This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 23 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 23 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. Which of the following is a compiled language? A) Ruby. B) JavaScript. C) C. D) Python. Show Answer Correct Answer: C) C. 2. How do we tighten our security? A) Use strong password. B) Use firewalls. C) Log-off personal account when not in use. D) Update anti-virus software. E) All of the above. Show Answer Correct Answer: E) All of the above. 3. ..... protects against any attempt to forge or manipulate Kernel text A) Page Table Protection (PTP). B) Kernel Data Protection (KDP). C) Kernel Text Protection (KTP):. D) Control Flow Protection (CFP). Show Answer Correct Answer: C) Kernel Text Protection (KTP):. 4. What does a hacker do? A) Paint walls. B) Steal or protect data. C) Drive cars. D) Cook food. Show Answer Correct Answer: B) Steal or protect data. 5. Memalsukan tahun kelahiran agar dapat membuat akun sosial media A) Benar. B) Salah. C) All the above. D) None of the above. Show Answer Correct Answer: B) Salah. 6. Where do you look for windows logs for investigation? A) Event logs. B) Audit logs. C) Firewall logs. D) IDS logs. Show Answer Correct Answer: A) Event logs. 7. Which of the following are not the benefits associated with computer networks? A) Higher speed. B) Reduced cost. C) Distributed software and hardware management. D) Enahanced security. Show Answer Correct Answer: D) Enahanced security. 8. What kind of issues does Chris assign to team members during the morning meeting? A) Only network issues. B) Only complex issues. C) Both simple and complex issues. D) Only simple issues. Show Answer Correct Answer: C) Both simple and complex issues. 9. You are using the best practice methodology to troubleshoot a video problem. During which step should you question the obvious? A) Establish a plan of action to resolve the problem. B) Establish a theory of probable cause. C) Identify the problem. D) Test the theory to determine cause. Show Answer Correct Answer: B) Establish a theory of probable cause. 10. Which is an example of an application of cloud A) Paypal. B) Adobe. C) None of them. D) Both a and b. Show Answer Correct Answer: D) Both a and b. 11. Malware is made to stop your device from running properly and sometimes to steal your information. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 12. Many firewalls work with NAT which "hides" internal devices behind an external IP address. What does NAT stand for? A) Network alternate translation. B) Network auto transit. C) Network administration translation. D) Network address translation. E) Network address transition. Show Answer Correct Answer: D) Network address translation. 13. Which one of the following helps ensure confidentiality when using instant messaging? A) Enabling cookies in your browser. B) Run adware while messaging. C) Invite unknown users to chat. D) Not revealing personal information. Show Answer Correct Answer: D) Not revealing personal information. 14. What should you do if you suspect your device has been infected with malware? A) Run a full antivirus scan and remove any detected threats. B) Ignore it and continue using the device. C) Share your device with others. D) Reset the device without checking for malware. Show Answer Correct Answer: A) Run a full antivirus scan and remove any detected threats. 15. VPN is abbreviated as ..... A) Virtual Protocol Networking. B) Visual Private Network. C) Virtual Protocol Network. D) Virtual Private Network. Show Answer Correct Answer: D) Virtual Private Network. 16. How do you stop SPAM? A) Delete the email. B) Reply to the SPAM email. C) Tell the police. D) Click unsubscribe. Show Answer Correct Answer: D) Click unsubscribe. 17. Apa fungsi utama dari firewall dalam keamanan jaringan? A) Memindai dan menghapus virus. B) Meng-enkripsi data di jaringan. C) Menyimpan log aktivitas pengguna. D) Mengawasi dan mengontrol lalu lintas jaringan masuk dan keluar berdasarkan aturan keamanan. Show Answer Correct Answer: D) Mengawasi dan mengontrol lalu lintas jaringan masuk dan keluar berdasarkan aturan keamanan. 18. What happens if you report a user to a social media platform? A) Your social media account will be shut down. B) Nothing will happen. C) Their account will definitely be shut down. D) Someone official will look at their account or their post and take appropriate action. Show Answer Correct Answer: D) Someone official will look at their account or their post and take appropriate action. 19. What is the full form of CRW? A) Continuous Web Reader. B) Continuous Wave Radar. C) Continuous Wave Reader. D) Continuous Web Radar. Show Answer Correct Answer: C) Continuous Wave Reader. 20. Which of the following is "personal data" which may be held about someone on the computer system of a supermarket? A) Their address. B) The amount they spent last year at the supermarket. C) Their loyalty card number. D) All of the above. Show Answer Correct Answer: D) All of the above. 21. Teknik keamanan yang melibatkan penggunaan dua atau lebih metode autentikasi untuk memverifikasi identitas pengguna disebut: A) Otentikasi Dua Faktor (2FA). B) Enkripsi End-to-End. C) Tokenisasi. D) Penyaringan Konten. Show Answer Correct Answer: A) Otentikasi Dua Faktor (2FA). 