Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 20 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. What constitutes an example of cybercrime?
2. Kiara was working on a ppt when she got a mail saying someone logged in to her account and deleted all her projects.what kind of attack did Kiara face
3. Future Skills Portal (FSP) was launched by
4. Which of the following option is used to protect data and passwords?
5. What are the benefits of the TCP/IP model?
6. A ..... is someone who uses the internet or network to destroy or damage computer for political reasons.
7. Which one of the following is a common biometric security technique used in access control?
8. Which of these is not a form of phishing
9. There is no cyber safety issue by entering another account along with your personal mail account in your mobile.
10. What is the significance of Internet Service Providers (ISPs) in India?
11. I don't use a PIN on my smartphone but keep it with me. What could go wrong?
12. Which of the following is an example of baiting?
13. What is a widely recognized method for enhancing the security of a Wi-Fi network?
14. Which of these were not the most common passwords of 2015
15. Which one of the following should you be aware of when using an unprotected wireless network?
16. How many organizations worldwide experienced phishing in 2019?
17. Which one of the following is a main principle of data protection legislation?
18. Requires healthcare enterprises to guard protected healthcare information and implement policies and procedures to safeguard it, whether it be in paper or electronic format
19. Users of a popular social media platform have reported receiving messages that appear to be from the platform's support team. These messages ask users to click on a link and enter their login details.Identify the type of cyber attack being used in this scenario.
20. Which of the following data centers function as Off-site DR center for Payment Systems i.e., NEFT, RTGS etc.?
21. Use less expensive computer hardware.
22. A network security software
23. Is blind injection come under XSS
24. You are traveling alone to a different city. You post your pictures and location online every 30minutes! What is wrong with this?
25. What does the word cyber stand for
26. What is involved in the creation of a disaster recovery plan?
27. The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication is known as?
28. In a well-run information security program, attacks will never get through security perimeters and local defenses.
29. With which type of social engineering attack are users asked to respond to an email or are directed to a website where they are requested to update personal information, such as passwords or credit card numbers?
30. Information security is the responsibility of:
31. The Caesar cipher is a ..... cipher that has a key of 3.
32. What are the health hazards caused by careless storage of E-Waste?
33. The ..... is encryped text.
34. Which of the following is a standard measure to establish confidentiality?
35. Which of these best describes a denial of service attack?
36. Which type of malware encrypts a victim's files and demands a ransom for decryption?
37. Membagikan email dan password kepada orang tua
38. What is meant by RTO-Recovery Time Objective in BCP
39. Why is it important to have a secure network?
40. To see if a website is using a secure connection, what should you look for? Select all that apply.
41. In 2016, online fraud cases in the United States resulted in victim losses totaling:
42. Fill in the blank:A secret combination of letters, numbers, and/or characters known only to the user is called a .....
43. To hide information inside a picture, the technology used is .....
44. You've downloaded a new game to your mobile phone, and it asks you for a credit card. What risk is associated with providing this information?
45. Don't let Apps share data and your location.
46. A number that uniquely identifies each computer or device connected to the Internet.
47. Which one of the following best describes the reason for protecting commercially sensitive information?
48. What type of attack continuously enters different passwords against the same account?
49. By combining the words 'malicious' and 'software' we get the word 'malware'. What does malicious mean?
50. What is the definition of a brute force attack?
51. Which one of the following is actually considered as the first computer virus?
52. What does the chmod 755 filename command do?
53. Sandeep was told to hack the terrorist organization and get the details to help the government.what type of hacking is this
54. Which of these is not a famous pieces of malware?
55. Which of the following is a component of cyber security?
56. What is the best password policy?
57. What type of attack is a false warning, often contained in an email message claiming to come from the information technology (IT) department?
58. What rules make an operating system to verify and make strong from incoming packets?
59. Which one of the following systems cannot be considered as an example of the operating systems?
60. A series of ICMP packets sent to your ports in sequence might indicate what?