Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 23 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. Which of the following is a compiled language?
2. How do we tighten our security?
3. ..... protects against any attempt to forge or manipulate Kernel text
4. What does a hacker do?
5. Memalsukan tahun kelahiran agar dapat membuat akun sosial media
6. Where do you look for windows logs for investigation?
7. Which of the following are not the benefits associated with computer networks?
8. What kind of issues does Chris assign to team members during the morning meeting?
9. You are using the best practice methodology to troubleshoot a video problem. During which step should you question the obvious?
10. Which is an example of an application of cloud
11. Malware is made to stop your device from running properly and sometimes to steal your information.
12. Many firewalls work with NAT which "hides" internal devices behind an external IP address. What does NAT stand for?
13. Which one of the following helps ensure confidentiality when using instant messaging?
14. What should you do if you suspect your device has been infected with malware?
15. VPN is abbreviated as .....
16. How do you stop SPAM?
17. Apa fungsi utama dari firewall dalam keamanan jaringan?
18. What happens if you report a user to a social media platform?
19. What is the full form of CRW?
20. Which of the following is "personal data" which may be held about someone on the computer system of a supermarket?
21. Teknik keamanan yang melibatkan penggunaan dua atau lebih metode autentikasi untuk memverifikasi identitas pengguna disebut:
22. There is no way to protect your computer from ransomware.
23. While investigating a recent data breach, investigators discovered a RAT on Bart's computer. Antivirus software didn't detect it. Logs show a user with local administrator privileges installed it. Which of the following answer has the BEST change of preventing this from happening again in the future?
24. Which of the following is the BEST way to verify an Internet connection on a wireless device?
25. You turn on a desktop computer and it fails to boot. You hear a rhythmic ticking coming from inside the case. What is most likely the problem?
26. Which of these is the ransomware that affected the NHS and many computers around the world?
27. Which of the following is not effective in preventing malware infections?
28. A word meaning "a system of rules or official procedure"
29. What is a standalone computer?
30. How does the speaker suggest individuals should view cybersecurity?
31. The initial phase of ethical hacking is?
32. An organization that provides access to the internet, such as cable, providers (Spectrum, Comcast, AT&T, Xfinity)
33. Define ransomware.
34. Should you avoid sharing private information online?
35. What is the primary function of the Network Layer in the OSI Model?
36. Which of the following is not an example of physical data leakage?
37. Which of the following file types are used for audio?
38. Which one of the following is NOT a characteristic of adware?
39. What is the full form of RPA?
40. Which one of the following can protect a computer from the risk of unwanted emails?
41. Software designed to infiltrate or damage a computer system without the owner's consent or knowledge.
42. Aaryan hacked the ICICI bank network and stole all the moneywhat type of hacker ARYAN is
43. In the context of cybersecurity, why is it essential for experts to understand the strategies and motivations of cybercriminals?
44. If the same key is used to encrypt and decrypt a message, this is known as?
45. You have implemented a solution that resolved an audio problem on a laptop computer. Following the best practice methodology, what is the next step to take?
46. A touchpad, joystick, and trackball are all examples of:
47. What is a Business Impact Analysis (BIA)?
48. These are a collective term for malicious spying programs used for secretly monitoring someone's activity and actions over a digital medium.
49. Legitimate software, where they can gain remote control and administration-level access over a system
50. There are ..... stages in the NIST Cyber Security Framework.
51. It help prevent attackers from monitoring or recording traffic between resources and computers, by making data more difficult to read.
52. Which of the following refers to the violation of the principle if a computer is no more accessible?
53. The law states that:
54. Having individuals provide personal information to obtain a free offer provided through the Internet is considered what type of social engineering?
55. A touch screen can replace which of the following devices?
56. Imagine you work for the finance department of a company. You received an email from your company's CEO and they want you to immediately transfer a few millions to a bank account provided in the email. Will you execute the transaction?
57. ..... is a cyber security measure that involves setting up an intentionally compromised computer system allowing attackers to exploit vulnerabilities so as to improve security policies.
58. I am a program or piece of code that makes the computer run against yourinstructions. Who am I?
59. In a TCP three-way handshake, what is the correct order of packets exchanged?
60. Organisations can use dictionaries to screen passwords during the reset process and thus guard against easy-to-guess passwords.