This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 22 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 22 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. What are the common types of Firewall architectures? A) Firewall Filtering, Application Gateway, Deep Packet Inspection. B) Packet Filtering, Proxy Service, Stateful Inspection, Next-Generation Firewall. C) All the above. D) None of the above. Show Answer Correct Answer: B) Packet Filtering, Proxy Service, Stateful Inspection, Next-Generation Firewall. 2. Management at your organization wants to add a cloud-based service to filter all traffic going to or from the Internet from internal clients. At a minimum, the solution should include URL filtering, DLP protection, and malware detection and filtering.Which of the following will BEST meet these requirements? A) Next-generation SWG. B) Container security. C) Cloud-based segmentation. D) API inspection and integration. Show Answer Correct Answer: A) Next-generation SWG. 3. What does the modern notion of confidentiality include? A) Notice and consent. B) Cloud storage. C) Data mirroring. D) User behavior analytics. Show Answer Correct Answer: A) Notice and consent. 4. What is the abbreviation for CIA? A) Confidentiality Interrogative Available. B) Compromise Investigation Archive. C) Confidentiality Integrity Availability. D) None of the above. Show Answer Correct Answer: C) Confidentiality Integrity Availability. 5. You want to download and watch a music video! Which website will you trust? A) Convertmusic.com. B) Youtube.com. C) Freemusic.com. D) Ytmp3.com. Show Answer Correct Answer: B) Youtube.com. 6. What is an example of a cyber crime? A) Accessing unauthorised data/ using someone's computer without permission. B) Tricking people into downloading malware. C) Creating an account on something you're not old enough for. D) Accessing the DarkWeb. Show Answer Correct Answer: A) Accessing unauthorised data/ using someone's computer without permission. 7. Which of the following are considered upper level languages? A) Assembly, Fortran. B) HTML, CSS, JavaScript, and Python. C) C, C++. D) Binary Code, Machine Code. Show Answer Correct Answer: B) HTML, CSS, JavaScript, and Python. 8. Biggest social media platform in the world is A) YOUTUBE. B) FACEBOOK. C) WHATSAPP. D) ISTAGRAM. Show Answer Correct Answer: B) FACEBOOK. 9. An Antivirus protects you from all attacks A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 10. In Cryptography ..... is Chiper. A) Algorithm for performing encryption & decryption. B) Decrypted message. C) Encrypted message. D) Lock message. Show Answer Correct Answer: A) Algorithm for performing encryption & decryption. 11. Program that hides in a computer and allows someone from a remote location to take full control of the computer. A) Cloud Computer. B) Rootkit. C) Hacker. D) Software. Show Answer Correct Answer: B) Rootkit. 12. What should you do if you accidentally click on a suspicious link? A) Inform your IT or Cyber Security team immediately. B) Turn off the monitor. C) Just Ignore and Its already done, now nothing can be done. D) Restart the computer. Show Answer Correct Answer: A) Inform your IT or Cyber Security team immediately. 13. Your company hired a pen tester as a contractor to conduct a security assessment of your network in order to meet rigorous PCI DSS standards.What type of hacker best describes the pen tester? A) Authorized. B) Non-authorized. C) Semi authorized. D) None of the above. Show Answer Correct Answer: C) Semi authorized. 14. In a company, what is the primary goal of confidentiality in cyber security when Ethan, an authorized employee, accesses sensitive project data? A) To protect systems from malware. B) To monitor data usage. C) To speed up data processing. D) To ensure that only authorized users like Ethan can access specific data. Show Answer Correct Answer: D) To ensure that only authorized users like Ethan can access specific data. 15. What is a VPN and why is it used? A) A VPN is used to control the weather. B) A VPN is used to communicate with aliens. C) A VPN is used to order food online securely. D) A VPN is used to create a secure connection to another network over the internet, encrypting data for privacy and security. Show Answer Correct Answer: D) A VPN is used to create a secure connection to another network over the internet, encrypting data for privacy and security. 16. Which of the following is not done by cyber criminals? A) Unauthorized account access. B) Mass attack using Trojans as botnets. C) Email spoofing and spamming. D) Report vulnerability in any system. Show Answer Correct Answer: D) Report vulnerability in any system. 17. Why is A.I dangerous A) Because it stops creativity and thinking in humans. B) Because it is very helpful. C) Because it helps in e-commerce. D) Because it is artificial. Show Answer Correct Answer: A) Because it stops creativity and thinking in humans. 18. What is a common method to ensure data confidentiality? A) Encryption. B) Load balancing. C) Data scrubbing. D) Bandwidth throttling. Show Answer Correct Answer: A) Encryption. 