This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 20 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 20 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. What constitutes an example of cybercrime? A) Unauthorized access to data or using another individual's computer without consent. B) Exploring the Dark Web. C) Deceiving individuals into downloading malicious software. D) Creating an account on a platform for which you do not meet the age requirements. Show Answer Correct Answer: A) Unauthorized access to data or using another individual's computer without consent. 2. Kiara was working on a ppt when she got a mail saying someone logged in to her account and deleted all her projects.what kind of attack did Kiara face A) Pishing. B) Password. C) Hacker. D) Virus. Show Answer Correct Answer: B) Password. 3. Future Skills Portal (FSP) was launched by A) NIELIT. B) NASSCOM. C) WIPRO. D) HCL. Show Answer Correct Answer: B) NASSCOM. 4. Which of the following option is used to protect data and passwords? A) Encryption. B) Authorization. C) Authentication. D) Non-repudiation. Show Answer Correct Answer: A) Encryption. 5. What are the benefits of the TCP/IP model? A) Flexibility, Scalability, Efficiency, Standardization. B) Complexity, High cost, Limited applications. C) Slow data transmission, High maintenance. D) None of the above. Show Answer Correct Answer: A) Flexibility, Scalability, Efficiency, Standardization. 6. A ..... is someone who uses the internet or network to destroy or damage computer for political reasons. A) CYBER TERRORIST. B) SCRIPT KIDDIES. C) CRACKER. D) HACKER. Show Answer Correct Answer: A) CYBER TERRORIST. 7. Which one of the following is a common biometric security technique used in access control? A) Voice recognition. B) Footprint. C) Movement tracking. D) Fingerprint. Show Answer Correct Answer: D) Fingerprint. 8. Which of these is not a form of phishing A) Fake email. B) Fake website link. C) Spam. D) Key logger. Show Answer Correct Answer: D) Key logger. 9. There is no cyber safety issue by entering another account along with your personal mail account in your mobile. A) True. B) Partially true. C) Depends on the device. D) False. Show Answer Correct Answer: D) False. 10. What is the significance of Internet Service Providers (ISPs) in India? A) They offer various options for internet connectivity. B) They are responsible for creating internet protocols. C) They manufacture networking hardware. D) They provide free internet access to all. Show Answer Correct Answer: A) They offer various options for internet connectivity. 11. I don't use a PIN on my smartphone but keep it with me. What could go wrong? A) When I lose it all my information and apps are accessible by the finder. B) When I leave my phone unattended, miscreants can gain access to all my online accounts using my email address. C) When my phone gets stolen the thieves can access all my information and apps. D) All of the above. Show Answer Correct Answer: C) When my phone gets stolen the thieves can access all my information and apps. 12. Which of the following is an example of baiting? A) A phone call from a bank. B) A USB stick loaded with malware. C) An email asking for personal information. D) A fake social media account. Show Answer Correct Answer: B) A USB stick loaded with malware. 13. What is a widely recognized method for enhancing the security of a Wi-Fi network? A) Distributing the password to all users. B) Utilizing an unsecured network. C) Employing WPA2 encryption protocols. D) Turning off the router's firewall. Show Answer Correct Answer: C) Employing WPA2 encryption protocols. 14. Which of these were not the most common passwords of 2015 A) 1234. B) Qwerty. C) Hello. D) Password. Show Answer Correct Answer: C) Hello. 15. Which one of the following should you be aware of when using an unprotected wireless network? A) Your data will be accessible to outsiders. B) Your computer password will be changed. C) Encrypted files will be decrypted. D) Firewall protection will be disabled. Show Answer Correct Answer: A) Your data will be accessible to outsiders. 16. How many organizations worldwide experienced phishing in 2019? A) 20%. B) 88%. C) 6%. D) 55%. Show Answer Correct Answer: B) 88%. 17. Which one of the following is a main principle of data protection legislation? A) To protect technical data. B) To protect personal data. C) To protect financial data. D) To protect statistical data. Show Answer Correct Answer: B) To protect personal data. 18. Requires healthcare enterprises to guard protected healthcare information and implement policies and procedures to safeguard it, whether it be in paper or electronic format A) Health Insurance Portability and Accountability Act (HIPAA):. B) Gramm-Leach-Bliley Act (GLBA):. C) Hacker:. D) Hactivists:. Show Answer Correct Answer: A) Health Insurance Portability and Accountability Act (HIPAA):. 19. Users of a popular social media platform have reported receiving messages that appear to be from the platform's support team. These messages ask users to click on a link and enter their login details.Identify the type of cyber attack being used in this scenario. A) Denial of Service. B) Brute Force. C) Phishing. D) Malware. Show Answer Correct Answer: C) Phishing. 