Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 18 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. An Anti-virus is a program or a piece of code that is loaded onto your computer without your knowledge.
2. You have fixed a printer problem and verified full functionality. What is the next step to take in the best practice methodology?
3. Who scans computer files to look for known viruses from virus dictionary
4. When you delete a post from a social network site or forum it is completely erased.
5. Apa yang tidak termasuk High Level Step pada Cyber Security-Incident Response & Incident Response Retainer
6. What is a Trojan horse?
7. What is the primary goal of network security?
8. Which of the following is not a type of attack on encryption?
9. The game company has a password protection policyState one rule for choosing a password that should be included in the policy
10. An act to injure, corrupt, or threaten a system or network is characterised as which of the below?
11. What was the theme topic of Day 3?
12. IT security in any firm or organization is maintained and handled by
13. Application of Diffie Hellman Algorithm
14. What is a denial-of-service attack?
15. CompTIA Advanced Security Practitioner (CASP)
16. Whicf of the following components can be cooled with liquid coolling?
17. What is Code red?
18. What is a key characteristic of UDP?
19. What does a network do?
20. Wat sould you do if you receive a suspicious email?
21. It is very secure and has centralized backup.
22. An attacker is also known as a threat actor. It's important not to think of threat actors as some faceless, monolithic entity; on the contrary, they are as diverse as their targets.Choose the answer best describe the above statement.
23. If your best friend asks for your password to Instagram or Facebook, what should you do?
24. Berikut yang merupakan kekhawatiran dari Lethal Autonomous Weapons (LAWs) adalah .....
25. What is the purpose of a Denial of Service attack?
26. The act of gaining unauthorized access to a computer
27. ..... is a code injecting method used for attacking the database of a system / website.
28. What is the most common age for people who start committing into cyber crime
29. What is the transfer of data from one place to another called?
30. What are the two basic types of attacks?
31. How can Aanya, Alisha, and Shreya identify and avoid online scams and phishing attempts?
32. Health and Safety regulations require an employer to:
33. The following is NOT a method of authentication
34. Which technical service is mentioned as a prime target for cybercriminals in the text?
35. Salespeople within a company regularly take company-owned laptops with them on the road. The company wants to implement a solution to protect laptop drives against data theft.
36. Which one is the best option for security?
37. Indicate whether the statement is true or false. 2. Passwords are still considered a strong defense against attackers.
38. How much time should you spend on playing games or social media?
39. What happens when you set a Facebook account to private?
40. Standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
41. Identify the malware which does not replicate or clone through an infection?
42. 3) To prevent intruders from entering your home wireless network, the pre-set SSID and default password for the browser-based administrative interface should be changed.
43. Which of these types of hacker hack legally and ethically?
44. Apa kepanjangan dari APJII?
45. Select the most secure password from below
46. Which of the following campaign has been started by Ministry of Electronics & Information Technology for creating awareness among citizens as part of G20 presidency of India?
47. Which is not a type of anti-malware?
48. What does the acronym "DDoS" signify in the realm of cybersecurity?
49. What would you do if you faced a problem that is beyond your expertise?
50. Which one of the following passwords is an example of good practice?
51. If your computer is hacked what will you do?
52. What is a denial-of-service attack designed to do?
53. Bitcoin is based on ..... blockchain.
54. Some websites have "http://" extension while some have "https://" What does the 's' mean?
55. ..... is a person who breaks into computer or network to steal information or sabotage system.
56. Which of the following connection types offers high-speed data transfer and has a reversible plug?
57. Which of the following is not a part of CIA Triad?
58. What is the main difference between hackers and crackers?
59. To enable faster cross border transactions, India's UPI has been integrated with pay now system of ..... Country
60. Do you need a bachelor's degree in computer science to work in cyber security?