This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 26 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 26 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. What is a common technique used by spam emails to evade spam filters? A) Pattern-matching. B) Encryption. C) Backwards text. D) Google bombing. Show Answer Correct Answer: C) Backwards text. 2. After compliting the first scheduled backup, which of the following should be done NEXT? A) Schedule the next backup. B) 'Delete the original file to clear space for the next backup. C) Verify the backup. D) Duplicate the backup. Show Answer Correct Answer: C) Verify the backup. 3. What is a policy that requires users to change passwords periodically? A) Password expiration. B) Password encryption. C) Password complexity. D) None of the above. Show Answer Correct Answer: A) Password expiration. 4. What does the term 'cyber' refer to in the context of technology? A) Unauthorized access to systems. B) Related to computers and digital technology. C) Software designed to prevent malware. D) Malicious software programs. Show Answer Correct Answer: B) Related to computers and digital technology. 5. Virus that replicates itself is called? A) Trojan horse. B) Worm. C) Malware. D) Creeper. Show Answer Correct Answer: B) Worm. 6. A well-designed workstation: A) Has an adjustable chair which supports the lower back. B) Has the screen above eye level. C) Has at least 10m of space per person. D) All of the above. Show Answer Correct Answer: A) Has an adjustable chair which supports the lower back. 7. Indicate whether the statement is true or false.7. Today, many attack tools are freely available and do not require any technical knowledge to use. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 8. Never give this out over the phone, through email or on the Internet. A) Personal Information. B) Free money. C) Tomorrow's lunch choices. D) Baseball scores. Show Answer Correct Answer: A) Personal Information. 9. Why does the speaker emphasize the importance of cybersecurity for children? A) To protect them from online threats. B) To enhance their gaming skills. C) To monitor their educational content. D) To limit their screen time. Show Answer Correct Answer: A) To protect them from online threats. 10. Symmetric encryption is also known as ..... A) Secret key encryption. B) Asymmetric encryption. C) Hash-based encryption. D) Public key encryption. Show Answer Correct Answer: A) Secret key encryption. 11. What is "crash" as it relates to computers? A) The system stops functioning properly. B) Smashing the hard drive into the monitor. C) To destroy the monitor. D) To bang the mouse on the keyboard. Show Answer Correct Answer: A) The system stops functioning properly. 12. Hardware firewalls are built in ..... A) Networks. B) Computers. C) Routers. D) Websites. Show Answer Correct Answer: C) Routers. 13. To avoid Phishing, when you receive an email from unknown sender with attachment don't click on the attachment unless the attachment has the following extension: A) MP4. B) BAT. C) EXE. D) COM. Show Answer Correct Answer: A) MP4. 14. What is quid pro quo in the context of social engineering? A) Offering someting in exchange for information. B) A phising technique. C) A method of hacking. D) A type of malware. Show Answer Correct Answer: A) Offering someting in exchange for information. 15. Firewall is a type of ..... A) Virus. B) Security Threat. C) Worm. D) None of the above. Show Answer Correct Answer: D) None of the above. 16. Maintained by network administrators that also controls user access to the network resources. A) Peer-to-peer Network. B) Client-Server Network. C) All the above. D) None of the above. Show Answer Correct Answer: B) Client-Server Network. 17. Usage of same passwords by many users of an organization like Feb@2023, Jan@2023 etc., may give scope to a hacker by using single common password against multiple accounts for gaining access. This cyber attack is known as A) Password Sprinkling. B) Brute Force Attack. C) Credential spraying. D) Password Spraying. Show Answer Correct Answer: D) Password Spraying. 18. Which of the following data connectivity option is the BEST to use when high mobility is required and cost is not a factor? A) Wireless. B) Ethernet. C) Bluetooth. D) Cellular. Show Answer Correct Answer: C) Bluetooth. 19. Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic? A) Website-Duplication. B) Mimicking. C) Spamming. D) Pharming. Show Answer Correct Answer: A) Website-Duplication. 20. Security attack where user is tricked into downloading a virus on to a cell phone from a text message is known as ..... A) Vishing. B) Smishing. C) Pharming. D) Phishing. Show Answer Correct Answer: B) Smishing. 21. What is the full form of DES? A) Data Evaluation System. B) Data Encryption Software. C) Data Encryption Standard. D) Data Encryption Study. Show Answer Correct Answer: C) Data Encryption Standard. 