22. There is no way to protect your computer from ransomware. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 23. While investigating a recent data breach, investigators discovered a RAT on Bart's computer. Antivirus software didn't detect it. Logs show a user with local administrator privileges installed it. Which of the following answer has the BEST change of preventing this from happening again in the future? A) Enforce an application allow list. B) Enforce an application block list. C) Implement a BYOD policy. D) Implement a DLP policy. Show Answer Correct Answer: A) Enforce an application allow list. 24. Which of the following is the BEST way to verify an Internet connection on a wireless device? A) Verify the wireless network name. B) Launch an application. C) Send and retrieve recent webmail. D) Look for the WIFI symbol on the device. Show Answer Correct Answer: D) Look for the WIFI symbol on the device. 25. You turn on a desktop computer and it fails to boot. You hear a rhythmic ticking coming from inside the case. What is most likely the problem? A) Failed hard drive. B) Failed RAM. C) Failed motherboard. D) Failed CPU. Show Answer Correct Answer: A) Failed hard drive. 26. Which of these is the ransomware that affected the NHS and many computers around the world? A) WannaWeep. B) WannaCry. C) WannaGreet. D) WannaBanana. Show Answer Correct Answer: B) WannaCry. 27. Which of the following is not effective in preventing malware infections? A) Opening email attachments. B) Turning on Windows Automatic Updates. C) Installing anti-virus software. D) Setting Internet Explorer's security setting to medium-high. Show Answer Correct Answer: A) Opening email attachments. 28. A word meaning "a system of rules or official procedure" A) Protocol. B) Security. C) Firewall. D) Biometrics. E) Encryption. Show Answer Correct Answer: A) Protocol. 29. What is a standalone computer? A) A computer not connected to a network. B) A computer connected to a network. C) A computer without a CPU. D) A portable computer. Show Answer Correct Answer: A) A computer not connected to a network. 30. How does the speaker suggest individuals should view cybersecurity? A) As an unnecessary expense. B) As a tool for enhancing online safety. C) As a complex field only for professionals. D) As a hindrance to online activities. Show Answer Correct Answer: B) As a tool for enhancing online safety. 31. The initial phase of ethical hacking is? A) DNS poisoning. B) Footprinting. C) Enumeration. D) ARP-poisoning. Show Answer Correct Answer: B) Footprinting. 32. An organization that provides access to the internet, such as cable, providers (Spectrum, Comcast, AT&T, Xfinity) A) ISPs. B) TCP. C) TCP/IP. D) IP. Show Answer Correct Answer: A) ISPs. 33. Define ransomware. A) Ransomware is a type of antivirus that protects against malware. B) Ransomware is a software that speeds up computer performance. C) Ransomware is a type of malware that encrypts files and demands a ransom for their release. D) Ransomware is a program that deletes files permanently without warning. Show Answer Correct Answer: C) Ransomware is a type of malware that encrypts files and demands a ransom for their release. 34. Should you avoid sharing private information online? A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 35. What is the primary function of the Network Layer in the OSI Model? A) Facilitates the transfer of data between devices on the same local network. B) Provides logical addressing and routing of data packets. C) Ensures reliable transmission of data across the network. D) Manages the physical connections and signaling between devices. Show Answer Correct Answer: B) Provides logical addressing and routing of data packets. 36. Which of the following is not an example of physical data leakage? A) Phishing. B) Dumpster diving. C) Shoulder surfing. D) Printers and photocopiers. Show Answer Correct Answer: A) Phishing. 37. Which of the following file types are used for audio? A) .flap. B) .rar. C) .aac. D) .mp4. Show Answer Correct Answer: D) .mp4. 38. Which one of the following is NOT a characteristic of adware? A) It shows advertisements on the computer. B) It is impossible to remove from a computer. C) It downloads advertisements to the computer. D) It may place malware on the computer. Show Answer Correct Answer: C) It downloads advertisements to the computer. 39. What is the full form of RPA? A) Robotic Process Automation. B) Robotic Process Access. C) Robotic Process Authorization. D) Robotic Program Automation. Show Answer Correct Answer: A) Robotic Process Automation. 40. Which one of the following can protect a computer from the risk of unwanted emails? A) PC diagnostic software. B) Anti-virus software. C) Anti-spyware software. D) Anti-spam software. Show Answer Correct Answer: B) Anti-virus software. 41. Software designed to infiltrate or damage a computer system without the owner's consent or knowledge. A) Malware. B) Password Attack. C) Replay Attack. D) Denial of Service. Show Answer Correct Answer: A) Malware. 