Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 21 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. ..... is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks.
2. What analogy does the speaker use to explain the function of cybersecurity?
3. Explain the purpose of a Bridge in networking.
4. How can you protect your devices from social engineering attacks?
5. The kind of crime involves altering raw data just before the computer processes it and then changing it back after the processing is completed .....
6. Which is not a security principle
7. Fill in the blank:A password that is easy for an attacker to break is known as a .....
8. What is encryption means?
9. Intentional or planned
10. When a user turns on their desktop computer, nothing appears on the screen. They hear three long beeps, followed by three short beeps and three long beeps. What should you do as a next step?
11. System hardening should implement the principle of .....
12. What is the purpose of privacy policies on websites?
13. The full form of WPS is
14. Yang bukan merupakan tujuan dari keamanan informasi adalah .....
15. What are some common social engineering tactics used by cybercriminals?
16. How does Malware get into your computer
17. You have been sent an Email form the bank. However, the logo doesn't look right. What could this be
18. In system hacking, which of the following is the most crucial activity?
19. When visiting a website, you notice a lock icon next to the web address. What does the lock represent?
20. A user reports that nothing happens when the power button is pressed. The user report to the technician that none of the cables are loose and that the other items on the power strip are functioning properly. Which of the following is the issue?
21. What is the hidden email address on the hacker's profile page?
22. Full form of SSL & TLS certificate protocols
23. Identity theft only occurs to .....
24. Attack on a network by flooding it with useless traffic to make the network down and unusable
25. What is The capturing and storing of computer and user events.
26. As per IS Policy of the Bank which of the following is not the essence of second line of defense associated with IT risks
27. What is the foundational protocol suite of the Internet and most modern networks?
28. Which of the following is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information?
29. What is selection in an algorithm?
30. Retreieve emails from server
31. When you enter personal details on social networking sites you should never:
32. After a long and hard day, you decide to relax and purchase some concert tickets online. Alas, the website doesn't seem to be working as you cannot get through, which is often the case. This is commonly the result of a-
33. Which command is used to change directory in a command-line interface?
34. Joe, a user, just received a new mobile device. Which of the following will joe be prompted for during device setup?
35. Is Importance of Risk Management in Information Security typically defined as the process of identifying, analyzing, and responding to risks.This process is not meant to end; as long as information exists, it will need protecting.
36. ..... is a characteristic of information security that ensures the nondisclosure of data except to another authorized person.
37. Voice or Phone Call Phishing is called .....
38. What is the primary role of companies like Google, Facebook, and LinkedIn in the cybersecurity domain?
39. We need to ..... our data
40. What is the main goal of contact spamming?
41. In the CIA Triad, which one of the following is not involved?
42. Which one of the following best describes phishing?
43. Which of the following types of computer or system is most vulnerable to network attacks?
44. What is the best approach to establishing strong security with passwords?
45. Which one of the following describes a computer hacker?
46. It allow a visited website to store its information about a user on users computer
47. What does Chris do after running the scripted install on each laptop for new starters?
48. In public key cryptosystem which is kept as public?
49. Warna favorit Dylan apa hayo?
50. Who created the World Wide Web?
51. Which of the following is NOT a method used by hackers and crackers to gain access?
52. Berikut teknik yang digunakan untuk menjamin keutuhan data (integrity) .....
53. If you see a pro making fun of a noob you should .....
54. An ..... document represents a structured collection of security configuration rules for some set of target systems.
55. Is authentication and authorization refer to same?
56. Where can you find up-to-date sources of information on specific known hardware and software vulnerabilities?
57. Software that collects information about the users in order to advertise.
58. To cause something to start or happen
59. Bagaimana cara menjaga keamanan digital?
60. Apa langkah pertama untuk melindungi perangkat dan akun dari upaya ilegal?