22. What are ways you can keep your information safe online? A) By not giving your information to strangers and people you barely know. B) Posting your information online. C) Giving your info to strangers. D) Let someone use your computer with your passwords unlocked. Show Answer Correct Answer: A) By not giving your information to strangers and people you barely know. 23. What is the role of a graphic designer in cyber security? A) Designing posters and creating eye-catching images to teach people about security. B) Monitoring computer networks and detecting hackers. C) Teaching people how to spot scams and phishing attempts. D) Testing targeted systems to see if they can be hacked. Show Answer Correct Answer: A) Designing posters and creating eye-catching images to teach people about security. 24. The goal of ..... is to reduce the exposure of the organization to malicious code. A) Access control. B) Anti-virus. C) Password. D) None of the above. Show Answer Correct Answer: B) Anti-virus. 25. Cybercrime is basically criminal activity done by using computers and the internet. A) True. B) No. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 26. What could be a consequence of a lack of availability? A) Network speeds can increase. B) Data can be read by unauthorized users. C) Data can be altered without detection. D) Authorized users cannot access necessary resources. Show Answer Correct Answer: D) Authorized users cannot access necessary resources. 27. Tokens have ..... no.of parts. A) Two. B) Three. C) One. D) Four. Show Answer Correct Answer: D) Four. 28. Which term describes a set of rules for appropriate behavior while on the internet? A) Social network. B) Netiquette. C) Cyber security. D) Identity. Show Answer Correct Answer: B) Netiquette. 29. One employee received a mail [email protected] to share his personal credentials. Identify the e-mail phishing attack being perpetrated: A) Domain Name Disguise. B) Display Name Spoofing. C) Domain Name Spoofing. D) All of the Above. Show Answer Correct Answer: A) Domain Name Disguise. 30. Individuals with wide range of skills motivated by religious or political beliefs to create fear by large-scale disruption of computer networks A) Black hat hacker. B) Hactivist. C) Cyber terrorist. D) State sponsored hacker. Show Answer Correct Answer: C) Cyber terrorist. 31. What is social engineering in the context of cybersecurity? A) Social engineering refers to the physical security of a building. B) Social engineering is a method of securing networks. C) Social engineering is a type of software used for data analysis. D) Social engineering is a technique used to manipulate individuals into divulging confidential information. Show Answer Correct Answer: D) Social engineering is a technique used to manipulate individuals into divulging confidential information. 32. An item that has value A) Identity theft:. B) Asset:. C) Insider:. D) Integrity:. Show Answer Correct Answer: B) Asset:. 33. Who should know your passwords? A) Only you!. B) Your best friends. C) Anyone. D) None of the above. Show Answer Correct Answer: A) Only you!. 34. You receive an e-mail from a good friend. It tells you go look at a website where they found surf boards for sale. You know your friend is not interested in surfing. The URL looks like this:http://radonwaterproof.pl/decking/wonder.php?lead=1ke36kr0zt78av0What kind of common threat is this message? A) Phishing. B) Virus. C) Malware. D) Pharming. Show Answer Correct Answer: D) Pharming. 35. The process of redirecting users to a different website without their knowledge is known as: A) Cybercrime. B) Hackers. C) Pharming. D) Phising. Show Answer Correct Answer: C) Pharming. 36. What is the meaning of bandwidth in network? A) Transmission capacity for communication channel. B) Connected computers in the network. C) Class of IP used in Network. D) None of the above. Show Answer Correct Answer: A) Transmission capacity for communication channel. 37. Which of the following is the correct depiction of Digital Marketing A) Social media marketing. B) Email marketing. C) None of them. D) Both of them. Show Answer Correct Answer: D) Both of them. 38. What should we do if we see something strange online? A) Share it without checking. B) Ignore it and move on. C) Assume it's true and spread the word. D) Verify the information and report it if necessary. Show Answer Correct Answer: D) Verify the information and report it if necessary. 39. Is the following an example of a Health issue or a Safety issue.Heavy equipment falling off tables and injuring people. A) Health. B) Safety. C) All the above. D) None of the above. Show Answer Correct Answer: B) Safety. 40. A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network. A) Snooping. B) Identify Theft. C) Pretexting. D) Wiretapping. Show Answer Correct Answer: D) Wiretapping. 