This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 21 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 21 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. ..... is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks. A) Cloud. B) Pen drive. C) Website. D) Email. Show Answer Correct Answer: D) Email. 2. What analogy does the speaker use to explain the function of cybersecurity? A) A lock on a door. B) Brakes on a car. C) A helmet while biking. D) A fence around a house. Show Answer Correct Answer: B) Brakes on a car. 3. Explain the purpose of a Bridge in networking. A) A Bridge in networking is used to create physical connections between devices. B) The purpose of a Bridge in networking is to connect multiple network segments together and reduce network traffic by filtering and forwarding data efficiently. C) Bridges are designed to improve network speed by boosting signal strength. D) The purpose of a Bridge is to enhance network security by encrypting data transmissions. Show Answer Correct Answer: B) The purpose of a Bridge in networking is to connect multiple network segments together and reduce network traffic by filtering and forwarding data efficiently. 4. How can you protect your devices from social engineering attacks? A) Share personal information freely. B) Use the same password for all accounts. C) Keep software and firmware updated. D) Disable spam filters. Show Answer Correct Answer: C) Keep software and firmware updated. 5. The kind of crime involves altering raw data just before the computer processes it and then changing it back after the processing is completed ..... A) Data diddling. B) Data tampering. C) Salami attacks. D) None of above. Show Answer Correct Answer: A) Data diddling. 6. Which is not a security principle A) Non-repudiation. B) Information assurance. C) Avalability. D) Confidentiality. Show Answer Correct Answer: B) Information assurance. 7. Fill in the blank:A password that is easy for an attacker to break is known as a ..... A) Strong password. B) Encrypted password. C) Weak password. D) Complex password. Show Answer Correct Answer: C) Weak password. 8. What is encryption means? A) Provide a shield between your computer and the internet. B) Encoding of data. C) Use of user name and strong password. D) Allows users to access. Show Answer Correct Answer: B) Encoding of data. 9. Intentional or planned A) Anomalous. B) Deliberate. C) Disgruntled. D) None of the above. Show Answer Correct Answer: B) Deliberate. 10. When a user turns on their desktop computer, nothing appears on the screen. They hear three long beeps, followed by three short beeps and three long beeps. What should you do as a next step? A) Replace the motherboard. B) Replace the RAM. C) Look up the beep code on the manufacturer's website. D) Replace the CPU. Show Answer Correct Answer: C) Look up the beep code on the manufacturer's website. 11. System hardening should implement the principle of ..... A) Remote Access. B) Vulnerability Assessment. C) Threat Prevention. D) Least Privilege. Show Answer Correct Answer: D) Least Privilege. 12. What is the purpose of privacy policies on websites? A) To comply with website design standards. B) To inform users how their data is used and protected. C) To increase the website's search engine ranking. D) To make the website look more professional. Show Answer Correct Answer: B) To inform users how their data is used and protected. 13. The full form of WPS is A) Wireless Protected Setup. B) WiFi Protocol Setup. C) WiFi Protected System. D) WiFi Protected Setup. Show Answer Correct Answer: A) Wireless Protected Setup. 14. Yang bukan merupakan tujuan dari keamanan informasi adalah ..... A) Connectivity. B) Availability. C) Confidentiality. D) Integrity. Show Answer Correct Answer: A) Connectivity. 15. What are some common social engineering tactics used by cybercriminals? A) Phishing, pretexting, baiting, tailgating, and quid pro quo. B) Firewall, antivirus, encryption. C) Hacking, spamming, malware. D) Denial of service, data breach, ransomware. Show Answer Correct Answer: A) Phishing, pretexting, baiting, tailgating, and quid pro quo. 16. How does Malware get into your computer A) Visiting inappropriate websites. B) Email attachments. C) USB/Pendrives. D) All of the above. Show Answer Correct Answer: D) All of the above. 17. You have been sent an Email form the bank. However, the logo doesn't look right. What could this be A) Phishing. B) Worm. C) Trojan. D) Malware. Show Answer Correct Answer: A) Phishing. 18. In system hacking, which of the following is the most crucial activity? A) Cracking passwords. B) Covering tracks. C) Information gathering. D) None of the above. Show Answer Correct Answer: A) Cracking passwords. 19. When visiting a website, you notice a lock icon next to the web address. What does the lock represent? A) A link to open another site. B) A webpage that has a secure connection. C) A program that prevents you from leaving the page. D) A warning that you are not allowed to view this webpage. Show Answer Correct Answer: B) A webpage that has a secure connection. 