20. Which of the following data centers function as Off-site DR center for Payment Systems i.e., NEFT, RTGS etc.? A) Khargar DC. B) Belapur DC. C) Nagpur DC. D) Both Belapur & Nagpur DC. Show Answer Correct Answer: C) Nagpur DC. 21. Use less expensive computer hardware. A) Peer-to-peer Network. B) Client-Server Network. C) All the above. D) None of the above. Show Answer Correct Answer: A) Peer-to-peer Network. 22. A network security software A) Gateway. B) Firewall. C) Spyware. D) Key-logger. Show Answer Correct Answer: B) Firewall. 23. Is blind injection come under XSS A) TRUE. B) FALSE. C) All the above. D) None of the above. Show Answer Correct Answer: B) FALSE. 24. You are traveling alone to a different city. You post your pictures and location online every 30minutes! What is wrong with this? A) A thief will know that this is the best time to go rob your house. B) People will be jealous of your adventures. C) People will give you free suggestions, about how to travel. D) Nothing wrong in sharing your adventures and happiness with everyone. Show Answer Correct Answer: A) A thief will know that this is the best time to go rob your house. 25. What does the word cyber stand for A) Computer related. B) Hacking. C) Antivirus. D) Viruses. Show Answer Correct Answer: A) Computer related. 26. What is involved in the creation of a disaster recovery plan? A) Only customer service restoration. B) Only data storage and recovery. C) Only network backup. D) A comprehensive approach including data storage, recovery, and communication restoration. Show Answer Correct Answer: D) A comprehensive approach including data storage, recovery, and communication restoration. 27. The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication is known as? A) Soldering. B) Phishing. C) Converting. D) Hacking. Show Answer Correct Answer: B) Phishing. 28. In a well-run information security program, attacks will never get through security perimeters and local defenses. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 29. With which type of social engineering attack are users asked to respond to an email or are directed to a website where they are requested to update personal information, such as passwords or credit card numbers? A) Pharming. B) Phishing. C) Typo squatting. D) Pretexting. Show Answer Correct Answer: B) Phishing. 30. Information security is the responsibility of: A) Tech Department. B) SRO. C) Admin. D) Everyone in the district. Show Answer Correct Answer: D) Everyone in the district. 31. The Caesar cipher is a ..... cipher that has a key of 3. A) Stream. B) Additive. C) Block. D) Transposition. Show Answer Correct Answer: B) Additive. 32. What are the health hazards caused by careless storage of E-Waste? A) Lung cancer. B) DNA damage. C) Asthmatic bronchitis. D) All of the above. Show Answer Correct Answer: D) All of the above. 33. The ..... is encryped text. A) Secret text. B) Secret Script. C) Cipher text. D) Cipher script. Show Answer Correct Answer: C) Cipher text. 34. Which of the following is a standard measure to establish confidentiality? A) Backing up external drives. B) Implementing firewalls. C) Data encryption. D) Using file permissions. Show Answer Correct Answer: C) Data encryption. 35. Which of these best describes a denial of service attack? A) A hacker tries to stop people from accessing a network by flooding it with traffic. B) Someone tries to get information by cracking password through trial and error. C) Someone from inside an organisation tries to steal information. D) None of the above. Show Answer Correct Answer: A) A hacker tries to stop people from accessing a network by flooding it with traffic. 36. Which type of malware encrypts a victim's files and demands a ransom for decryption? A) Spyware. B) Worm. C) Trojan Horse. D) Ransomware. Show Answer Correct Answer: D) Ransomware. 37. Membagikan email dan password kepada orang tua A) Aman. B) Tidak aman. C) All the above. D) None of the above. Show Answer Correct Answer: A) Aman. 38. What is meant by RTO-Recovery Time Objective in BCP A) Minimum data loss that can be tolerated by the organization. B) Maximum length of time it should take to restore normal operations after outage. C) Maximum data loss that can be tolerated by the organization. D) Minimum length of time it should take to restore normal operations after outage. Show Answer Correct Answer: B) Maximum length of time it should take to restore normal operations after outage. 39. Why is it important to have a secure network? A) To increase internet speed and performance. B) To reduce the cost of network maintenance. C) It is important to have a secure network to protect sensitive data and prevent unauthorized access. D) To make the network more accessible to everyone. Show Answer Correct Answer: C) It is important to have a secure network to protect sensitive data and prevent unauthorized access. 