This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 18 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 18 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. An Anti-virus is a program or a piece of code that is loaded onto your computer without your knowledge. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 2. You have fixed a printer problem and verified full functionality. What is the next step to take in the best practice methodology? A) Establish a theory of probable cause. B) Conduct internal or external research. C) Document the solution and troubleshooting steps. D) Establish a theory of probable cause. Show Answer Correct Answer: C) Document the solution and troubleshooting steps. 3. Who scans computer files to look for known viruses from virus dictionary A) Fire wall. B) Encryption software. C) Antivirus. D) None of the above. Show Answer Correct Answer: C) Antivirus. 4. When you delete a post from a social network site or forum it is completely erased. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 5. Apa yang tidak termasuk High Level Step pada Cyber Security-Incident Response & Incident Response Retainer A) Software Analysis. B) Network Traffic Analysis. C) Malware Analysis. D) Forensic Analysis. Show Answer Correct Answer: A) Software Analysis. 6. What is a Trojan horse? A) It scans downloads and email attachmentsI. B) It replicates and makes copies of itself. C) Is destructive software disguised as something good. D) An animal. Show Answer Correct Answer: C) Is destructive software disguised as something good. 7. What is the primary goal of network security? A) To reduce hardware costs in networking. B) To protect data and resources from unauthorized access and attacks. C) To monitor user activity for compliance. D) To enhance network speed and performance. Show Answer Correct Answer: B) To protect data and resources from unauthorized access and attacks. 8. Which of the following is not a type of attack on encryption? A) Collision attack. B) Brute force attack. C) Dictionary attack. D) Compression attack. Show Answer Correct Answer: D) Compression attack. 9. The game company has a password protection policyState one rule for choosing a password that should be included in the policy A) Has a Disney character. B) Has a special character. C) Has a cartoon character. D) Has an avenger character. Show Answer Correct Answer: B) Has a special character. 10. An act to injure, corrupt, or threaten a system or network is characterised as which of the below? A) Cyber Attack. B) Threats. C) Digital crime. D) System hijacking. Show Answer Correct Answer: A) Cyber Attack. 11. What was the theme topic of Day 3? A) Wireless Networking and Security/Mobile Device Management. B) Vulnerabilities and Threats. C) Introduction to Information Security:Network Basics and Terminology. D) Introduction to Security Terminology / Types of Attacks. Show Answer Correct Answer: B) Vulnerabilities and Threats. 12. IT security in any firm or organization is maintained and handled by A) Security Auditor. B) Security Manager. C) Software Security Specialist. D) IT Security Engineer. Show Answer Correct Answer: D) IT Security Engineer. 13. Application of Diffie Hellman Algorithm A) Secure Shell (SSH). B) Transport Layer Security (TLS). C) Public Key Infrastructure (PKI). D) All the given options. Show Answer Correct Answer: D) All the given options. 14. What is a denial-of-service attack? A) A denial-of-service attack is a strategy to secure data from unauthorized access. B) A denial-of-service attack is an effort to improve user access to resources. C) A denial-of-service attack is a method to enhance network performance. D) A denial-of-service attack is an attempt to make a machine or network resource unavailable to its intended users. Show Answer Correct Answer: D) A denial-of-service attack is an attempt to make a machine or network resource unavailable to its intended users. 15. CompTIA Advanced Security Practitioner (CASP) A) A certification in critical thinking, incident response, risk management and tech integration for business. B) An AS degree in computer science issued through a college or university. C) A certification in managerial skills for cyber security. D) None of the above. Show Answer Correct Answer: A) A certification in critical thinking, incident response, risk management and tech integration for business. 16. Whicf of the following components can be cooled with liquid coolling? A) MODEM. B) CPU. C) RAM. D) POWER Supply. Show Answer Correct Answer: B) CPU. 17. What is Code red? A) Photo Editing Software. B) Antivirus. C) Virus. D) None of the above. Show Answer Correct Answer: C) Virus. 18. What is a key characteristic of UDP? A) Connectionless and faster than TCP. B) Reliable and error-free. C) Establishes a connection before sending data. D) Uses sequencing for data packets. Show Answer Correct Answer: A) Connectionless and faster than TCP. 19. What does a network do? A) A network facilitates communication and resource sharing between devices. B) A network prevents devices from communicating with each other. C) A network only connects printers to computers. D) A network is used solely for storing data. Show Answer Correct Answer: A) A network facilitates communication and resource sharing between devices. 