20. A user reports that nothing happens when the power button is pressed. The user report to the technician that none of the cables are loose and that the other items on the power strip are functioning properly. Which of the following is the issue? A) The PC has been infected with a virus. B) The user is pressing the monitor power button. C) EMI is preventing power from reaching the pc. D) The network is currently down. Show Answer Correct Answer: B) The user is pressing the monitor power button. 21. What is the hidden email address on the hacker's profile page? A) [email protected]. B) [email protected]. C) [email protected]. D) [email protected]. Show Answer Correct Answer: A) [email protected]. 22. Full form of SSL & TLS certificate protocols A) SSL-Secure Sockets LayerTLS:Transfer Layer Security. B) SSL-Secure Social LayerTLS:Transfer Layer Security. C) SSL-Secure Social LayerTLS:Transport Layer Security. D) SSL-Secure Sockets LayerTLS:Transport Layer Security. Show Answer Correct Answer: D) SSL-Secure Sockets LayerTLS:Transport Layer Security. 23. Identity theft only occurs to ..... A) Adults and Old People. B) Youth. C) People with firewalls installed on their computers. D) All of the answers listed. Show Answer Correct Answer: D) All of the answers listed. 24. Attack on a network by flooding it with useless traffic to make the network down and unusable A) Denial Of Service (DOS) Attack. B) Dictionary Attack. C) Trojan Attack. D) Virus Attack. Show Answer Correct Answer: A) Denial Of Service (DOS) Attack. 25. What is The capturing and storing of computer and user events. A) Accounting. B) Logging. C) Multifactor authentication. D) SSO. Show Answer Correct Answer: B) Logging. 26. As per IS Policy of the Bank which of the following is not the essence of second line of defense associated with IT risks A) Facilitate. B) Monitor. C) Examine. D) Assess. Show Answer Correct Answer: C) Examine. 27. What is the foundational protocol suite of the Internet and most modern networks? A) File Transfer Protocol (FTP). B) Transmission Control Protocol/Internet Protocol (TCP/IP). C) Hypertext Transfer Protocol (HTTP). D) Simple Mail Transfer Protocol (SMTP). Show Answer Correct Answer: B) Transmission Control Protocol/Internet Protocol (TCP/IP). 28. Which of the following is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information? A) Website attack. B) MiTM attack. C) Phishing attack. D) DoS attack. Show Answer Correct Answer: C) Phishing attack. 29. What is selection in an algorithm? A) The point where decisions are made in an algorithm. B) Choosing the best programming language. C) Sorting data in ascending order. D) Removing unnecessary steps from an algorithm. Show Answer Correct Answer: A) The point where decisions are made in an algorithm. 30. Retreieve emails from server A) IMAP. B) FTP. C) HTTP. D) SMTP. Show Answer Correct Answer: A) IMAP. 31. When you enter personal details on social networking sites you should never: A) Enter personal details of your friends. B) Upload photographs of yourself that you would not want everyone to see. C) Enter your address. D) Enter any of the above. Show Answer Correct Answer: D) Enter any of the above. 32. After a long and hard day, you decide to relax and purchase some concert tickets online. Alas, the website doesn't seem to be working as you cannot get through, which is often the case. This is commonly the result of a- A) Ransomware Attack. B) Malware Attack. C) DDoS Attack. D) Spear-Phishing Attack. Show Answer Correct Answer: C) DDoS Attack. 33. Which command is used to change directory in a command-line interface? A) Dir. B) Cd. C) Chdir. D) Move. Show Answer Correct Answer: B) Cd. 34. Joe, a user, just received a new mobile device. Which of the following will joe be prompted for during device setup? A) Bluetooth pin. B) Power profile. C) Account login information. D) Screen resolution. Show Answer Correct Answer: C) Account login information. 35. Is Importance of Risk Management in Information Security typically defined as the process of identifying, analyzing, and responding to risks.This process is not meant to end; as long as information exists, it will need protecting. A) TRUE. B) FALSE. C) All the above. D) None of the above. Show Answer Correct Answer: A) TRUE. 36. ..... is a characteristic of information security that ensures the nondisclosure of data except to another authorized person. A) Accessibility. B) Availability. C) Confidentiality. D) Integrity. Show Answer Correct Answer: C) Confidentiality. 37. Voice or Phone Call Phishing is called ..... A) Whaling. B) Spear Phishing. C) Smishing. D) Vishing. Show Answer Correct Answer: D) Vishing. 38. What is the primary role of companies like Google, Facebook, and LinkedIn in the cybersecurity domain? A) Developing computer games. B) Collecting and utilizing massive amounts of user data. C) Creating early computer systems. D) Conducting cybersecurity research. Show Answer Correct Answer: B) Collecting and utilizing massive amounts of user data. 39. We need to ..... our data A) Scan. B) Safe keep. C) Secure. D) Protect. Show Answer Correct Answer: C) Secure. 40. What is the main goal of contact spamming? A) To sell products. B) To collect email addresses. C) To sprea malware. D) To gain access to personal contacts. Show Answer Correct Answer: D) To gain access to personal contacts. 