42. Aaryan hacked the ICICI bank network and stole all the moneywhat type of hacker ARYAN is A) Bank stealing hacking. B) Black hat hacker. C) Grey hat hacker. D) White hat hacker. Show Answer Correct Answer: B) Black hat hacker. 43. In the context of cybersecurity, why is it essential for experts to understand the strategies and motivations of cybercriminals? A) To enhance their programming skills. B) To create powerful data domains. C) To develop advanced computer games. D) To effectively defend against cyber threats. Show Answer Correct Answer: D) To effectively defend against cyber threats. 44. If the same key is used to encrypt and decrypt a message, this is known as? A) Symmetric encryption. B) Encryption doesn't exist!. C) Asymmetric encryption. D) Same-key encryption. Show Answer Correct Answer: A) Symmetric encryption. 45. You have implemented a solution that resolved an audio problem on a laptop computer. Following the best practice methodology, what is the next step to take? A) Document findings, actions, and outcomes. B) Establish a plan of action to resolve the problem. C) Review system and application logs. D) Verify full system functionality and, if applicable, implement preventive measures. Show Answer Correct Answer: D) Verify full system functionality and, if applicable, implement preventive measures. 46. A touchpad, joystick, and trackball are all examples of: A) Keyboard. B) Output device. C) Pointing device. D) Consoles. Show Answer Correct Answer: C) Pointing device. 47. What is a Business Impact Analysis (BIA)? A) A tool for document all activities across the business for better understanding. B) A method of challenging preconceptions about service delivery. C) An analysis tool for a building loss. D) A process of analyzing activities and the effect that a business disruption might have upon them. Show Answer Correct Answer: D) A process of analyzing activities and the effect that a business disruption might have upon them. 48. These are a collective term for malicious spying programs used for secretly monitoring someone's activity and actions over a digital medium. A) Remote Access Trojans. B) Malware. C) Spyware. D) Keyloggers. Show Answer Correct Answer: C) Spyware. 49. Legitimate software, where they can gain remote control and administration-level access over a system A) Ransomware. B) Zero Day Exploit. C) DOS Attack. D) Rootkits. Show Answer Correct Answer: D) Rootkits. 50. There are ..... stages in the NIST Cyber Security Framework. A) 6. B) 3. C) 5. D) 4. Show Answer Correct Answer: C) 5. 51. It help prevent attackers from monitoring or recording traffic between resources and computers, by making data more difficult to read. A) Data Encryption. B) Firewall. C) Antivirus. D) None of the above. Show Answer Correct Answer: A) Data Encryption. 52. Which of the following refers to the violation of the principle if a computer is no more accessible? A) Integrity. B) Access control. C) Availability. D) Access control. Show Answer Correct Answer: C) Availability. 53. The law states that: A) Only government organisations can hold personal data about you. B) Personal data held by an organisation must be protected from hackers. C) Personal data must be updated at least once a year. D) All personal data must be encrypted. Show Answer Correct Answer: B) Personal data held by an organisation must be protected from hackers. 54. Having individuals provide personal information to obtain a free offer provided through the Internet is considered what type of social engineering? A) Web-based. B) User-based. C) Human-based. D) Computer-based. Show Answer Correct Answer: D) Computer-based. 55. A touch screen can replace which of the following devices? A) Scanner. B) Printer. C) Keyboard. D) Mouse. Show Answer Correct Answer: C) Keyboard. 56. Imagine you work for the finance department of a company. You received an email from your company's CEO and they want you to immediately transfer a few millions to a bank account provided in the email. Will you execute the transaction? A) Yes, I will do so if my CEO asks me. B) I will only execute the transaction after I got confirmation from the CEO through another channel. C) All the above. D) None of the above. Show Answer Correct Answer: B) I will only execute the transaction after I got confirmation from the CEO through another channel. 57. ..... is a cyber security measure that involves setting up an intentionally compromised computer system allowing attackers to exploit vulnerabilities so as to improve security policies. A) Canary Trap. B) Pseudo-Network. C) Virtual Tap. D) Honeypot. Show Answer Correct Answer: D) Honeypot. 58. I am a program or piece of code that makes the computer run against yourinstructions. Who am I? A) Antivirus. B) Virus. C) All the above. D) None of the above. Show Answer Correct Answer: B) Virus. 59. In a TCP three-way handshake, what is the correct order of packets exchanged? A) SYN-ACK, ACK, SYN. B) SYN, ACK, SYN-ACK. C) ACK, SYN-ACK, SYN. D) SYN, SYN-ACK, ACK. Show Answer Correct Answer: D) SYN, SYN-ACK, ACK. 60. Organisations can use dictionaries to screen passwords during the reset process and thus guard against easy-to-guess passwords. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books