This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 24 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 24 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. What one is a type of verification? A) CAPTCHA. B) Trojan Horse. C) Phishing. D) VERY. Show Answer Correct Answer: A) CAPTCHA. 2. How did the reporters gain access to peoples voicemail in mobile phone hacking scandal in 2012? A) They hacked their computers. B) They tried using the default PIN number which was frequently unchanged. C) They used white box testing. D) They spoke to the victoms. Show Answer Correct Answer: B) They tried using the default PIN number which was frequently unchanged. 3. Which one of the following best describes a one-time password? A) A password that is valid only for a specific date and time. B) A password that is valid for only one login session. C) A password that is used when restarting a computer. D) A password that is used when encrypting e-mail messages. Show Answer Correct Answer: B) A password that is valid for only one login session. 4. Why is Cyber Security Important? The Stakes are High A) Cyber security is not necessary for personal devices. B) Cyber security is important to protect sensitive information and maintain trust in digital systems. C) Cyber security is only important for large corporations. D) Cyber security is primarily about physical security measures. Show Answer Correct Answer: B) Cyber security is important to protect sensitive information and maintain trust in digital systems. 5. Anti-virus will have full control of management of ..... A) Websites. B) System. C) Network traffic. D) Viruses. Show Answer Correct Answer: C) Network traffic. 6. Which of the following monitors the individual user accounts' activities i.e., access to malicious domains/web sites etc. in RBI? A) Firewall. B) End Point Protection & Monitoring. C) ISOC-Privilege Identity Management (PIM). D) ISOC-Database Activity Monitoring (DAM). Show Answer Correct Answer: C) ISOC-Privilege Identity Management (PIM). 7. What does Chris do outside work at the Blackburn site? A) Play sports. B) Assess network management. C) Go shopping. D) Attend concerts. Show Answer Correct Answer: B) Assess network management. 8. Strategic and tactical capability of the organization to plan for and respond to incidents and business disruptions in order to continue business operations at an acceptable predefined level A) Strategic Planning. B) Risk Management. C) Live Drill. D) Business Continuity. Show Answer Correct Answer: D) Business Continuity. 9. Kepanjangan CIA sebagai parameter umum dari keamanan informasi, adalah ..... A) Confidentality, Information, Accessibility. B) Confidentality, Integrity, Availability. C) Confidentiality, Integrity, Availability. D) Confidentality, Integrtity, Accessibility. Show Answer Correct Answer: C) Confidentiality, Integrity, Availability. 10. Apa itu Mailist? A) Layanan yang bisa digunakan untuk berkomunikasi dengan orang asing saja. B) Layanan untuk berbelanja online. C) Yang memudahkan pembayaran online. D) Layanan yang digunakan untuk berdiskusi dalam suatu komunikasi atau organisasi. E) Bentuk Pelayanan pemerintah terhadap masyarakatnya dengan memanfaatkan teknologi informasi. Show Answer Correct Answer: D) Layanan yang digunakan untuk berdiskusi dalam suatu komunikasi atau organisasi. 11. What is the purpose of two-factor authentication? A) To make passwords easier to remember. B) To provide an additional layer of security. C) To eliminate the need for passwords. D) To allow multiple users to access an account. Show Answer Correct Answer: B) To provide an additional layer of security. 12. The Transport layer data is called ..... A) Data. B) Packet. C) Frame. D) Segment. Show Answer Correct Answer: D) Segment. 13. What's a trojan virus? A) A virus disguised as a worm. B) A virus disguised as a virus. C) A virus disguised as a gift. D) It tricks people into thinking it's nasty. Show Answer Correct Answer: C) A virus disguised as a gift. 14. Unauthorized copying of software for personal use. A) Hacking. B) Capy and Paste. C) Piracy. D) Modding. Show Answer Correct Answer: C) Piracy. 15. Which of the following URLs could NOT be used in a so called 'Typosquatting Attack'? A) Http://microsoft.com. B) Http://mircosoft.com. C) Http://miroosoft.com. D) All of the above. Show Answer Correct Answer: A) Http://microsoft.com. 16. Managers within your organization want to implement a secure boot for some key computers. During the boot process, each computer should send data to a remote system to check the computer's configuration.Which of the following will meet this goal? A) Hardware root of trust. B) Tokenization. C) Trusted Platform Module. D) Remote attestation. Show Answer Correct Answer: D) Remote attestation. 17. Which of the following three is the strongest password? A) 1qaz2wsx. B) Mango. C) TrEEGCv-. D) Starwars. Show Answer Correct Answer: C) TrEEGCv-. 