40. To see if a website is using a secure connection, what should you look for? Select all that apply. A) A lock icon to the left of the URL. B) A plus sign (+) to the right of the tab. C) A star icon to the right of the URL. D) "https" at the very beginning of the URL. Show Answer Correct Answer: A) A lock icon to the left of the URL. 41. In 2016, online fraud cases in the United States resulted in victim losses totaling: A) Nothing-online fraud doesn't result in victim losses. B) $ 100, 000. C) Over $ 1.2 billion. D) $ 2 million. Show Answer Correct Answer: C) Over $ 1.2 billion. 42. Fill in the blank:A secret combination of letters, numbers, and/or characters known only to the user is called a ..... A) Secret code. B) Passphrase. C) Password. D) Username. Show Answer Correct Answer: C) Password. 43. To hide information inside a picture, the technology used is ..... A) Rootkits. B) Image Render. C) Steganography. D) Bitmapping. Show Answer Correct Answer: C) Steganography. 44. You've downloaded a new game to your mobile phone, and it asks you for a credit card. What risk is associated with providing this information? A) Your credit card information will be provided to other game publishers. B) Your card may be charged for additional components of the game that you did not request. C) Your device may become infected with computer malware, virus or worms. D) Your card will be charged for excess minutes or data. Show Answer Correct Answer: B) Your card may be charged for additional components of the game that you did not request. 45. Don't let Apps share data and your location. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 46. A number that uniquely identifies each computer or device connected to the Internet. A) Coding. B) IP Address. C) Software. D) Server. Show Answer Correct Answer: B) IP Address. 47. Which one of the following best describes the reason for protecting commercially sensitive information? A) To prevent theft of financial details. B) To prevent spread of malware. C) To prevent computer hardware errors. D) To prevent reduced broadband speed. Show Answer Correct Answer: A) To prevent theft of financial details. 48. What type of attack continuously enters different passwords against the same account? A) Hash. B) Brute force. C) Man in the middle. D) Dictionary. Show Answer Correct Answer: B) Brute force. 49. By combining the words 'malicious' and 'software' we get the word 'malware'. What does malicious mean? A) Malicious means delicious. B) Malicious means Mali Juice. C) Malicious means harmful. D) None of these. Show Answer Correct Answer: C) Malicious means harmful. 50. What is the definition of a brute force attack? A) Repeatedly trying usernames/passwords to access a system. B) Physically threatening someone to give up personal information. C) Physically breaking into a device to hack it. D) Being a very strong hacker. Show Answer Correct Answer: A) Repeatedly trying usernames/passwords to access a system. 51. Which one of the following is actually considered as the first computer virus? A) Sasser. B) Blaster. C) Creeper. D) Both A and C. Show Answer Correct Answer: C) Creeper. 52. What does the chmod 755 filename command do? A) Changes the file's owner. B) Grants read, write, and execute permissions to all users. C) Grants full permissions to the owner, and read and execute permissions to others. D) None of the above. Show Answer Correct Answer: C) Grants full permissions to the owner, and read and execute permissions to others. 53. Sandeep was told to hack the terrorist organization and get the details to help the government.what type of hacking is this A) Black hat hacking. B) Grey hat hacking. C) White hat hacking. D) Hacking. Show Answer Correct Answer: C) White hat hacking. 54. Which of these is not a famous pieces of malware? A) ILOVEYOU. B) Betrix. C) Stuxnet. D) Slammer. Show Answer Correct Answer: B) Betrix. 55. Which of the following is a component of cyber security? A) Attacks. B) AI. C) Internet Of Things. D) Database. Show Answer Correct Answer: C) Internet Of Things. 56. What is the best password policy? A) Always write the same passwords in every link. B) Your name, personal details. C) Have random password which you can't remember. D) Never use remember password and keep complex passwords you can remember. Show Answer Correct Answer: D) Never use remember password and keep complex passwords you can remember. 57. What type of attack is a false warning, often contained in an email message claiming to come from the information technology (IT) department? A) Authentication. B) Impersonation. C) Hoax. D) Revalidation. Show Answer Correct Answer: C) Hoax. 58. What rules make an operating system to verify and make strong from incoming packets? A) Connection security rules. B) Inbound rules. C) Paradigm rules. D) Out bound rules. Show Answer Correct Answer: B) Inbound rules. 59. Which one of the following systems cannot be considered as an example of the operating systems? A) Red Hat Linux. B) BSD Linux. C) Microsoft Office. D) Windows 8. Show Answer Correct Answer: C) Microsoft Office. 60. A series of ICMP packets sent to your ports in sequence might indicate what? A) Ping floof. B) Sniffing. C) Ip spoofing. D) Sql injection. Show Answer Correct Answer: A) Ping floof. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books