Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 26 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. What is a common technique used by spam emails to evade spam filters?
2. After compliting the first scheduled backup, which of the following should be done NEXT?
3. What is a policy that requires users to change passwords periodically?
4. What does the term 'cyber' refer to in the context of technology?
5. Virus that replicates itself is called?
6. A well-designed workstation:
7. Indicate whether the statement is true or false.7. Today, many attack tools are freely available and do not require any technical knowledge to use.
8. Never give this out over the phone, through email or on the Internet.
9. Why does the speaker emphasize the importance of cybersecurity for children?
10. Symmetric encryption is also known as .....
11. What is "crash" as it relates to computers?
12. Hardware firewalls are built in .....
13. To avoid Phishing, when you receive an email from unknown sender with attachment don't click on the attachment unless the attachment has the following extension:
14. What is quid pro quo in the context of social engineering?
15. Firewall is a type of .....
16. Maintained by network administrators that also controls user access to the network resources.
17. Usage of same passwords by many users of an organization like Feb@2023, Jan@2023 etc., may give scope to a hacker by using single common password against multiple accounts for gaining access. This cyber attack is known as
18. Which of the following data connectivity option is the BEST to use when high mobility is required and cost is not a factor?
19. Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?
20. Security attack where user is tricked into downloading a virus on to a cell phone from a text message is known as .....
21. What is the full form of DES?
22. What are ways you can keep your information safe online?
23. What is the role of a graphic designer in cyber security?
24. The goal of ..... is to reduce the exposure of the organization to malicious code.
25. Cybercrime is basically criminal activity done by using computers and the internet.
26. What could be a consequence of a lack of availability?
27. Tokens have ..... no.of parts.
28. Which term describes a set of rules for appropriate behavior while on the internet?
29. One employee received a mail [email protected] to share his personal credentials. Identify the e-mail phishing attack being perpetrated:
30. Individuals with wide range of skills motivated by religious or political beliefs to create fear by large-scale disruption of computer networks
31. What is social engineering in the context of cybersecurity?
32. An item that has value
33. Who should know your passwords?
34. You receive an e-mail from a good friend. It tells you go look at a website where they found surf boards for sale. You know your friend is not interested in surfing. The URL looks like this:http://radonwaterproof.pl/decking/wonder.php?lead=1ke36kr0zt78av0What kind of common threat is this message?
35. The process of redirecting users to a different website without their knowledge is known as:
36. What is the meaning of bandwidth in network?
37. Which of the following is the correct depiction of Digital Marketing
38. What should we do if we see something strange online?
39. Is the following an example of a Health issue or a Safety issue.Heavy equipment falling off tables and injuring people.
40. A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
41. Adware can be a good thing?
42. How does a Firewall protect a network from unauthorized access?
43. Which one of the following statements about a password is TRUE?
44. Which of the following is an example of an integrity attack?
45. You got an email from your principal or superintendent that says: "I'm in a meeting and can't call you, but I need your help. I forgot to pick up the prizes for this afternoon can you purchase gift cards to Walmart & send me a photo of the numbers to this email?" What type of phishing scam is this?
46. Technical skills
47. Which of these third-party risks would most likely occur due to the use of unsecure coding practices and lack of testing?
48. ..... is the protocol suite for the current internet.
49. Membagikan alamat email ke orang yang dikenal saja
50. What is used to protect information being sent over the Internet?
51. Encrypting data storage is an example of?
52. Typically, younger individuals who want to attack computers, yet they lack the knowledge of computers and networks needed to do so state actors:state-sponsored attackers, employed by their government, who launch cyberattacks against their foes
53. 9) The longer length makes passphrases vulnerable to dictionary or brute force attacks.
54. What is the primary purpose of the ARP (Address Resolution Protocol)?
55. A network policy
56. Which of these is the most secure way of data transfer?
57. Who coined the term " Cyberspace" ?
58. Fill in the Blank:A Brute Force Attack
59. ..... demands payment, goods, or a service to stop an attack or recover deleted or encrypted data.
60. What are the risks and challenges to be considered in IoT?