19. Which one of the following describes why it is important to have a a secure off-site backup copy of files? A) To speed up the process of accessing the files at any time. B) To improve accessible of files from other locations. C) To prevent the loss of data in the event of a fire. D) O reduce the possibility of data theft. Show Answer Correct Answer: C) To prevent the loss of data in the event of a fire. 20. Data disposal techniques A) 2. B) 3. C) 4. D) 6. Show Answer Correct Answer: B) 3. 21. Which of the following is a type of software that allows users to browse and access websites on the internet? A) Web browser. B) Operating system. C) Search engine. D) Spreadsheet software. Show Answer Correct Answer: A) Web browser. 22. What is the term used to describe a cybercrime where an attacker sends emails that appear to be from a ..... source? A) Virus. B) Trusted. C) Phishing. D) Known. Show Answer Correct Answer: B) Trusted. 23. Which database is queried by whois? A) ICANN. B) APNIC. C) ARIN. D) DNS. Show Answer Correct Answer: A) ICANN. 24. As per IS policy of the Bank, is it allowed to utilize mobile hotspot on an office laptop in office premises? A) Yes. B) No. C) All the above. D) None of the above. Show Answer Correct Answer: B) No. 25. Password attacks are done by guessing ..... passwords A) Pishing. B) Numerical. C) Easy. D) Common. Show Answer Correct Answer: D) Common. 26. The passive gathering of information about a potential victim. A) Social Engineering. B) Reconnaissance. C) Pretexting. D) Impersonation. Show Answer Correct Answer: B) Reconnaissance. 27. What is this a description of?A person or business that has a presence online (website or social media) that can be found using a search engine. A) Digital footprint. B) Voice recognition. C) Digital thumbprint. D) Digital recognition. Show Answer Correct Answer: A) Digital footprint. 28. Which of the following is a reason to turn off connectivity method(e.g., WIFI, Bluetooth, NFC) while not in use? A) To improve cellular data reception. B) TO prevent exceeding the data cap. C) To limit the amount of background data being transmitted. D) To keep the device cooler. Show Answer Correct Answer: C) To limit the amount of background data being transmitted. 29. What are the potential risks of unsafe internet browsing? A) Financial gain. B) Physical injury. C) Improved mental health. D) Malware, phishing, identity theft, exposure to inappropriate content. Show Answer Correct Answer: D) Malware, phishing, identity theft, exposure to inappropriate content. 30. What are the key skills needed for a career in Cyber Security? A) Knowledge of social media marketing. B) Key skills needed for a career in Cyber Security include technical skills in networking, operating systems, security protocols, programming, risk assessment, incident response, and soft skills like problem-solving and communication. C) Project management experience. D) Graphic design skills. Show Answer Correct Answer: B) Key skills needed for a career in Cyber Security include technical skills in networking, operating systems, security protocols, programming, risk assessment, incident response, and soft skills like problem-solving and communication. 31. If you find a USB memory stick then you should A) Wipe it to get rid of any harmful software. B) Scan it for viruses. C) Give it to your IT team. D) Leave it for 48 hours to decontaminate. Show Answer Correct Answer: C) Give it to your IT team. 32. Which one of the following can be used to reduce the risk of computer theft? A) Cable lock. B) Spyware. C) System updates. D) Trojans. Show Answer Correct Answer: A) Cable lock. 33. Why should we keep our passwords secret? A) To make it easier to remember them later. B) To share them with friends for fun. C) To allow others to access our accounts easily. D) We should keep our passwords secret to prevent unauthorized access to our accounts and protect our personal information. Show Answer Correct Answer: D) We should keep our passwords secret to prevent unauthorized access to our accounts and protect our personal information. 34. Which kind of personal information do people send over the Internet? A) Credit Card Numbers. B) Contact Information. C) Medical Information. D) All of above. Show Answer Correct Answer: D) All of above. 35. Cybercrime can be categorised into ..... A) 2. B) 4. C) 3. D) 6. Show Answer Correct Answer: A) 2. 36. Which virus spread in application software? A) Boot virus. B) Macro virus. C) Anti virus. D) File virus. Show Answer Correct Answer: B) Macro virus. 37. Why should you avoid clicking on pop-up ads online? A) They are not colorful. B) They are boring. C) They might contain viruses or scams. D) They are fake. Show Answer Correct Answer: C) They might contain viruses or scams. 38. Wifi networks in random hotels, coffee shops, restaurants and mall are untrusted networks. Be careful when using these with work-related data. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 39. What should you do when you suddenly noticed a program in your computer you do not remember installing? A) Keep it. B) Report to IT. C) Uninstall it. D) None of the above. Show Answer Correct Answer: B) Report to IT. 40. Sharing otp with strangers is not safe A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 41. Which of the following describes a DoS attack? A) Listening in on network traffic to identify the MAC address of a computer. B) Injecting bogus networking re-configuration commands. C) Continually bombarding a targeted network with fake requests. D) Forcing computers to drop their connections and reconnect with the attacker's access point. Show Answer Correct Answer: C) Continually bombarding a targeted network with fake requests. 