Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 27 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. A cyber crime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
2. Which of the following is not a feature of a backup procedure?
3. What type of program can you install to prevent malware?
4. Cyber security includes .....
5. If your password is leaked, what is the first thing you should do?
6. Which of the following is NOT classified as a type of malware?
7. You can protect yourself against spam or fraudulent emails by:
8. What law contains rules regarding consumer privacy?
9. Someone sent you a text message that you have won 1 Billion VND, to claim the prize, you must get the ATM Card which you need to redeem from an authorized courier that asks you 500K VND for the services.
10. Apa yang dimaksud dengan "phishing email" ?
11. You receive an email: "Your account will be deactivated, click here to secure it." What is this?
12. Type of malicious software program (malware) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them.
13. What are the common cyber-attacks which can be used by hackers to damage network?
14. What is the process of identifying an individual?
15. Accessing Wi-Fi dishonestly is a cyber-crime.
16. Which OSI layer is responsible for session management?
17. An online shop delivers boxes of fruit and veg which customers can order online thru the website. Customers input contact and payment details into a form on the website. Cybercriminals attacked the website and have access to stored customer information.Identify the legislation that was broken during the cyber security attack
18. What kind of malware is designed to take advantage of a security hole before it is known?
19. In an asymmetric-key cipher, the sender uses the ..... key
20. True or false? It's fine to post pictures of other people without their permission.
21. This is the concept for guiding information security policy within a corporation, firm, or organisation. What exactly is "this" in this context?
22. Which of the following is a weak password?
23. Permasalahan yang dapat timbul dari serangan DDOS (Distributed Denial of Service) akan berkaitan dengan prinsip keamanan informasi, yaitu .....
24. 4) It is best to access or send any sensitive personal information over a public wireless network.
25. A legal statement of the terms of how software can be used.
26. Your organization is switching from a COPE model to BYOD model due to the cost of replacing lost or damaged mobile devices.Which of the following is the BEST choice to protect the organization's data when using a BYOD model?
27. Fill in the blank:The use of Internet-based social media platforms to stay connected with friends, family, or peers is called .....
28. What cybersecurity principle involves ensuring that data is not modified?
29. If your friend shares his/her password with you, what should you do?
30. Compromising confidential information comes under .....
31. ..... attempt to exploit a vulnerability when it is found.
32. Public key certificate binds
33. Attack through various pop-up advertisements is known as
34. Which one of the following is an unsafe online activity?
35. Fake e-mail message appearing to be from a trusted business, social network or other contact Asks for personal information or requests a user to click on a link or download a file to verify personal information so that Hackers can secretly collect personal information and passwords. This act is called?
36. Where does Full system scan, custom, virus defnition actions taken by antivirus
37. Memberikan alamat dan nomor Handphone kepada teman bermain game online yang belum dikenal
38. Pengertian dari Cyber Security adalah .....
39. Which of the following is an antivirus program?
40. Personal data stored on SIM cards, USB sticks, SD cards are exempt from the Data Protection Act principles as it is on removable media.
41. When visiting a website, you notice a lock icon in the lower-right corner of the browser window. What does the lock represent?
42. ..... is an international information security community baseline standard.
43. What is AntiVirus software?
44. Which one of the following is a disadvantage of data encryption?
45. An application hosted for use throughout an organization is an example of:
46. What is keylogging?
47. ..... is an attack that tricks a user into clicking a webpage element which is invisible or disguised as another element
48. What is the best way to monitor your online profile?
49. Hackers use their social skills to trick people into revealing access credentials or other valuable information.
50. It is a program or hardware device that filters the information coming through an internet connection to a network or internet connection .....
51. What does the term "Data Breach" mean?
52. A technician receives an email notification about an OS updater for a zero-day virus.Which of the following steps should be performed FIRST to update the company?
53. Which of the following is not a typical characteristic of an ethical hacker?
54. Fill in the blank: ..... is a law that contains rules regarding consumer privacy.
55. What does CIA stand for?
56. How can users identify a phishing email?
57. What does 'CIA' stand for in the context of cyber security?
58. What should you NOT click in an unknown email?
59. What is the main reason why cyber security experts are in high demand?
60. Which of the following describes the concept of RPO?