Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 25 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. What is one thing that intimidates people about cyber security jobs?
2. What is the full form of VR?
3. What is a computer program that replicates itself in order to spread to other computers, often using a computer network and relying on security failures on the target computer to access it?
4. Principles of Information Security
5. ..... is defined as a collection and distribution of information about exposed computer security exposures.
6. Which of the following is also known as Malicious software?
7. A program that is designed to overwhelm email servers and cause DOS
8. Which technologies pose challenges for cybersecurity professionals by generating large amounts of data that could be exploited by cybercriminals?
9. Why are robots prefered over humans in case of work
10. Public key chiper uses?
11. Virtual Private Networks (VPNs) are the preferred way to offer ..... to private enterprise services.
12. What is a vulnerability in the context of cyber security?
13. Which one of the following best describes how ICT guidelines are used in an organisation?
14. You can tell whether a link in email will take you to a genuine website, for example belonging to a bank, without risk, by:
15. Why is cyber security important?
16. A technician is assigned to harden a laptop for a medical practice. Which of the following should be used to protect PII in the even of hard theft?
17. Whats encryption?
18. How Can I keep my IoT device safe from Attacks
19. An SQL injection attack would cause unauthorised access to
20. It specifies the internet address of a file stored ona host computer connected to the Internet.
21. Yang merupakan ancaman pada penggunaan email .....
22. What are the potential risks of using outdated software and antivirus programs?
23. A program installed to collect information about users, their systems or browsing habits, keys that are typed, sending the data to a remote user.
24. You should write everything that is happening in your life on social media?True or False?
25. A strong password should contain:
26. As a security manager, how would you explain the primary goal of a security awareness program to senior management? (Information Security & Risk Management Domain)
27. Which of the following is not the role in cyber security?
28. Should you share your location with anyone?
29. Can you get an email scam from someone even if you never gave your email to that person?
30. Parents provide an email address during the registration process.some parents have reported that they have received emails asking them to click on a link and provide their bank account details. Identify and describe the type of attack that uses this method
31. What type of vulnerabilities focus on exploiting flaws or weaknesses in the logic and workflow of an application rather than traditional security mechanisms?
32. The basic components of robot are:
33. You suspect your hard drive has been subject to a malware attack. Which one of the following is the best course of action in order to diagnose and identify the threat?
34. Analysis Method exist because it's impossible for a purely quantitative risk assessment to exist given that some issues defy number. STATMENT YANG DI ATAS ADALAH? B. Quantitative (C)
35. Which one of the following is NOT a type of CyberSecurity Attack?
36. What is social engineering primarily concerned with?
37. Who is the father of cloud computing
38. In recent years, identity theft has been more prevalent as part of phishing.
39. Should you share your password with strangers?
40. ..... is the process of converting plaintext into ciphertext to protect sensitive information from unauthorized access.
41. You get an email claiming that you won a lottery and you need enter your details so that they can transfer the money. What do you do?
42. Hello has been encrypted with Caesar cipher to khoor. The key used was:
43. What information should you not give out?
44. What is the importance of password security?
45. A ..... can be a hardware device or a software program that filters all the packets of data that comes through a network, the internet, etc.
46. The law regarding holding personal data states that if a company holds personal data it must:
47. What is the goal of forensic Science?
48. What is an example of a more sophisticated cyberattack mentioned in the text?
49. We should open any link given by a stranger.
50. Qwerty123 is a Strong Password (i.e. not a cyber security risk)
51. Which of the following is the connection between parts in a robot that allow of motion or movement
52. While browsing, a warning appears that the site your visiting is malicious. What should you do?
53. Apa tujuan utama dari serangan DDoS (Distributed Denial of Service)?
54. In which year DNS was invented .....
55. Viruses, worms, and trojans are common security threats that are often used in spreading. What is the name for them all?
56. VPN authentication mechanism
57. What is the youngest age you can be charged of a Computer Misuse act offence?
58. An occasion when private information can be seen by people who should not be able to see it
59. What does "DDoS" stand for in cybersecurity?
60. If somebody uploads a photo of you to a social media site and you don't want it there, what do you do?