Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 22 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. What are the common types of Firewall architectures?
2. Management at your organization wants to add a cloud-based service to filter all traffic going to or from the Internet from internal clients. At a minimum, the solution should include URL filtering, DLP protection, and malware detection and filtering.Which of the following will BEST meet these requirements?
3. What does the modern notion of confidentiality include?
4. What is the abbreviation for CIA?
5. You want to download and watch a music video! Which website will you trust?
6. What is an example of a cyber crime?
7. Which of the following are considered upper level languages?
8. Biggest social media platform in the world is
9. An Antivirus protects you from all attacks
10. In Cryptography ..... is Chiper.
11. Program that hides in a computer and allows someone from a remote location to take full control of the computer.
12. What should you do if you accidentally click on a suspicious link?
13. Your company hired a pen tester as a contractor to conduct a security assessment of your network in order to meet rigorous PCI DSS standards.What type of hacker best describes the pen tester?
14. In a company, what is the primary goal of confidentiality in cyber security when Ethan, an authorized employee, accesses sensitive project data?
15. What is a VPN and why is it used?
16. Which of the following is not done by cyber criminals?
17. Why is A.I dangerous
18. What is a common method to ensure data confidentiality?
19. Which one of the following describes why it is important to have a a secure off-site backup copy of files?
20. Data disposal techniques
21. Which of the following is a type of software that allows users to browse and access websites on the internet?
22. What is the term used to describe a cybercrime where an attacker sends emails that appear to be from a ..... source?
23. Which database is queried by whois?
24. As per IS policy of the Bank, is it allowed to utilize mobile hotspot on an office laptop in office premises?
25. Password attacks are done by guessing ..... passwords
26. The passive gathering of information about a potential victim.
27. What is this a description of?A person or business that has a presence online (website or social media) that can be found using a search engine.
28. Which of the following is a reason to turn off connectivity method(e.g., WIFI, Bluetooth, NFC) while not in use?
29. What are the potential risks of unsafe internet browsing?
30. What are the key skills needed for a career in Cyber Security?
31. If you find a USB memory stick then you should
32. Which one of the following can be used to reduce the risk of computer theft?
33. Why should we keep our passwords secret?
34. Which kind of personal information do people send over the Internet?
35. Cybercrime can be categorised into .....
36. Which virus spread in application software?
37. Why should you avoid clicking on pop-up ads online?
38. Wifi networks in random hotels, coffee shops, restaurants and mall are untrusted networks. Be careful when using these with work-related data.
39. What should you do when you suddenly noticed a program in your computer you do not remember installing?
40. Sharing otp with strangers is not safe
41. Which of the following describes a DoS attack?
42. What cybersecurity measure can help protect against unauthorized physical access to sensitive equipment?
43. Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?
44. Which of these is NOT a good password?
45. Email confirmation
46. What does Cybersecurity mean?
47. Trojan is a type of
48. When do you need to use anti-virus software.
49. Which of these is the most secure wifi username?
50. You have seen an error "SSL/TLS Handshake Failure" in your device. What might be the possible reason for the same?
51. An online shopping website want to track user purchase. The website commonly user data file to store purchasing history. These files are commonly know as:
52. You have taken photos of your friend in his birthday party, you want to share photos of you both on your Facebook page. what should you do?
53. Indicate whether the statement is true or false. 5. Impersonation is a technique used in social engineering.
54. What does Chris do in the morning meeting with the IoT department?
55. Which of these isn't a cyber crime
56. Fiber optic cables consist of very fine strands of glass transmitting data via
57. Which of the following is not an information source over the internet for target attackers?
58. A technician has installed a new OS. Which of the is the best practice after all automatic updates and drivers have been install?
59. Authentication Requirements
60. What is the role of a VPN in online privacy?