This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 25 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 25 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. What is one thing that intimidates people about cyber security jobs? A) The lack of job security. B) The constant threat of cyber attacks. C) The high level of competition in the field. D) The need to know how to program a computer. Show Answer Correct Answer: D) The need to know how to program a computer. 2. What is the full form of VR? A) Virtual Reality. B) Virtual Report. C) Virtual Representation. D) Virtual Reader. Show Answer Correct Answer: A) Virtual Reality. 3. What is a computer program that replicates itself in order to spread to other computers, often using a computer network and relying on security failures on the target computer to access it? A) Malicious Code. B) Computer Virus. C) Anti Virus Software. D) Computer Worm. Show Answer Correct Answer: D) Computer Worm. 4. Principles of Information Security A) Confidentiality, Integrity and Authentication. B) Confidence and Integration. C) Confidentiality, Integrity and Availability. D) Confidentiality, Integrity and Authenticity. Show Answer Correct Answer: C) Confidentiality, Integrity and Availability. 5. ..... is defined as a collection and distribution of information about exposed computer security exposures. A) Vulnerability databases. B) STIX. C) Dark web. D) IoC. Show Answer Correct Answer: A) Vulnerability databases. 6. Which of the following is also known as Malicious software? A) Illegalware. B) Maliciousware. C) Malware. D) Badware. Show Answer Correct Answer: C) Malware. 7. A program that is designed to overwhelm email servers and cause DOS A) Ransomeware. B) Worm. C) Spyware. D) Trojan. Show Answer Correct Answer: B) Worm. 8. Which technologies pose challenges for cybersecurity professionals by generating large amounts of data that could be exploited by cybercriminals? A) Artificial Intelligence (AI). B) Geospatial Information Systems (GIS) and Internet of Things (IoT). C) Virtual Reality (VR). D) Blockchain. Show Answer Correct Answer: B) Geospatial Information Systems (GIS) and Internet of Things (IoT). 9. Why are robots prefered over humans in case of work A) Due to its good imapct. B) Productivity. C) Efficiency. D) All of them. Show Answer Correct Answer: D) All of them. 10. Public key chiper uses? A) 1 key. B) 2 key. C) 4 key. D) 3 key. Show Answer Correct Answer: A) 1 key. 11. Virtual Private Networks (VPNs) are the preferred way to offer ..... to private enterprise services. A) Direct access. B) Indirect access. C) Remote access. D) Full access. Show Answer Correct Answer: C) Remote access. 12. What is a vulnerability in the context of cyber security? A) A strong password. B) A type of security token. C) A method of encrypting data. D) A gap or weakness in a system that can be exploited. Show Answer Correct Answer: D) A gap or weakness in a system that can be exploited. 13. Which one of the following best describes how ICT guidelines are used in an organisation? A) To provide tax authorities with important up-to-date financial information. B) To inform customers about personal information protection. C) To provide employees with a set of rules that defines general computer use. D) To inform managers about training and competence status. Show Answer Correct Answer: C) To provide employees with a set of rules that defines general computer use. 14. You can tell whether a link in email will take you to a genuine website, for example belonging to a bank, without risk, by: A) Pointing to the link or hovering over it without clicking. B) Replying to the email. C) Clicking on the link. D) Deleting the email. Show Answer Correct Answer: A) Pointing to the link or hovering over it without clicking. 15. Why is cyber security important? A) To enhance user experience. B) To increase internet speed. C) To reduce hardware costs. D) Cyber security is important to protect data, maintain system integrity, and defend against cyber threats. Show Answer Correct Answer: D) Cyber security is important to protect data, maintain system integrity, and defend against cyber threats. 16. A technician is assigned to harden a laptop for a medical practice. Which of the following should be used to protect PII in the even of hard theft? A) Hard drive encryption. B) Disabling Bluetooth. C) Password expiration. D) Host-based firewallo. Show Answer Correct Answer: A) Hard drive encryption. 17. Whats encryption? A) Changing to ASCII code. B) Changing the letters by a set number (Caesar Cipher). C) Passing text thorough a maths algorithm to scramble text. D) Converting text to hex. Show Answer Correct Answer: C) Passing text thorough a maths algorithm to scramble text. 18. How Can I keep my IoT device safe from Attacks A) Conduct Secure Code Checks. B) Conduct Security Testing. C) Review Third Party Libraries for security. D) All the above. Show Answer Correct Answer: D) All the above. 19. An SQL injection attack would cause unauthorised access to A) Files. B) Databases. C) Entire computer. D) Some files. Show Answer Correct Answer: B) Databases. 