This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 2 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. Average daily time spent using Internet in India is (as per the global statistics 2023) A) 4 hours 23 minutes. B) 2 hours 50 minutes. C) 6hours 23 minutes. D) 8 hours 50 minutes. Show Answer Correct Answer: C) 6hours 23 minutes. 2. The Log4j zero-day case is best categorised as a ..... A) Software vulnerability. B) Smurf Attack. C) DDoS. D) SSRF. Show Answer Correct Answer: A) Software vulnerability. 3. Integrity ensures that stored data are A) Accurate and fast. B) Inaccurate and Authorization modification. C) Accurate and no Authorization modification. D) Inaccurate and no authorization modification. Show Answer Correct Answer: C) Accurate and no Authorization modification. 4. Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else? A) Adware. B) Spyware. C) Malware. D) All of the above. Show Answer Correct Answer: B) Spyware. 5. Which tool is used to grab emails of a domain? A) Subdomain.com. B) Nmap. C) Cruiz. D) Hunter.io. Show Answer Correct Answer: D) Hunter.io. 6. Which of the following is intended a single, non-reusable backup media? A) CD-ROM/ DVD-ROM. B) Flash drive. C) Tape. D) Hard drive. Show Answer Correct Answer: C) Tape. 7. Which among the choices is not a security risk? A) Phishing. B) Hacking. C) Vishing. D) Fishing. E) Smishing. Show Answer Correct Answer: D) Fishing. 8. The process of converting plaintext to ciphertext. A) Encryption. B) Decryption. C) Cyphertext. D) Cryptography. Show Answer Correct Answer: A) Encryption. 9. Redirecting users to a bogus website that looks authentic is known as ..... A) Pharming. B) Smishing. C) Phishing. D) Vishing. Show Answer Correct Answer: A) Pharming. 10. Software that automatically shows or downloads advertising material (often unwanted) when a person is online. A) Software. B) Malware. C) Ransomware. D) Adware. Show Answer Correct Answer: D) Adware. 11. What is the function of a HUB in a network? A) Stores data for future retrieval. B) Connects multiple devices in a network and broadcasts data to all connected devices. C) Provides wireless connectivity to devices. D) Acts as a firewall for the network. Show Answer Correct Answer: B) Connects multiple devices in a network and broadcasts data to all connected devices. 12. ..... ensures that the individual is who she claims to be (the authentic or genuine person) A) Authentication:. B) Confidentiality:cybercriminal:. C) Cybersecurity:. D) Cyberterrorism:. E) Brokers:. Show Answer Correct Answer: A) Authentication:. 13. Which of the following is a common sign of malware infection? A) Receiving regular software updates. B) Frequent pop-up ads appearing on the screen. C) Increased battery life on mobile devices. D) Faster internet browsing speeds. Show Answer Correct Answer: B) Frequent pop-up ads appearing on the screen. 14. Which source of research would be published by the IEEE? A) Twitter. B) TTP. C) RFC. D) OSINT. Show Answer Correct Answer: C) RFC. 15. Which of the following actions compromise cyber security? A) Attack. B) Threat. C) Exploit. D) Vulnerability. Show Answer Correct Answer: B) Threat. 16. Sending personal information like a social security or credit card number by email is ok if ..... A) It is to a well-known company. B) It is to my school. C) It is to my family. D) None of the above. Show Answer Correct Answer: D) None of the above. 17. If testers have little to no information regarding the system they are trying to hack they are: A) Yellow box testing. B) Black box testing. C) White box testing. D) Blue box testing. Show Answer Correct Answer: B) Black box testing. 18. The full form of FFA page is ..... A) Free for america. B) Free for africa. C) Free for alexa. D) Free for all links. Show Answer Correct Answer: D) Free for all links. 19. How often does FACTA grant consumers the right to request one free credit report from each of the three national credit-reporting firms? A) Every 12 months. B) Every 18 months. C) Every 2 months. D) Every 6 months. Show Answer Correct Answer: A) Every 12 months. 20. Which tag is used to gain cookies from a server? A) . B) . C) . D) . Show Answer Correct Answer: A) . 21. What does CSS stand for? A) Cascading Style Sheets. B) Computer Style Sheets. C) Colorful Style Sheets. D) Creative Style System. Show Answer Correct Answer: A) Cascading Style Sheets. 22. An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other. A) Man-in-the-Middle Attack. B) Malware Attack. C) Snooping Attack. D) Replay Attack. Show Answer Correct Answer: A) Man-in-the-Middle Attack. 23. What is our main problem? A) No one can defeat cyber criminals. B) Hackers can't be defeated. C) Hackers will keep your information. D) Hackers keep on hacking. Show Answer Correct Answer: D) Hackers keep on hacking. 24. What is the primary goal of a Distributed Denial of Service (DDoS) attack in cybersecurity? A) To steal sensitive data. B) To overload a network or website, making it unavailable to users. C) To send spam emails. D) To breach firewalls. Show Answer Correct Answer: B) To overload a network or website, making it unavailable to users. 