41. Adware can be a good thing? A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 42. How does a Firewall protect a network from unauthorized access? A) By encrypting all data packets on the network. B) By providing unlimited access to all incoming traffic. C) By monitoring and filtering network traffic based on security rules. D) By allowing all network traffic without any restrictions. Show Answer Correct Answer: C) By monitoring and filtering network traffic based on security rules. 43. Which one of the following statements about a password is TRUE? A) It should be changed regularly. B) It cannot contain special character symbols. C) It must be changed only if it is compromised. D) It must be registered with the system administrator. Show Answer Correct Answer: A) It should be changed regularly. 44. Which of the following is an example of an integrity attack? A) Stealing passwords. B) Sending spam emails. C) Overloading a server to make it unavailable. D) Altering logs to hide unauthorized access. Show Answer Correct Answer: D) Altering logs to hide unauthorized access. 45. You got an email from your principal or superintendent that says: "I'm in a meeting and can't call you, but I need your help. I forgot to pick up the prizes for this afternoon can you purchase gift cards to Walmart & send me a photo of the numbers to this email?" What type of phishing scam is this? A) Whaling. B) Vishing. C) It's not a phishing scame. D) Smishing. Show Answer Correct Answer: A) Whaling. 46. Technical skills A) Skills necessary to work and talk to other people. B) The ability to work in and understand areas such as operting systems, coding, spreadsheets, HTML. C) Skills in math and language arts. D) None of the above. Show Answer Correct Answer: B) The ability to work in and understand areas such as operting systems, coding, spreadsheets, HTML. 47. Which of these third-party risks would most likely occur due to the use of unsecure coding practices and lack of testing? A) Supply chain activities. B) Data storage. C) Outsourced container development. D) System integration. Show Answer Correct Answer: C) Outsourced container development. 48. ..... is the protocol suite for the current internet. A) ACM. B) UNIX. C) NCP. D) TCP/IP. Show Answer Correct Answer: D) TCP/IP. 49. Membagikan alamat email ke orang yang dikenal saja A) Aman. B) Tidak aman. C) All the above. D) None of the above. Show Answer Correct Answer: A) Aman. 50. What is used to protect information being sent over the Internet? A) Nothing. B) Packets. C) Encryption. D) Passwords. Show Answer Correct Answer: C) Encryption. 51. Encrypting data storage is an example of? A) Malware. B) Effective password management. C) Device Hardening. D) None of the above. Show Answer Correct Answer: C) Device Hardening. 52. Typically, younger individuals who want to attack computers, yet they lack the knowledge of computers and networks needed to do so state actors:state-sponsored attackers, employed by their government, who launch cyberattacks against their foes A) Script kiddie:. B) Payment Card Industry Data Security Standard (PCI DSS):. C) Risk:. D) Sarbanes-Oxley Act (Sarbox):. Show Answer Correct Answer: A) Script kiddie:. 53. 9) The longer length makes passphrases vulnerable to dictionary or brute force attacks. A) False. B) True. C) All the above. D) None of the above. Show Answer Correct Answer: A) False. 54. What is the primary purpose of the ARP (Address Resolution Protocol)? A) To detect IP address conflicts. B) To map IP addresses to MAC addresses. C) To resolve domain names to IP addresses. D) To map MAC addresses to IP addresses. Show Answer Correct Answer: B) To map IP addresses to MAC addresses. 55. A network policy A) Phishing. B) Data theft. C) Virus. D) Acceptable use policy. Show Answer Correct Answer: D) Acceptable use policy. 56. Which of these is the most secure way of data transfer? A) HTTP. B) HTTPS. C) All the above. D) None of the above. Show Answer Correct Answer: B) HTTPS. 57. Who coined the term " Cyberspace" ? A) William Gibson. B) Andrew Tannenbaum. C) Scott Fahlman. D) Richard Stallman. Show Answer Correct Answer: A) William Gibson. 58. Fill in the Blank:A Brute Force Attack A) Uses a number of computers over a network of infected machines which send requests to a website which would bring it offline. B) Consists of an attacker trying possible passwords and passphrases until a correct one is found. C) Where an attacker can execute malicious SQL statements using software which controls a database management system. D) Software which can be malicious if damaging to a computer or network. Show Answer Correct Answer: B) Consists of an attacker trying possible passwords and passphrases until a correct one is found. 59. ..... demands payment, goods, or a service to stop an attack or recover deleted or encrypted data. A) CRACKER. B) SCRIPT KIDDIES. C) HACKER. D) CYBER EXTORTIONIST. Show Answer Correct Answer: D) CYBER EXTORTIONIST. 60. What are the risks and challenges to be considered in IoT? A) Privacy and Security. B) Energy Consumption. C) Networking Congestion. D) All of these. Show Answer Correct Answer: D) All of these. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books