Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 24 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. What one is a type of verification?
2. How did the reporters gain access to peoples voicemail in mobile phone hacking scandal in 2012?
3. Which one of the following best describes a one-time password?
4. Why is Cyber Security Important? The Stakes are High
5. Anti-virus will have full control of management of .....
6. Which of the following monitors the individual user accounts' activities i.e., access to malicious domains/web sites etc. in RBI?
7. What does Chris do outside work at the Blackburn site?
8. Strategic and tactical capability of the organization to plan for and respond to incidents and business disruptions in order to continue business operations at an acceptable predefined level
9. Kepanjangan CIA sebagai parameter umum dari keamanan informasi, adalah .....
10. Apa itu Mailist?
11. What is the purpose of two-factor authentication?
12. The Transport layer data is called .....
13. What's a trojan virus?
14. Unauthorized copying of software for personal use.
15. Which of the following URLs could NOT be used in a so called 'Typosquatting Attack'?
16. Managers within your organization want to implement a secure boot for some key computers. During the boot process, each computer should send data to a remote system to check the computer's configuration.Which of the following will meet this goal?
17. Which of the following three is the strongest password?
18. What are some ways to protect your data online?
19. Which of the following is the term for a hacker who probes a system for weaknesses and provides that information back to the organization?
20. Which protocol is responsible for secure remote login and communication over an unsecured network?
21. Malware gets propagated rhrough networks and technologies like?
22. What does malicious mean?
23. Which of these ISN'T something a virus is capable of?
24. Which law was created to protect your health care data?
25. An example of social engineering.
26. Your friend asks you if you want to swap Facebook accounts online. Should you do it?
27. True or False:Learning computer science or coding is only useful if you want to become a professional programmer
28. Keys to encrypt and decrypt data
29. An attempt to harm, damage or cause threat to a system or network is broadly termed as .....
30. What is Chris's current role?
31. Which is NOT illegal
32. Should you update Windows patches and Antiviruses whenever given an option to prevent malware and hacking?
33. What do we use a SPAM filter for?
34. How can we identify a secure website?
35. Your password is 1Vu*cI!8sT.Which attack method is your password vulnerable to?
36. Which one of the following is a potential danger when using social networking sites?
37. Which of these is a sign of a scam website?
38. Which one of the following best describes cybercrime?
39. Which of the following is a sign of a possible malware attack?
40. Typically, what level of access would a student in a school have on the network?
41. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
42. Cybersecurity encompass the full range of?
43. How many layers does the OSI reference model have?
44. The technology, process or people that protect networks and devices from attack, damage, or unauthorized access
45. When you inform your parents what action would they take?
46. CIA triads is often represented by which of the following?
47. Multi-level security might include both physical access control and electronic security.
48. Apa manfaat utama dari menggunakan verifikasi dua langkah pada akun online?
49. Which of the following is a common method for securing a wireless network?
50. Social Engineering is the art of manipulating people to give up confidential information.
51. How can organizations ensure data privacy?
52. When people send you phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information.
53. What is the correct syntax for a payload in an XXE (XML External Entity) Injection attack?
54. You have discovered a fix for a broken laptop. Before implementing changes, what should you consider, according to the best practice methodology?
55. Complete the sentence ..... is type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking users' files unless a ransom is paid.
56. Which one of the following is a characteristic of a virus?
57. Chat with people online only if you know and trust in real life. True or False?
58. Which one of the following does NOT need to have anti-virus software installed?
59. What do you mean by 'cloud' in cloud computing?
60. Which one is a social media platform?