42. What cybersecurity measure can help protect against unauthorized physical access to sensitive equipment? A) Data encryption. B) Virtual Private Network (VPN). C) Biometric authentication. D) DDoS protection. Show Answer Correct Answer: C) Biometric authentication. 43. Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user? A) Ip tracker. B) Websites. C) Web pages. D) Emails. Show Answer Correct Answer: B) Websites. 44. Which of these is NOT a good password? A) Password. B) #LooneyToons23. C) #Iasw, aA!. D) Ilovecats!95. Show Answer Correct Answer: A) Password. 45. Email confirmation A) A combination of facial recognition, iris recognition and finger prints. B) Encrypt data. C) Is used to check that users are using their real email address in the registration process. D) Works by measuring how far apart, relative to one another, your eyes, jaw, nose and cheekbones are. Show Answer Correct Answer: C) Is used to check that users are using their real email address in the registration process. 46. What does Cybersecurity mean? A) To be protected against harmful and/or unlawful acts on your computer or within your personal data. B) The name of a famous virus that infected 45 million computers. C) To participate in social networking. D) A resource for storing information. Show Answer Correct Answer: A) To be protected against harmful and/or unlawful acts on your computer or within your personal data. 47. Trojan is a type of A) Computer Virus. B) Application Software. C) High Level Program. D) Anti-Virus. Show Answer Correct Answer: A) Computer Virus. 48. When do you need to use anti-virus software. A) When you are sick. B) When you are a doctor and give appointments. C) When you buy your first computer. D) All the time, in all devices and wireless connections to protect your devices. Show Answer Correct Answer: D) All the time, in all devices and wireless connections to protect your devices. 49. Which of these is the most secure wifi username? A) WiFi. B) HiWiFi. C) HelloWiFi. D) Doesn't matter. Show Answer Correct Answer: D) Doesn't matter. 50. You have seen an error "SSL/TLS Handshake Failure" in your device. What might be the possible reason for the same? A) Internet failure. B) Disconnection of VPN. C) Incorrect date and time in the device. D) Malware. Show Answer Correct Answer: C) Incorrect date and time in the device. 51. An online shopping website want to track user purchase. The website commonly user data file to store purchasing history. These files are commonly know as: A) Logs. B) Script. C) Widgets. D) Cookie. Show Answer Correct Answer: D) Cookie. 52. You have taken photos of your friend in his birthday party, you want to share photos of you both on your Facebook page. what should you do? A) Ask him for permission before I post them. B) Do not share the photos. C) Share them without his permission. D) None of the above. Show Answer Correct Answer: A) Ask him for permission before I post them. 53. Indicate whether the statement is true or false. 5. Impersonation is a technique used in social engineering. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 54. What does Chris do in the morning meeting with the IoT department? A) Reviewing financial reports. B) Planning office parties. C) Discussing sports events. D) Assigning tickets to team members. Show Answer Correct Answer: D) Assigning tickets to team members. 55. Which of these isn't a cyber crime A) Tricking people into downloading malware. B) Accessing unauthorised data/ using someones computer without permission. C) Creating an account on something you're not old enough for. D) Accessing the DarkWeb. Show Answer Correct Answer: D) Accessing the DarkWeb. 56. Fiber optic cables consist of very fine strands of glass transmitting data via A) Magnetic pulses. B) Light pulses. C) Electricity. D) None of the above. Show Answer Correct Answer: B) Light pulses. 57. Which of the following is not an information source over the internet for target attackers? A) YouTube. B) Archive sites. C) Nslookup. D) Whois. Show Answer Correct Answer: A) YouTube. 58. A technician has installed a new OS. Which of the is the best practice after all automatic updates and drivers have been install? A) Installing the imaging software. B) Installing the password manager. C) Installing the security software. D) Installing addition browser. Show Answer Correct Answer: C) Installing the security software. 59. Authentication Requirements A) Disclosure. B) Content Modification. C) Masquerade. D) All of the given options. Show Answer Correct Answer: D) All of the given options. 60. What is the role of a VPN in online privacy? A) To encrypt internet traffic and hide the user's IP address. B) To increase the speed of internet connections. C) To store user data securely. D) To provide free internet access. Show Answer Correct Answer: A) To encrypt internet traffic and hide the user's IP address. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books