18. What are some ways to protect your data online? A) Using the same password for all accounts. B) Using strong, unique passwords, enabling two-factor authentication, being cautious of phishing attempts, keeping software and antivirus programs up to date, and using a virtual private network (VPN) when accessing public Wi-Fi. C) Sharing passwords with friends and family. D) Clicking on random links in emails. Show Answer Correct Answer: B) Using strong, unique passwords, enabling two-factor authentication, being cautious of phishing attempts, keeping software and antivirus programs up to date, and using a virtual private network (VPN) when accessing public Wi-Fi. 19. Which of the following is the term for a hacker who probes a system for weaknesses and provides that information back to the organization? A) Red hat hacker. B) Black hat hacker. C) Gray hat hacker. D) White hat hacker. Show Answer Correct Answer: D) White hat hacker. 20. Which protocol is responsible for secure remote login and communication over an unsecured network? A) SSH. B) FTP. C) SNMP. D) Telnet. Show Answer Correct Answer: A) SSH. 21. Malware gets propagated rhrough networks and technologies like? A) SMS. B) Bluetooth. C) Wireless. D) All of these above. Show Answer Correct Answer: D) All of these above. 22. What does malicious mean? A) Something intended to do harm. B) Something good. C) Something that makes you ill. D) Tasty. Show Answer Correct Answer: A) Something intended to do harm. 23. Which of these ISN'T something a virus is capable of? A) Spreading by itself. B) Corrupting files. C) Deleting files. D) Copying files. Show Answer Correct Answer: A) Spreading by itself. 24. Which law was created to protect your health care data? A) HIPAA. B) COPPA. C) GLBA. D) ECPA. Show Answer Correct Answer: A) HIPAA. 25. An example of social engineering. A) Worms. B) Telephone IVR phising. C) Trojan Horses. D) Viruses. Show Answer Correct Answer: B) Telephone IVR phising. 26. Your friend asks you if you want to swap Facebook accounts online. Should you do it? A) Yes. B) No. C) All the above. D) None of the above. Show Answer Correct Answer: B) No. 27. True or False:Learning computer science or coding is only useful if you want to become a professional programmer A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 28. Keys to encrypt and decrypt data A) Private. B) Private and protected. C) Public and protected. D) Public and Private. Show Answer Correct Answer: D) Public and Private. 29. An attempt to harm, damage or cause threat to a system or network is broadly termed as ..... A) System hijacking. B) Cyber-crime. C) Digital crime. D) Cyber Attack. Show Answer Correct Answer: D) Cyber Attack. 30. What is Chris's current role? A) IT Support Technician. B) Software Developer. C) Data Analyst. D) Network Engineer. Show Answer Correct Answer: A) IT Support Technician. 31. Which is NOT illegal A) Adware. B) DDos. C) Trojan Horse. D) Virus. Show Answer Correct Answer: A) Adware. 32. Should you update Windows patches and Antiviruses whenever given an option to prevent malware and hacking? A) False. B) True. C) All the above. D) None of the above. Show Answer Correct Answer: B) True. 33. What do we use a SPAM filter for? A) To prevent common scams. B) To arrange emails in order by name. C) To scan an email for viruses. D) To attach a file to an email. Show Answer Correct Answer: A) To prevent common scams. 34. How can we identify a secure website? A) Look for a URL that starts with 'http://'. B) Check for a padlock icon in the address bar and a URL that starts with 'https://'. C) Ignore the URL and focus on the website design. D) All websites are secure by default. Show Answer Correct Answer: B) Check for a padlock icon in the address bar and a URL that starts with 'https://'. 35. Your password is 1Vu*cI!8sT.Which attack method is your password vulnerable to? A) Brute force. B) Dictionary. C) Spidering. D) Rainbow table. Show Answer Correct Answer: A) Brute force. 36. Which one of the following is a potential danger when using social networking sites? A) Grooming. B) Encrypting. C) Scrolling. D) Scanning. Show Answer Correct Answer: A) Grooming. 37. Which of these is a sign of a scam website? A) HTTPS in the address. B) Grammar mistakes and too many pop-ups. C) A padlock icon. D) Real contact info and reviews. Show Answer Correct Answer: B) Grammar mistakes and too many pop-ups. 38. Which one of the following best describes cybercrime? A) Broadband connection with little or no access to the Internet. B) Theft of computers, smartphones or other devices. C) Repeated failed attempts to log on to a computer. D) Illegal activities by means of computer networks. Show Answer Correct Answer: D) Illegal activities by means of computer networks. 39. Which of the following is a sign of a possible malware attack? A) A new toolbar appears on your browser. B) You see a lot of pop-up adverts even when you're offline. C) Your hard disk is working overtime but you're not doing anything. D) Any of the above. Show Answer Correct Answer: D) Any of the above. 