddies make their own tools and scripts? A) YES. B) NO. C) All the above. D) None of the above. Show Answer Correct Answer: B) NO. 32. What is the main technique used by anti-virus programs to spot viruses? A) Pattern-matching. B) Backwards text. C) Google bombing. D) Encryption. Show Answer Correct Answer: A) Pattern-matching. 33. Which password is stronger? A) Admin. B) !dL23Y%&. C) ABC123. D) Password. Show Answer Correct Answer: B) !dL23Y%&. 34. Which one of the following is NOT a security threat? A) Hacking. B) Pharming. C) Worms. D) Anti-Virus. Show Answer Correct Answer: D) Anti-Virus. 35. Before switching from a corded optical mouse to a Bluetooth mouse, which of the following activities MUST be performed on the host? A) Device pairing. B) Wireless adapter installing. C) Optical device emulation. D) Device doning. Show Answer Correct Answer: A) Device pairing. 36. Which one of the following is an example of how a digital signature might be used? A) To improve e-mail security. B) To compress large files. C) To improve web search results. D) To replace passwords. Show Answer Correct Answer: A) To improve e-mail security. 37. Indicate whether the statement is true or false. 3. Security questions should be answered with a fictious answer instead of the accurate answer. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 38. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the ..... A) Antivirus. B) Firewall. C) Cookies. D) Malware. Show Answer Correct Answer: B) Firewall. 39. 99% of all firewall breaches will be caused by ..... , not vulnerabilities. A) Misconfigurations. B) Threats. C) Scans. D) Hunting. Show Answer Correct Answer: A) Misconfigurations. 40. All are signs of phishing email except: A) Link brings you to a strange site. B) Create a sense of urgency. C) Email is from a personal account. D) Link brings you to an official website. Show Answer Correct Answer: D) Link brings you to an official website. 41. Which of the followings are the types of scanning? A) Passive, active, and interactive. B) Port, network, and services. C) Server, client, and network. D) Network, vulnerability, and port. Show Answer Correct Answer: D) Network, vulnerability, and port. 42. How can strong passwords contribute to network security? A) Strong passwords contribute to network security by preventing unauthorized access and reducing the risk of attacks. B) Weak passwords are sufficient for network security. C) Strong passwords can be easily guessed by attackers. D) Strong passwords have no impact on network security. Show Answer Correct Answer: A) Strong passwords contribute to network security by preventing unauthorized access and reducing the risk of attacks. 43. If someone you meet online asks you for your address you should tell them no. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 44. Perangkat lunak yang dirancang untuk mencegah, mendeteksi, dan menghapus program jahat disebut A) Ransomware. B) Adware. C) Antivirus. D) Spyware. Show Answer Correct Answer: C) Antivirus. 45. What are the main functions of the Application Layer in the TCP/IP model? A) Interacts with applications like web browsers and email clients. B) Handles reliable data delivery between applications. C) Routes packets based on IP addresses. D) Deals with physical transmission of data. Show Answer Correct Answer: A) Interacts with applications like web browsers and email clients. 46. Imagine the status/service of a bank if its customers are unable to make transactions using their accounts. This scenario refers to what goals of network security ..... A) Confidentiality. B) Integrity. C) Authenticity. D) Availability. Show Answer Correct Answer: D) Availability. 47. Symmetric encryption is an ..... A) Ineffective and slow method. B) Effective and slow method. C) Effective and fast method. D) None of the above. Show Answer Correct Answer: C) Effective and fast method. 48. Which of the following involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain? A) Identity theft. B) Cyberterrorism. C) White hat hacking. D) Digital fraud. Show Answer Correct Answer: A) Identity theft. 49. Which of the following options indicates that a website is secure? A) Http:. B) Https://. C) Http://. D) Https:. Show Answer Correct Answer: B) Https://. 50. Indicate whether the statement is true or false. 7. FACTA grants consumers the right to request one free credit report from each of the three national credit-reporting firms every 12 months. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 51. Cyber security is a technique used to protect computers and the data connected through thenetwork/Internet from an unauthorised user. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 52. Passwords are used to improve the ..... of a network A) Performance. B) Reliability. C) Security. D) None. Show Answer Correct Answer: C) Security. 53. Berikut ini pemicu utama meningkatnya resiko keamanan, kecuali ..... A) Kecerobohan atau kelalaian user. B) Meningkatnya penggunaan media sosial. C) Kehati-hatian user yang semakin meningkat. D) Kurangnya pemahaman keamanan informasi. Show Answer Correct Answer: C) Kehati-hatian user yang semakin meningkat. 54. Your organization recently updated its security policy to prohibit the use of external storage devices. The goal is to reduce threats from insiders.Which of the following methods would have the BEST chance of reducing the risk of data exfiltration using external storage devices? A) Train employees about the policy. B) Monitor firewall logs to detect data exfiltration. C) Block write capabilities to removable media. D) Implement a network-based DLP solution. Show Answer Correct Answer: C) Block write capabilities to removable media. 55. Which of the following are activities that a hacker might attempt? A) Stealing usernames and passwords. B) Modifying website content. C) Disrupting network communications. D) All of the above. Show Answer Correct Answer: D) All of the above. 56. Which of the following is not used as a backup method? A) Cloud storage. B) Network drive. C) Random access memory. D) Flash drive. Show Answer Correct Answer: C) Random access memory. 57. Security measures prevent ..... A) Theft. B) Damage. C) All of the answers are correct. D) Your personal information being stolen or used against you. Show Answer Correct Answer: C) All of the answers are correct. 58. Windows firewall is ..... firewall. A) State full. B) Decrypted. C) Stateless. D) Security. Show Answer Correct Answer: A) State full. 59. ..... is a security system that protects your computer bu preventing unauthorised users from gaining access to it through network A) Fire wall. B) Encryption software. C) Antivirus. D) Virus. Show Answer Correct Answer: A) Fire wall. 60. Indicate whether the statement is true or false.3. Spying on computer input over an extended period of time is usually accomplished by the work of state actors. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books