Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 19 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. An attack that tricks users into clicking something other than what they think they're clicking.
2. What is the purpose of encryption in cyber security?
3. What is the characteristic of a computer system capable to thinking, reasoning and learning?
4. When you suffer a Cyber-attack you .....
5. Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This is known as .....
6. Is it safe to use your real personal information for an online character?
7. The command that is used to find the IP address associated with domain name is .....
8. The process of converting plain text into cipher text is .....
9. What is the role of a social media consultant in cyber security?
10. Which one of the following best describes the function of a firewall?
11. Is it generally considered safe to use Starbucks Public Wi-Fi network for performing an online banking operation?
12. Cyber crime happening by E-Mail is called as .....
13. Which of the following MUST be controlled to avoid paper jams in printer?
14. What does the term 'malware' refer to?
15. What is the growing trend that poses a threat to organizations allowing employee mobile devices on their networks?
16. Is the following an example of a Health issue or a Safety issue.Clicking a mouse Safety repetitively causing RSI.
17. How does malware get onto your computer?
18. What is the difference between symmetric and asymmetric encryption?
19. Hacking others computer is good
20. What is the function of antivirus software?
21. Unsolicited electronic messages, especially advertising is know as?
22. When was the first Email Written?
23. Which of the following programs should be used to create the doc. file?
24. Identify the oldest phone hacking technique used by hackers to make free calls.
25. What is the first element of the CIA Triad discussed in the text?
26. Why it is useful to use an avatar?
27. Virus that replicates itself
28. Siapa nama pendiri WikiLeaks?
29. There is a straightforward and easy solution to securing computers.
30. What security vulnerability allows attackers to execute arbitrary system commands by injecting malicious inputs into a web application's command-line interface?
31. To achieve the maximum battery life a laptop computer, Which of the following is the BEST mode to use when the laptop is not in use?
32. Which of the these is not a type of active attack?
33. Vandalizing school computers or network can result in the cancellation of a student's privilege to use technology in school.
34. What is malware usually written for?
35. Which one of the following describes how to find out about an the organization's a privacy policy?
36. Which security technique requires an authorization by what the user knows and what the user has?
37. What does 'integrity of data' mean in CIA Triad?
38. Identify the term which denotes that only authorized users are capable of accessing the information
39. What should you do with the master password for your password manager?
40. If you think your computer has a virus, a good first step in solving the problem would be to:
41. Which one of the following best describes the quarantine in anti-virus software?
42. Imagine you find a USB device in the hallway at work. What's the best thing to do?
43. Untuk menjaga keamanan ketika video conference, kita perlu menerapkan beberapa hal, kecuali .....
44. If you receive a phishing email you should
45. Who are script kiddies in the context of cybercriminals?
46. Define the term 'wi-fi'.
47. What is ransomware and how does it affect users?
48. Siapa pihak yang mengawali Edward Snowden sewaktu dia berada di Rusia?
49. Fake e-mail message appearing to be from a trusted business, social network or other contact Asks for personal information or requests a user to click on a link or download a file to verify personal information Hackers can secretly collect personal information and passwords
50. Which one of the following increases the risk of contracting malware the most?
51. Which type of hacker represents the highest risk to your network?
52. Which port number is commonly used for HTTP traffic?
53. ..... relating to or characteristic of the culture of computers, information technology, and virtual reality.
54. 8 . Which of the following is the most important activity in system hacking?
55. A technician wants to configure multifactor authentication for a standalone PC that contains confidential information. The PC already requires a PIN.which of the following should the technician implement?
56. If the IP address of a device is 192.168.2.5, then what could be the IP address of the router?
57. What change would make this password the STRONGEST?bills
58. What is PiHole meant for?
59. ..... are the special type of programs used for recording and tracking user's keystroke.
60. Which one of the following applications has the functionality of storing multiple usernames and passwords in one location?