40. Typically, what level of access would a student in a school have on the network? A) Access to all folders on the network. B) Full access. C) Access to own documents and the internet. D) Access to all printers. Show Answer Correct Answer: C) Access to own documents and the internet. 41. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information? A) Computer security. B) Digital hacking. C) Cryptography. D) Cyber attack. Show Answer Correct Answer: D) Cyber attack. 42. Cybersecurity encompass the full range of? A) Vulnerability reduction. B) Incident response. C) Recovery policies. D) All of the above. Show Answer Correct Answer: D) All of the above. 43. How many layers does the OSI reference model have? A) 4. B) 7. C) 6. D) 5. Show Answer Correct Answer: B) 7. 44. The technology, process or people that protect networks and devices from attack, damage, or unauthorized access A) Cyber Security. B) White Hat Hacker. C) Domain Name Server. D) All of the above. Show Answer Correct Answer: A) Cyber Security. 45. When you inform your parents what action would they take? A) They will not let you use the computer. B) They will get Cyber Secured. C) They will close the website. D) They will ignore you. Show Answer Correct Answer: B) They will get Cyber Secured. 46. CIA triads is often represented by which of the following? A) Circle. B) Ellipse. C) Square. D) Triangle. Show Answer Correct Answer: D) Triangle. 47. Multi-level security might include both physical access control and electronic security. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 48. Apa manfaat utama dari menggunakan verifikasi dua langkah pada akun online? A) Melindungi perangkat dari malware. B) Mengamankan data pribadi di server perusahaan. C) Membuat kata sandi lebih mudah diingat. D) Memberikan lapisan keamanan tambahan dengan langkah verifikasi tambahan. Show Answer Correct Answer: D) Memberikan lapisan keamanan tambahan dengan langkah verifikasi tambahan. 49. Which of the following is a common method for securing a wireless network? A) Using an open network with no password. B) Setting a strong WPA2 password. C) Disabling the network SSID broadcast. D) Both setting a strong WPA2 password and disabling the network SSID broadcast. Show Answer Correct Answer: D) Both setting a strong WPA2 password and disabling the network SSID broadcast. 50. Social Engineering is the art of manipulating people to give up confidential information. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 51. How can organizations ensure data privacy? A) Store data in unprotected cloud services. B) Implement strong data encryption and access controls. C) Use weak passwords and share them widely. D) Limit employee access to all data files. Show Answer Correct Answer: B) Implement strong data encryption and access controls. 52. When people send you phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information. A) Plagiarizing. B) Phishing. C) Identity Theft. D) Skimming. Show Answer Correct Answer: B) Phishing. 53. What is the correct syntax for a payload in an XXE (XML External Entity) Injection attack? A) . B) . C) SELECT * FROM Users WHERE username='admin' AND password='xxe'. D) . Show Answer Correct Answer: A) . 54. You have discovered a fix for a broken laptop. Before implementing changes, what should you consider, according to the best practice methodology? A) The user's budget. B) Upgrade feasibility. C) Corporate policies. D) Company reputation. Show Answer Correct Answer: C) Corporate policies. 55. Complete the sentence ..... is type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking users' files unless a ransom is paid. A) Malicious bots. B) Adware. C) Spyware. D) Trojan horse. E) Ransomware. Show Answer Correct Answer: E) Ransomware. 56. Which one of the following is a characteristic of a virus? A) A computer virus can only infect via word processing applications. B) A computer virus can spread from a seemingly normal file. C) A computer virus can be removed with an ordinary Web browser. D) A computer virus can only harm via wireless network access. Show Answer Correct Answer: B) A computer virus can spread from a seemingly normal file. 57. Chat with people online only if you know and trust in real life. True or False? A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 58. Which one of the following does NOT need to have anti-virus software installed? A) A scanner. B) A computer. C) A tablet. D) A smartphone. Show Answer Correct Answer: A) A scanner. 59. What do you mean by 'cloud' in cloud computing? A) A name for its algorithm. B) A metaphor for the Internet. C) A metaphor for storage. D) Refers to the database management of a cloud server. Show Answer Correct Answer: B) A metaphor for the Internet. 60. Which one is a social media platform? A) Wireshark. B) Instagram. C) Linux. D) Firewall. Show Answer Correct Answer: B) Instagram. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books