This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 19 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 19 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. An attack that tricks users into clicking something other than what they think they're clicking. A) Social engineering. B) Rootkit. C) . D) Deepfake. E) Clickjacking. Show Answer Correct Answer: E) Clickjacking. 2. What is the purpose of encryption in cyber security? A) To create backups of all data automatically. B) To enhance the speed of data transmission. C) The purpose of encryption in cyber security is to protect sensitive information from unauthorized access. D) To ensure all software is up to date. Show Answer Correct Answer: C) The purpose of encryption in cyber security is to protect sensitive information from unauthorized access. 3. What is the characteristic of a computer system capable to thinking, reasoning and learning? A) Machine Intelligence. B) Artificial Intelligence. C) Human Intelligence. D) Virtual Intelligence. Show Answer Correct Answer: B) Artificial Intelligence. 4. When you suffer a Cyber-attack you ..... A) Allow users to follow you on sites like Facebook or Instagram. B) Have stored your files in a safe area. C) Have had your computer disrupted or disabled and it is not working properly. D) Have a device that exchanges data. Show Answer Correct Answer: C) Have had your computer disrupted or disabled and it is not working properly. 5. Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This is known as ..... A) Botnet. B) Ransomware. C) Spam. D) None of the above. Show Answer Correct Answer: B) Ransomware. 6. Is it safe to use your real personal information for an online character? A) Yes. It doesn't matter. B) Yes, but only once in a while. C) Yes, but only your real name, address, & age. D) It's better not to reveal person information, even when creating an online character. Show Answer Correct Answer: D) It's better not to reveal person information, even when creating an online character. 7. The command that is used to find the IP address associated with domain name is ..... A) Netstat. B) Ipconfig. C) Host. D) Traceroute. Show Answer Correct Answer: C) Host. 8. The process of converting plain text into cipher text is ..... A) Decryption. B) Encoding. C) Hashing. D) Encryption. Show Answer Correct Answer: D) Encryption. 9. What is the role of a social media consultant in cyber security? A) Designing posters and creating eye-catching images to teach people about security. B) Monitoring computer networks for potential attacks. C) Testing targeted systems to find vulnerabilities. D) Explaining the possible dangers of social media to people. Show Answer Correct Answer: D) Explaining the possible dangers of social media to people. 10. Which one of the following best describes the function of a firewall? A) A firewall encrypts files, folders and e-mail messages. B) A firewall prevents the computer hardware from overheating. C) A firewall cleans a computer system infected by computer virus. D) A firewall blocks unauthorized access from outside a network. Show Answer Correct Answer: D) A firewall blocks unauthorized access from outside a network. 11. Is it generally considered safe to use Starbucks Public Wi-Fi network for performing an online banking operation? A) Yes. B) No. C) All the above. D) None of the above. Show Answer Correct Answer: B) No. 12. Cyber crime happening by E-Mail is called as ..... A) Phishing. B) Vishing. C) Email attack. D) Smishing. Show Answer Correct Answer: A) Phishing. 13. Which of the following MUST be controlled to avoid paper jams in printer? A) Static electricity. B) Airflow. C) EMI. D) Humidity. Show Answer Correct Answer: D) Humidity. 14. What does the term 'malware' refer to? A) A type of computer hardware. B) A software that is used to create digital art. C) A beneficial software that protects your computer from viruses. D) A malicious software designed to harm or exploit any programmable device, service, or network. Show Answer Correct Answer: D) A malicious software designed to harm or exploit any programmable device, service, or network. 15. What is the growing trend that poses a threat to organizations allowing employee mobile devices on their networks? A) Traditional PCs. B) Corporate LAN. C) Bring Your Own Device (BYOD). D) Continuous monitoring of computers. Show Answer Correct Answer: C) Bring Your Own Device (BYOD). 16. Is the following an example of a Health issue or a Safety issue.Clicking a mouse Safety repetitively causing RSI. A) Health. B) Safety. C) All the above. D) None of the above. Show Answer Correct Answer: A) Health. 17. How does malware get onto your computer? A) Email attachments or links. B) By visiting dodgy websites. C) On USB sticks. D) All of the above. Show Answer Correct Answer: D) All of the above. 18. What is the difference between symmetric and asymmetric encryption? A) Symmetric encryption uses two keys for encryption and decryption. B) Asymmetric encryption is faster than symmetric encryption. C) Symmetric encryption is used for digital signatures while asymmetric is for data encryption. D) Symmetric encryption uses one key for both processes, while asymmetric encryption uses a key pair. Show Answer Correct Answer: D) Symmetric encryption uses one key for both processes, while asymmetric encryption uses a key pair. 19. Hacking others computer is good A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 20. What is the function of antivirus software? A) To manage network traffic. B) To create a backup of files automatically. C) To improve the speed of the computer. D) To detect and remove malicious software from a computer. Show Answer Correct Answer: D) To detect and remove malicious software from a computer. 