25. What is a MAC address? A) A protocol for secure communication. B) A type of network topology. C) An IP address for local networks. D) A unique identifier assigned to network interfaces. Show Answer Correct Answer: D) A unique identifier assigned to network interfaces. 26. Which of the following statements are correct? When I use incognito or private mode in a browser ..... A) No one can see the websites I visited, even not my Internet Service Provider. B) Others that use my device can't see which sites I visited. C) I'm anonymous for that website. D) None of the above. Show Answer Correct Answer: B) Others that use my device can't see which sites I visited. 27. Pengembangan http (hyper text transfer protocol) yang lebih aman adalah? A) Https. B) Httpp. C) Http. D) Httpd. Show Answer Correct Answer: A) Https. 28. TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim. A) Identify Theft. B) Wiretapping. C) Impersonation. D) Reconnaissance. Show Answer Correct Answer: C) Impersonation. 29. Avoid using secure websites. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 30. What is a phishing attack designed to do? A) Protect against malware attacks. B) Provide free software updates. C) Increase internet speed for users. D) Steal sensitive information from individuals. Show Answer Correct Answer: D) Steal sensitive information from individuals. 31. You receive a desperate plea for help from a friend who says they are stuck overseas and all their money has been stolen. You should: A) Forward the email to a mutual friend. B) Send some money. C) Delete the email. D) Reply to the email. Show Answer Correct Answer: C) Delete the email. 32. What is the role of a social engineering trainer in cyber security? A) Designing posters and creating eye-catching images to teach people about security. B) Monitoring computer networks for potential attacks. C) Testing targeted systems to find vulnerabilities. D) Teaching people how to identify and prevent scams. Show Answer Correct Answer: D) Teaching people how to identify and prevent scams. 33. What is a browser cookie? A) A small piece of data that tracks your preferences on different websites. B) A plug-in that allows you to view special types of web content. C) A type of food you can buy online. D) A type of phishing scam. Show Answer Correct Answer: A) A small piece of data that tracks your preferences on different websites. 34. Study of robots is called as A) Robotics. B) Probiotics. C) Aerospace. D) Aeronautics. Show Answer Correct Answer: A) Robotics. 35. What is the most common age when people start committing cybercrime. (even in accidents) A) 30+. B) 21-25. C) 26-30. D) 15-20. Show Answer Correct Answer: D) 15-20. 36. Which of these best describes an insider attack? A) A hacker tries to stop people from accessing a network by flooding it with traffic. B) Someone tries to get information by cracking a password through trial and error. C) Someone from inside an organisation tries to steal information. D) None of the above. Show Answer Correct Answer: C) Someone from inside an organisation tries to steal information. 37. A "data harvesting tool" is: A) A type of input device. B) A type of virus. C) Software used to gather information about individuals. D) Illegal software used to steal passwords. Show Answer Correct Answer: C) Software used to gather information about individuals. 38. Why is it important for Aarav to enable two-factor authentication for his online accounts? A) To make it easier for unauthorized users to access accounts. B) To protect against identity theft. C) To enhance security by adding an extra layer of protection, making it harder for unauthorized users to access accounts or systems. D) To receive more targeted advertisements. Show Answer Correct Answer: C) To enhance security by adding an extra layer of protection, making it harder for unauthorized users to access accounts or systems. 39. Which is the following is a DoS attack? A) Listening in on network traffic to identify the MAC address of a computer. B) Continually bombarding a targeted network with fake requests. C) Injecting bogus networking re-configuration commands. D) Forcing computers to drop their connections and reconnect with the attacker's access point. Show Answer Correct Answer: B) Continually bombarding a targeted network with fake requests. 40. A transaction where financial securities are issued against the cash flow generated from a pool of assets is called A) Credit Default Swaps. B) Total Return Swaps. C) Credit Linked Notes. D) Securitization. Show Answer Correct Answer: D) Securitization. 41. Which of the following is an example of strong password? A) "myname". B) "12345". C) "P@ssw0rd!". D) "password123". Show Answer Correct Answer: C) "P@ssw0rd!". 42. How does a Switch differ from a Hub in a network? A) A Switch uses MAC addresses to forward data efficiently, while a Hub broadcasts data to all connected devices. B) A Switch operates at a slower speed compared to a Hub in a network. C) A Switch sends data to all connected devices, while a Hub filters data based on MAC addresses. D) A Switch has fewer ports available than a Hub for connecting devices. Show Answer Correct Answer: A) A Switch uses MAC addresses to forward data efficiently, while a Hub broadcasts data to all connected devices. 