41. In the CIA Triad, which one of the following is not involved? A) Availability. B) Confidentiality. C) Integrity. D) Authenticity. Show Answer Correct Answer: D) Authenticity. 42. Which one of the following best describes phishing? A) E-mail with advertisements sent from fraudulent senders. B) E-mail with large file attachments intended to slow down the e-mail server. C) E-mail with malware that tries to use the recipient 's address book for fraudulent purposes. D) E-mail with the intent to trick the recipient into revealing financial details. Show Answer Correct Answer: D) E-mail with the intent to trick the recipient into revealing financial details. 43. Which of the following types of computer or system is most vulnerable to network attacks? A) A desktop computer connected to a wired LAN. B) A laptop computer connected to a public Wi-Fi hotspot. C) A tablet computer connected to a Bluetooth speaker. D) A smartphone connected to a cellular network. Show Answer Correct Answer: B) A laptop computer connected to a public Wi-Fi hotspot. 44. What is the best approach to establishing strong security with passwords? A) Use technology for managing passwords. B) Keep a written log of your passwords. C) Keep passwords short so you can remember them. D) Use the same password for many sites. Show Answer Correct Answer: A) Use technology for managing passwords. 45. Which one of the following describes a computer hacker? A) A skilled programmer who writes programs to train new employees. B) A skilled programmer who uses authorised access to exploit information available on a computer. C) A skilled programmer who secretly invades computers without authorisation. D) A skilled programmer who helps in the installation of new software for an organisation. Show Answer Correct Answer: C) A skilled programmer who secretly invades computers without authorisation. 46. It allow a visited website to store its information about a user on users computer A) Adware. B) Cookies. C) Malware. D) Spam. Show Answer Correct Answer: B) Cookies. 47. What does Chris do after running the scripted install on each laptop for new starters? A) Run a virus scan. B) Install games. C) Get Windows ready and software for the starter. D) Update the laptop's operating system. Show Answer Correct Answer: C) Get Windows ready and software for the starter. 48. In public key cryptosystem which is kept as public? A) Encryption keys. B) Decryption keys. C) Encryption and Decryption keys. D) None of the above. Show Answer Correct Answer: A) Encryption keys. 49. Warna favorit Dylan apa hayo? A) Hitam. B) Biru. C) Hijau. D) Merah. Show Answer Correct Answer: D) Merah. 50. Who created the World Wide Web? A) Joseph licklider. B) Robert Kahn. C) Guido van Rossum. D) Sir Tim berners lee. Show Answer Correct Answer: D) Sir Tim berners lee. 51. Which of the following is NOT a method used by hackers and crackers to gain access? A) Phishing exploits. B) Viruses. C) Dumpster diving. D) Biometrics. Show Answer Correct Answer: D) Biometrics. 52. Berikut teknik yang digunakan untuk menjamin keutuhan data (integrity) ..... A) Digital signature. B) Encryption. C) Data compress. D) Data cloning. Show Answer Correct Answer: A) Digital signature. 53. If you see a pro making fun of a noob you should ..... A) Join in on the fun!. B) Get off the game. C) Stick up for the noob. D) None of the above. Show Answer Correct Answer: C) Stick up for the noob. 54. An ..... document represents a structured collection of security configuration rules for some set of target systems. A) SCAP. B) XCCDF. C) CVSS. D) OVAL. Show Answer Correct Answer: B) XCCDF. 55. Is authentication and authorization refer to same? A) TRUE. B) FALSE. C) All the above. D) None of the above. Show Answer Correct Answer: B) FALSE. 56. Where can you find up-to-date sources of information on specific known hardware and software vulnerabilities? A) Official websites or blogs of hardware and software vendors or developers. B) Online databases or repositories such as CVE, NVD, OWASP, etc. C) Online forums or communities where users share their experiences and solutions. D) All of the above. Show Answer Correct Answer: D) All of the above. 57. Software that collects information about the users in order to advertise. A) Google Docs. B) Batman's Batcomputer. C) GTA 4. D) Spyware. Show Answer Correct Answer: D) Spyware. 58. To cause something to start or happen A) Groom. B) Thrust. C) Trigger. D) None of the above. Show Answer Correct Answer: C) Trigger. 59. Bagaimana cara menjaga keamanan digital? A) Gunakan kata sandi yang kuat. B) Menyebarkan kata sandi. C) Tidak menggunakan perangkat antivirus. D) Menyimpan kata sandi di tempat umum. E) Tidak menggunakan jaringan yang aman. Show Answer Correct Answer: A) Gunakan kata sandi yang kuat. 60. Apa langkah pertama untuk melindungi perangkat dan akun dari upaya ilegal? A) Membiarkan perangkat lunak tidak diperbarui. B) Menonaktifkan firewall agar jaringan lebih cepat. C) Perbarui perangkat lunak secara otomatis. D) Tidak memasang antivirus karena cukup mahal. E) Menggunakan perangkat lunak bajakan. Show Answer Correct Answer: C) Perbarui perangkat lunak secara otomatis. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books