21. Unsolicited electronic messages, especially advertising is know as? A) Spim. B) Spam. C) Ransomware. D) None of the above. Show Answer Correct Answer: B) Spam. 22. When was the first Email Written? A) 1973. B) 1972. C) 1971. D) 1970. Show Answer Correct Answer: C) 1971. 23. Which of the following programs should be used to create the doc. file? A) Database. B) Spreadsheet. C) Email. D) Word processing. Show Answer Correct Answer: D) Word processing. 24. Identify the oldest phone hacking technique used by hackers to make free calls. A) Phishing. B) Spamming. C) Cracking. D) Phreaking. Show Answer Correct Answer: D) Phreaking. 25. What is the first element of the CIA Triad discussed in the text? A) Authentication. B) Integrity. C) Availability. D) Confidentiality. Show Answer Correct Answer: D) Confidentiality. 26. Why it is useful to use an avatar? A) It protects your identity by making it impossible for people to find out who you are in real life. B) It helps people identify exactly who you are by showing everyone what you look like. C) It protects your privacy by making it a more difficult for people to find out who you are in real life. D) None of the above. Show Answer Correct Answer: C) It protects your privacy by making it a more difficult for people to find out who you are in real life. 27. Virus that replicates itself A) Trojan horse. B) Creeper. C) Worm. D) Malware. Show Answer Correct Answer: C) Worm. 28. Siapa nama pendiri WikiLeaks? A) Dylan Rolliansyah. B) Julian Assange. C) Julian Treasure. D) Edward Snowden. Show Answer Correct Answer: B) Julian Assange. 29. There is a straightforward and easy solution to securing computers. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 30. What security vulnerability allows attackers to execute arbitrary system commands by injecting malicious inputs into a web application's command-line interface? A) Cross-Site Scripting (XSS). B) SQL Injection. C) Cross-Site Request Forgery (CSRF). D) Command Injection. Show Answer Correct Answer: D) Command Injection. 31. To achieve the maximum battery life a laptop computer, Which of the following is the BEST mode to use when the laptop is not in use? A) Defragment. B) Sleep. C) Hibernation. D) Screensaver. Show Answer Correct Answer: C) Hibernation. 32. Which of the these is not a type of active attack? A) Denial of Service. B) Replay. C) Traffic Analysis. D) Masquerade. Show Answer Correct Answer: C) Traffic Analysis. 33. Vandalizing school computers or network can result in the cancellation of a student's privilege to use technology in school. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 34. What is malware usually written for? A) To make all computers slow. B) To cause harm-to steal devices or make data malfunction. C) To question whether the internet is safe or not. D) To cause harm-to steal data or make a device malfunction. Show Answer Correct Answer: D) To cause harm-to steal data or make a device malfunction. 35. Which one of the following describes how to find out about an the organization's a privacy policy? A) By reading the office newsletter. B) By reading the policy in the organisation's policy manual. C) By speaking to the Finance Department. D) By speaking to the Sales Department. Show Answer Correct Answer: B) By reading the policy in the organisation's policy manual. 36. Which security technique requires an authorization by what the user knows and what the user has? A) Biometrics. B) Special email account. C) Two-factor authorization. D) Social networking. Show Answer Correct Answer: C) Two-factor authorization. 37. What does 'integrity of data' mean in CIA Triad? A) Accuracy and completeness of the data. B) Data should be viewable at all times. C) Data should be access by only the right people. D) All of the Above. Show Answer Correct Answer: A) Accuracy and completeness of the data. 38. Identify the term which denotes that only authorized users are capable of accessing the information A) Availability. B) Non-repudiation. C) Confidentiality. D) Integrity. Show Answer Correct Answer: A) Availability. 39. What should you do with the master password for your password manager? A) Use it for all your accounts. B) Keep it in a secure place. C) Share it with a trusted friend. D) Change it every month. Show Answer Correct Answer: B) Keep it in a secure place. 40. If you think your computer has a virus, a good first step in solving the problem would be to: A) Do nothing. B) Run a virus scan. C) Destroy the computer. D) Reformat the hard drive. Show Answer Correct Answer: B) Run a virus scan. 41. Which one of the following best describes the quarantine in anti-virus software? A) All files that are being scanned by the software are placed here. B) Old virus definition files are placed here. C) Infected files that cannot be deleted nor cleaned during scanning of files are placed here. D) Backup copies of system files are placed here. Show Answer Correct Answer: C) Infected files that cannot be deleted nor cleaned during scanning of files are placed here. 42. Imagine you find a USB device in the hallway at work. What's the best thing to do? A) Pick it up and plug it in to see what's on the USB device. Maybe you can identify the owner. B) Leave it in the hallway or bring it to the reception desk, such that the person who lost it can get it back. C) Pick it up, don't plug it in but inform your IT department because this could be a USB device containing malware to infect your company's systems. D) None of the above. Show Answer Correct Answer: C) Pick it up, don't plug it in but inform your IT department because this could be a USB device containing malware to infect your company's systems. 