20. Wat sould you do if you receive a suspicious email? A) Delete it immediately. B) Forward it to friends. C) Check te source before responding. D) Click on the links to verify. Show Answer Correct Answer: C) Check te source before responding. 21. It is very secure and has centralized backup. A) Peer-to-peer Network. B) Client-Server Network. C) All the above. D) None of the above. Show Answer Correct Answer: B) Client-Server Network. 22. An attacker is also known as a threat actor. It's important not to think of threat actors as some faceless, monolithic entity; on the contrary, they are as diverse as their targets.Choose the answer best describe the above statement. A) Human Error. B) Threat Intentions. C) Threat Actors. D) Motives. Show Answer Correct Answer: C) Threat Actors. 23. If your best friend asks for your password to Instagram or Facebook, what should you do? A) Give it to them, they are your best friend!. B) Text it to them in a group chat. C) Write it down and pass it to them in class. D) Keep it private and explain to them you don't give out passwords to anyone for safety reasons. Show Answer Correct Answer: D) Keep it private and explain to them you don't give out passwords to anyone for safety reasons. 24. Berikut yang merupakan kekhawatiran dari Lethal Autonomous Weapons (LAWs) adalah ..... A) Efektivitas yang dipertanyakan dalam menyelesaikan misi. B) Masalah etika berupa pemilihan target (sipil vs militer). C) Tidak ada kekhawatian dalam penggunaan LAWs. D) LAW tidak dapat digunakan secara cepat atau spontan. Show Answer Correct Answer: B) Masalah etika berupa pemilihan target (sipil vs militer). 25. What is the purpose of a Denial of Service attack? A) Exploit a weakness in the TCP/IP stack. B) To shutdown services by turning them off. C) To overload a system so it is no longer operational. D) To execute a Trojan on a system. Show Answer Correct Answer: C) To overload a system so it is no longer operational. 26. The act of gaining unauthorized access to a computer A) Smishing. B) Vishing. C) Cooking. D) Hacking. Show Answer Correct Answer: D) Hacking. 27. ..... is a code injecting method used for attacking the database of a system / website. A) XML Injection. B) Malicious code injection. C) HTML injection. D) SQL Injection. Show Answer Correct Answer: D) SQL Injection. 28. What is the most common age for people who start committing into cyber crime A) 30+. B) 15-20. C) 26-30. D) 21-25. Show Answer Correct Answer: B) 15-20. 29. What is the transfer of data from one place to another called? A) Data Abstraction. B) Data Manipulation. C) Data Transportation. D) Data Communication. Show Answer Correct Answer: D) Data Communication. 30. What are the two basic types of attacks? A) Active. B) Passive. C) DoS. D) Both 1 & 2. Show Answer Correct Answer: D) Both 1 & 2. 31. How can Aanya, Alisha, and Shreya identify and avoid online scams and phishing attempts? A) Share personal information with anyone who asks for it online. B) Always click on any link provided in the email. C) Ignore the sender's identity and trust all unsolicited messages. D) Be cautious of unsolicited emails and messages, verify the sender's identity, avoid clicking on suspicious links, and never share personal information. Show Answer Correct Answer: D) Be cautious of unsolicited emails and messages, verify the sender's identity, avoid clicking on suspicious links, and never share personal information. 32. Health and Safety regulations require an employer to: A) Plan work at a computer so there are frequent breaks to be taken. B) Provide wrist rests for keyboard use. C) Pay for glasses for employees who need them, if they spend a lot of time using a computer. D) All of the above. Show Answer Correct Answer: A) Plan work at a computer so there are frequent breaks to be taken. 33. The following is NOT a method of authentication A) MICR. B) Password. C) Digital certificate. D) Fingerprint. Show Answer Correct Answer: A) MICR. 34. Which technical service is mentioned as a prime target for cybercriminals in the text? A) Domain naming. B) Routing. C) Database management. D) Addressing. Show Answer Correct Answer: A) Domain naming. 35. Salespeople within a company regularly take company-owned laptops with them on the road. The company wants to implement a solution to protect laptop drives against data theft. A) MDM. B) SEDs. C) HSM. D) DLP. Show Answer Correct Answer: B) SEDs. 36. Which one is the best option for security? A) End-Point Security. B) Antivirus. C) Antimalware. D) DNS. Show Answer Correct Answer: A) End-Point Security. 37. Indicate whether the statement is true or false. 2. Passwords are still considered a strong defense against attackers. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 38. How much time should you spend on playing games or social media? A) 2hours or less. B) 1 hour or less. C) More than 2 hours. D) 30 minutes or less. Show Answer Correct Answer: D) 30 minutes or less. 39. What happens when you set a Facebook account to private? A) Only people you allow can see your comments. B) Anyone can see your posts. C) Only people you allow can see your posts. D) It is impossible to screenshot your posts. Show Answer Correct Answer: C) Only people you allow can see your posts. 40. Standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. A) Computer Virus. B) Malicious Code. C) Anti Virus Software. D) Computer Worm. Show Answer Correct Answer: D) Computer Worm. 41. Identify the malware which does not replicate or clone through an infection? A) Rootkits. B) Worms. C) Virus. D) Trojans. Show Answer Correct Answer: D) Trojans. 42. 3) To prevent intruders from entering your home wireless network, the pre-set SSID and default password for the browser-based administrative interface should be changed. A) False. B) True. C) All the above. D) None of the above. Show Answer Correct Answer: B) True. 43. Which of these types of hacker hack legally and ethically? A) Grey hat. B) Black hat. C) Blue hat. D) White hat. Show Answer Correct Answer: D) White hat. 44. Apa kepanjangan dari APJII? A) Asosiasi Penyedia Jasa Internet Indonesia. B) Asosiasi Penyedia Jual Internet Indonesia. C) Agensi Penyedia Jasa Internet Indonesia. D) Agensi Penyedia Jasa Informasi Indonesia. Show Answer Correct Answer: A) Asosiasi Penyedia Jasa Internet Indonesia. 45. Select the most secure password from below A) Sm@rtie2109P@nts. B) 321ZingZillas. C) Abhsgt77gtr6654. D) B0BsBurGers21. Show Answer Correct Answer: A) Sm@rtie2109P@nts. 46. Which of the following campaign has been started by Ministry of Electronics & Information Technology for creating awareness among citizens as part of G20 presidency of India? A) Be(A)ware. B) Digital India-Safe India. C) Stay Safe Online. D) See Yourself in Cyber. Show Answer Correct Answer: C) Stay Safe Online. 47. Which is not a type of anti-malware? A) Defragmenter. B) Anti-Virus. C) Anti-Spyware. D) Malware Scanner. Show Answer Correct Answer: A) Defragmenter. 48. What does the acronym "DDoS" signify in the realm of cybersecurity? A) Distributed Denial of Service. B) Distributed Detection of System Outages. C) Data Deletion over Secure Sockets. D) Digital Defense of Server Operations. Show Answer Correct Answer: A) Distributed Denial of Service. 49. What would you do if you faced a problem that is beyond your expertise? A) A. Transfer it to someone who knows more about it. B) B. Ignore the difficulty and accept it knowing there will be a consequences. C) C. Avoid the problem and pretend something didn't happen. D) None of the above. Show Answer Correct Answer: A) A. Transfer it to someone who knows more about it. 50. Which one of the following passwords is an example of good practice? A) BRown. B) JaCkbRown 23-11-1990!. C) JB. D) Jack. Show Answer Correct Answer: B) JaCkbRown 23-11-1990!. 51. If your computer is hacked what will you do? A) Inform the Army Fource. B) Inform to the Police. C) Inform your Parents. D) Inform the Network Provider. Show Answer Correct Answer: C) Inform your Parents. 52. What is a denial-of-service attack designed to do? A) Steal personal information. B) Prevent valid users from using resources. C) Alter information illegally. D) Remove evidence of an event. Show Answer Correct Answer: B) Prevent valid users from using resources. 53. Bitcoin is based on ..... blockchain. A) Approval. B) Public. C) Private. D) Protected. Show Answer Correct Answer: B) Public. 54. Some websites have "http://" extension while some have "https://" What does the 's' mean? A) That the data entered on the website is secure and encrypted. B) It's a special website. C) That it's the latest version of the site. D) Its being loaded in a simple format. Show Answer Correct Answer: A) That the data entered on the website is secure and encrypted. 55. ..... is a person who breaks into computer or network to steal information or sabotage system. A) CYBER EXTORTIONIST. B) CRACKER. C) HACKER. D) SCRIPT KIDDIES. Show Answer Correct Answer: C) HACKER. 56. Which of the following connection types offers high-speed data transfer and has a reversible plug? A) ASB-C. B) HDMI. C) Parallel. D) ESATA. Show Answer Correct Answer: D) ESATA. 57. Which of the following is not a part of CIA Triad? A) Auditing. B) Integrity. C) Availability. D) Confidentiality. Show Answer Correct Answer: A) Auditing. 58. What is the main difference between hackers and crackers? A) Hackers break into systems legally, while crackers do so illegally. B) Hackers create viruses, while crackers use them. C) Crackers expose holes in systems, while hackers do not. D) Crackers are always hired by companies, unlike hackers. Show Answer Correct Answer: A) Hackers break into systems legally, while crackers do so illegally. 59. To enable faster cross border transactions, India's UPI has been integrated with pay now system of ..... Country A) Indonesia. B) Singapore. C) UAE. D) Mauritius. Show Answer Correct Answer: B) Singapore. 60. Do you need a bachelor's degree in computer science to work in cyber security? A) Yes, a master's degree is required. B) Yes, a bachelor's degree is required. C) No, it is not necessary but can be helpful. D) No, formal education is not required. Show Answer Correct Answer: C) No, it is not necessary but can be helpful. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books