20. It specifies the internet address of a file stored ona host computer connected to the Internet. A) Email. B) Uniform Resource Locator. C) Protocol. D) Files. Show Answer Correct Answer: B) Uniform Resource Locator. 21. Yang merupakan ancaman pada penggunaan email ..... A) Http hijack. B) Database injection. C) Phishing. D) Denial of service (DoS). Show Answer Correct Answer: C) Phishing. 22. What are the potential risks of using outdated software and antivirus programs? A) Improved internet speed. B) Increased privacy and security. C) Potential risks include exposure to hackers, data interception, and unauthorized access to personal information. D) Financial gain. Show Answer Correct Answer: C) Potential risks include exposure to hackers, data interception, and unauthorized access to personal information. 23. A program installed to collect information about users, their systems or browsing habits, keys that are typed, sending the data to a remote user. A) Spyware. B) Zero Day Exploit. C) IOT Attacks. D) Denial of Service. Show Answer Correct Answer: A) Spyware. 24. You should write everything that is happening in your life on social media?True or False? A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 25. A strong password should contain: A) Your name or the name of your favorite pet. B) At least one capital letter, one number and one symbol, and be at least 8 characters long. C) All numbers and capital letters, and be no more than 5 characters long. D) All lowercase characters. Show Answer Correct Answer: B) At least one capital letter, one number and one symbol, and be at least 8 characters long. 26. As a security manager, how would you explain the primary goal of a security awareness program to senior management? (Information Security & Risk Management Domain) A) Provide a vehicle for communicating security procedures. B) Provide a clear understanding of potential risk and exposure. C) Provide a forum for disclosing exposure and risk analysis. D) Provide a forum to communicate user responsibilities. Show Answer Correct Answer: B) Provide a clear understanding of potential risk and exposure. 27. Which of the following is not the role in cyber security? A) Security Management. B) Standing Committee. C) Executive Committee. D) Cybersecurity Practitioners. Show Answer Correct Answer: B) Standing Committee. 28. Should you share your location with anyone? A) Yes. B) No. C) All the above. D) None of the above. Show Answer Correct Answer: B) No. 29. Can you get an email scam from someone even if you never gave your email to that person? A) No, only friends & family know your email. B) Yes, phishing scams use software to take other sources. C) No, you can only receive an email scam if you give out your email to too many friends. D) No, you can only receive an email scam from someone you know. Show Answer Correct Answer: B) Yes, phishing scams use software to take other sources. 30. Parents provide an email address during the registration process.some parents have reported that they have received emails asking them to click on a link and provide their bank account details. Identify and describe the type of attack that uses this method A) Scam. B) Man in the middle. C) Malware. D) Phishing. Show Answer Correct Answer: D) Phishing. 31. What type of vulnerabilities focus on exploiting flaws or weaknesses in the logic and workflow of an application rather than traditional security mechanisms? A) Business Logic Vulnerabilities. B) SQL Injection. C) Cross-Site Request Forgery (CSRF). D) Buffer Overflow. E) Cross-Site Scripting (XSS). Show Answer Correct Answer: A) Business Logic Vulnerabilities. 32. The basic components of robot are: A) Mechanical linking. B) Sensors. C) User interface. D) All of them. Show Answer Correct Answer: D) All of them. 33. You suspect your hard drive has been subject to a malware attack. Which one of the following is the best course of action in order to diagnose and identify the threat? A) Search using the operating system's help function. B) Visit the website of a well-known anti-virus company. C) Ask for information on a social network. D) Read the internet router's log file. Show Answer Correct Answer: B) Visit the website of a well-known anti-virus company. 34. Analysis Method exist because it's impossible for a purely quantitative risk assessment to exist given that some issues defy number. STATMENT YANG DI ATAS ADALAH? B. Quantitative (C) A) A. Qualitative. B) B. Quantitative. C) C. Quantitative. D) None of the above. Show Answer Correct Answer: C) C. Quantitative. 35. Which one of the following is NOT a type of CyberSecurity Attack? A) Worms. B) Randsomware. C) Spyware. D) Password Management. Show Answer Correct Answer: D) Password Management. 36. What is social engineering primarily concerned with? A) Manipulation human behavior. B) Exploiting technological weaknesses. C) Hacking into networks. D) Creating malware. Show Answer Correct Answer: A) Manipulation human behavior. 37. Who is the father of cloud computing A) J.C.R. Licklider. B) Sharon B. Codd. C) Charles Bachman. D) Edgar Frank Codd. Show Answer Correct Answer: A) J.C.R. Licklider. 38. In recent years, identity theft has been more prevalent as part of phishing. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 39. Should you share your password with strangers? A) Yes. B) No. C) All the above. D) None of the above. Show Answer Correct Answer: B) No. 40. ..... is the process of converting plaintext into ciphertext to protect sensitive information from unauthorized access. A) Crypto. B) Bitcoin. C) Encryption. D) Password. Show Answer Correct Answer: C) Encryption. 41. You get an email claiming that you won a lottery and you need enter your details so that they can transfer the money. What do you do? A) Click on the link and enter your details. B) Send them the details by replying to the email. C) Ignore and mark the email as Spam. D) Forward it to everyone you know and earn more money. Show Answer Correct Answer: C) Ignore and mark the email as Spam. 42. Hello has been encrypted with Caesar cipher to khoor. The key used was: A) 3. B) Abc. C) 2. D) Alphabet mapping table. Show Answer Correct Answer: A) 3. 43. What information should you not give out? A) Your phone number. B) Your email. C) Your address. D) All the above. Show Answer Correct Answer: D) All the above. 44. What is the importance of password security? A) To increase the risk of identity theft. B) To protect personal and sensitive information from unauthorized access. C) To ensure that personal information is readily available to anyone. D) To make it easier for hackers to access personal information. Show Answer Correct Answer: B) To protect personal and sensitive information from unauthorized access. 45. A ..... can be a hardware device or a software program that filters all the packets of data that comes through a network, the internet, etc. A) Firewall. B) Antivirus. C) Malware. D) Cookies. Show Answer Correct Answer: A) Firewall. 46. The law regarding holding personal data states that if a company holds personal data it must: A) Keep the data secure. B) Keep the data accurate and up to date. C) Allow people to see what data is held about them. D) All of the above. Show Answer Correct Answer: D) All of the above. 47. What is the goal of forensic Science? A) To determine the evidential value of the crime scene and related evidence. B) Mitigate the effects of the information security breach. C) Save the good will of the investigating organization. D) It is a disciple to deal with the legal processes. Show Answer Correct Answer: A) To determine the evidential value of the crime scene and related evidence. 48. What is an example of a more sophisticated cyberattack mentioned in the text? A) Advanced persistent threat (APT). B) DNS cache poisoning. C) Packet forgery. D) Domain naming. Show Answer Correct Answer: A) Advanced persistent threat (APT). 49. We should open any link given by a stranger. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 50. Qwerty123 is a Strong Password (i.e. not a cyber security risk) A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 51. Which of the following is the connection between parts in a robot that allow of motion or movement A) Dis joints. B) Hings. C) Legs. D) Joints. Show Answer Correct Answer: D) Joints. 52. While browsing, a warning appears that the site your visiting is malicious. What should you do? A) Exit the site. B) Proceed to the site since you have an anti virus software. C) Notify IT, then proceed to the site. D) None of the above. Show Answer Correct Answer: A) Exit the site. 53. Apa tujuan utama dari serangan DDoS (Distributed Denial of Service)? A) Mencuri data. B) Menginfeksi sistem dengan malware. C) Menggandakan lalu lintas jaringan. D) Membanjiri layanan atau jaringan dengan lalu lintas untuk membuatnya tidak tersedia. Show Answer Correct Answer: D) Membanjiri layanan atau jaringan dengan lalu lintas untuk membuatnya tidak tersedia. 54. In which year DNS was invented ..... A) 1986. B) 1983. C) 1965. D) 1990. Show Answer Correct Answer: B) 1983. 55. Viruses, worms, and trojans are common security threats that are often used in spreading. What is the name for them all? A) Malware. B) Formalware. C) The Spreading attackers. D) Scams. Show Answer Correct Answer: A) Malware. 56. VPN authentication mechanism A) 3. B) 2. C) 5. D) 4. Show Answer Correct Answer: A) 3. 57. What is the youngest age you can be charged of a Computer Misuse act offence? A) 14. B) 18. C) 12. D) 16. Show Answer Correct Answer: C) 12. 58. An occasion when private information can be seen by people who should not be able to see it A) Data breach. B) Data breech. C) Data disruption. D) None of the above. Show Answer Correct Answer: A) Data breach. 59. What does "DDoS" stand for in cybersecurity? A) Digital Defense of Server Operations. B) Data Deletion over Secure Sockets. C) Distributed Detection of System Outages. D) Distributed Denial of Service. Show Answer Correct Answer: D) Distributed Denial of Service. 60. If somebody uploads a photo of you to a social media site and you don't want it there, what do you do? A) Comment on the photo repetitively until your friend gets the message. B) Privately message the person asking to delete it, untag yourself from the photo and report it. C) Upload an embarrassing photo of them to a social media site. D) None of the above. Show Answer Correct Answer: B) Privately message the person asking to delete it, untag yourself from the photo and report it. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books