Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. Average daily time spent using Internet in India is (as per the global statistics 2023)
2. The Log4j zero-day case is best categorised as a .....
3. Integrity ensures that stored data are
4. Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
5. Which tool is used to grab emails of a domain?
6. Which of the following is intended a single, non-reusable backup media?
7. Which among the choices is not a security risk?
8. The process of converting plaintext to ciphertext.
9. Redirecting users to a bogus website that looks authentic is known as .....
10. Software that automatically shows or downloads advertising material (often unwanted) when a person is online.
11. What is the function of a HUB in a network?
12. ..... ensures that the individual is who she claims to be (the authentic or genuine person)
13. Which of the following is a common sign of malware infection?
14. Which source of research would be published by the IEEE?
15. Which of the following actions compromise cyber security?
16. Sending personal information like a social security or credit card number by email is ok if .....
17. If testers have little to no information regarding the system they are trying to hack they are:
18. The full form of FFA page is .....
19. How often does FACTA grant consumers the right to request one free credit report from each of the three national credit-reporting firms?
20. Which tag is used to gain cookies from a server?
21. What does CSS stand for?
22. An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
23. What is our main problem?
24. What is the primary goal of a Distributed Denial of Service (DDoS) attack in cybersecurity?
25. What is a MAC address?
26. Which of the following statements are correct? When I use incognito or private mode in a browser .....
27. Pengembangan http (hyper text transfer protocol) yang lebih aman adalah?
28. TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.
29. Avoid using secure websites.
30. What is a phishing attack designed to do?
31. You receive a desperate plea for help from a friend who says they are stuck overseas and all their money has been stolen. You should:
32. What is the role of a social engineering trainer in cyber security?
33. What is a browser cookie?
34. Study of robots is called as
35. What is the most common age when people start committing cybercrime. (even in accidents)
36. Which of these best describes an insider attack?
37. A "data harvesting tool" is:
38. Why is it important for Aarav to enable two-factor authentication for his online accounts?
39. Which is the following is a DoS attack?
40. A transaction where financial securities are issued against the cash flow generated from a pool of assets is called
41. Which of the following is an example of strong password?
42. How does a Switch differ from a Hub in a network?
43. Asymmetric encryption uses only 1 key.
44. What port does Telnet use?
45. A window pops up with the Microsoft logo that says your computer has been infected with a virus. What do you do?
46. Which technology could be used to protect data integrity?
47. Can you name a type of malware?
48. Fill in the blank:Technologies used to create, store, and retrieve passwords are known as .....
49. How does a VPN ensure secure communication over a public network like the internet?
50. Apa yang sebaiknya dilakukan saat membagikan informasi pribadi?
51. A computer virus is a simple program made to harm a computer system.
52. When you grant access to print to a printer, what are you granting?
53. What is the primary function of a Router in a network?
54. A computer software, firmware or hardware that creates and runs virtual machines
55. Which one of the following describes why it is important to update antivirus software regularly?
56. What damage can be caused by malware?
57. In what circumstances is it advisable to utilize AntiVirus software?
58. A ..... is a collection ofrelated web pages, images, videos
59. Which of this is an example of physical hacking?
60. CompTIA CyberSecurity Analyst ( CySa+)