43. Untuk menjaga keamanan ketika video conference, kita perlu menerapkan beberapa hal, kecuali ..... A) Menggunakan password ketika join. B) Mengaktifkan fitur waiting room. C) Menggunakan room id khusus. D) Membiarkan seluruh peserta bebas melakukan screen sharing. Show Answer Correct Answer: D) Membiarkan seluruh peserta bebas melakukan screen sharing. 44. If you receive a phishing email you should A) Report it. B) Nothing, it is not going to hurt anyone if nothing is done. C) Reply back to the email with rude words. D) None of the above. Show Answer Correct Answer: A) Report it. 45. Who are script kiddies in the context of cybercriminals? A) State-sponsored attackers gathering intelligence. B) Individuals with little or no skill using existing tools or instructions. C) Professional hackers breaking into government systems. D) Highly skilled individuals using advanced tools. Show Answer Correct Answer: B) Individuals with little or no skill using existing tools or instructions. 46. Define the term 'wi-fi'. A) When two or more LANs are connected together over a wide area. B) A form of Internet access that uses the facilities connectivity by dialing a telephone number on a conventional telephone line. C) The name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. D) None of the above. Show Answer Correct Answer: C) The name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. 47. What is ransomware and how does it affect users? A) Ransomware is a type of antivirus software that protects users from malware. B) Ransomware is a hardware component that speeds up computer performance. C) Ransomware is a social engineering tactic that promotes online safety. D) Ransomware is malicious software that encrypts files or locks users out of their systems, demanding a ransom for access. Show Answer Correct Answer: D) Ransomware is malicious software that encrypts files or locks users out of their systems, demanding a ransom for access. 48. Siapa pihak yang mengawali Edward Snowden sewaktu dia berada di Rusia? A) CIA. B) Pemerintah Rusia. C) WikiLeaks. D) Pemerintah Amerika. Show Answer Correct Answer: C) WikiLeaks. 49. Fake e-mail message appearing to be from a trusted business, social network or other contact Asks for personal information or requests a user to click on a link or download a file to verify personal information Hackers can secretly collect personal information and passwords A) Farming. B) Phishing. C) Pharming. D) Fishing. Show Answer Correct Answer: B) Phishing. 50. Which one of the following increases the risk of contracting malware the most? A) Using a software firewall. B) Using a hardware firewall. C) Using obsolete and unsupported software. D) Using obsolete and unsupported hardware. Show Answer Correct Answer: C) Using obsolete and unsupported software. 51. Which type of hacker represents the highest risk to your network? A) Black-hat hackers. B) Disgruntled employees. C) Grey-hat hackers. D) Script kiddies. Show Answer Correct Answer: A) Black-hat hackers. 52. Which port number is commonly used for HTTP traffic? A) 25. B) 21. C) 443. D) 80. Show Answer Correct Answer: D) 80. 53. ..... relating to or characteristic of the culture of computers, information technology, and virtual reality. A) CYBER. B) CYBER CRIME. C) CYBER LAW. D) NETWORK SECURITY. Show Answer Correct Answer: A) CYBER. 54. 8 . Which of the following is the most important activity in system hacking? A) Covering tracks. B) Escalating privileges. C) Cracking passwords. D) Information gathering. Show Answer Correct Answer: C) Cracking passwords. 55. A technician wants to configure multifactor authentication for a standalone PC that contains confidential information. The PC already requires a PIN.which of the following should the technician implement? A) A finger print scanner. B) Challenge and response. C) Single sing on password. D) Passphrase. Show Answer Correct Answer: B) Challenge and response. 56. If the IP address of a device is 192.168.2.5, then what could be the IP address of the router? A) 192.168.0.0. B) 192.168.1.2. C) 192.168.2.1. D) 192.168.1.255. Show Answer Correct Answer: C) 192.168.2.1. 57. What change would make this password the STRONGEST?bills A) Add "1234" -now "bills1234". B) Change the "b" to B-now "Bills". C) Add more words-now "billsToWinItAll!". D) None of the above. Show Answer Correct Answer: C) Add more words-now "billsToWinItAll!". 58. What is PiHole meant for? A) It blocks viruses. B) It blocks ads. C) It blocks IPs of the websites that ads come from. D) None of the above. Show Answer Correct Answer: C) It blocks IPs of the websites that ads come from. 59. ..... are the special type of programs used for recording and tracking user's keystroke. A) Worms. B) Virus. C) Trojans. D) Keylogger. Show Answer Correct Answer: D) Keylogger. 60. Which one of the following applications has the functionality of storing multiple usernames and passwords in one location? A) Mail manager. B) Content manager. C) Task manager. D) Password manager. Show Answer Correct Answer: D) Password manager. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books