43. Asymmetric encryption uses only 1 key. A) God Knows. B) False. C) True. D) Maybe. Show Answer Correct Answer: B) False. 44. What port does Telnet use? A) 22. B) 20. C) 23. D) 80. Show Answer Correct Answer: C) 23. 45. A window pops up with the Microsoft logo that says your computer has been infected with a virus. What do you do? A) Panic. B) Call the number on the pop-up. C) Click the link in the pop up so they can remotely. D) Don't click anything-report it to the FTC and contact your IT department immediately. Show Answer Correct Answer: D) Don't click anything-report it to the FTC and contact your IT department immediately. 46. Which technology could be used to protect data integrity? A) Tamper detection systems. B) Firewalls. C) Proxy servers. D) Data mining tools. Show Answer Correct Answer: A) Tamper detection systems. 47. Can you name a type of malware? A) Spyware. B) Virus. C) Trojan. D) Adware. Show Answer Correct Answer: B) Virus. 48. Fill in the blank:Technologies used to create, store, and retrieve passwords are known as ..... A) Encryption algorithms. B) Authentication protocols. C) Data storage services. D) Password manager. Show Answer Correct Answer: D) Password manager. 49. How does a VPN ensure secure communication over a public network like the internet? A) By sharing user data with third parties for verification. B) By using outdated encryption methods that are easily compromised. C) By allowing unrestricted access to user data without any encryption. D) By encrypting the data transmitted between the user's device and the VPN server. Show Answer Correct Answer: D) By encrypting the data transmitted between the user's device and the VPN server. 50. Apa yang sebaiknya dilakukan saat membagikan informasi pribadi? A) Publikasikan nomor telepon agar mudah dihubungi. B) Hindari membagikan informasi pribadi tanpa alasan jelas. C) Bagikan informasi kepada semua orang di media sosial. D) Simpan informasi pribadi hanya di perangkat orang lain. E) Tidak perlu berhati-hati karena media sosial sudah aman. Show Answer Correct Answer: B) Hindari membagikan informasi pribadi tanpa alasan jelas. 51. A computer virus is a simple program made to harm a computer system. A) True. B) False. C) Maybe. D) None of the above. Show Answer Correct Answer: A) True. 52. When you grant access to print to a printer, what are you granting? A) Key. B) Right. C) Accessible. D) Permission. Show Answer Correct Answer: D) Permission. 53. What is the primary function of a Router in a network? A) Providing power to network devices. B) Filtering spam emails. C) Forwarding data packets between computer networks. D) Translating data packets into binary code. Show Answer Correct Answer: C) Forwarding data packets between computer networks. 54. A computer software, firmware or hardware that creates and runs virtual machines A) Gateway. B) Protocol. C) Cookies. D) Hypervisor. Show Answer Correct Answer: D) Hypervisor. 55. Which one of the following describes why it is important to update antivirus software regularly? A) To protect your computer from all known viruses. B) To ensure the software identifies old and recent viruses. C) To protect your computer from unwanted bulk messages. D) To prevent the spread of malicious programs on the Internet. Show Answer Correct Answer: B) To ensure the software identifies old and recent viruses. 56. What damage can be caused by malware? A) Computer crashes. B) The compromising personal information, which may lead to identity theft. C) Permanent deletion. D) All of the above. Show Answer Correct Answer: D) All of the above. 57. In what circumstances is it advisable to utilize AntiVirus software? A) Upon acquiring a new computer. B) Continuously, specifically on your laptop, with regular updates!. C) Consistently, across ALL digital devices, ensuring they are regularly updated!. D) Only when you begin to notice signs of a computer virus. Show Answer Correct Answer: C) Consistently, across ALL digital devices, ensuring they are regularly updated!. 58. A ..... is a collection ofrelated web pages, images, videos A) Web browser. B) Website. C) Webpage. D) None of the above. Show Answer Correct Answer: B) Website. 59. Which of this is an example of physical hacking? A) DDoS (Distributed Denial of Service) attack. B) Remote Unauthorised access. C) SQL Injection on SQL vulnerable site. D) Inserting malware loaded USB to a system. Show Answer Correct Answer: D) Inserting malware loaded USB to a system. 60. CompTIA CyberSecurity Analyst ( CySa+) A) A certification in managerial skills. B) A certification in risk management for businesses. C) Certification assessing, combating and responding to security threats. D) None of the above. Show Answer Correct Answer: C) Certification assessing, combating and responding to security threats. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 9 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books