This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 27 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 27 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. A cyber crime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. A) Phishing. B) Cyber criminal. C) Attack password. D) Online predator. Show Answer Correct Answer: A) Phishing. 2. Which of the following is not a feature of a backup procedure? A) Location. B) Regularity. C) Volume. D) Schedule. Show Answer Correct Answer: C) Volume. 3. What type of program can you install to prevent malware? A) A new operating system. B) Office software. C) Antivirus software. D) A disk defragmenter. Show Answer Correct Answer: C) Antivirus software. 4. Cyber security includes ..... A) Virus protection. B) Secure passwords. C) Limiting information shared with others. D) All of the above. Show Answer Correct Answer: D) All of the above. 5. If your password is leaked, what is the first thing you should do? A) Restart your system. B) Now, Its already known to hackers, you can't do anything. C) Inform your team members. D) Change your password immediately. Show Answer Correct Answer: D) Change your password immediately. 6. Which of the following is NOT classified as a type of malware? A) Virus. B) Worm. C) Trojan horse. D) Sandwich. Show Answer Correct Answer: D) Sandwich. 7. You can protect yourself against spam or fraudulent emails by: A) Using a spam filter. B) Never clicking on links that you are suspicious of. C) Being aware of different types of fraudulent email. D) All of the above. Show Answer Correct Answer: D) All of the above. 8. What law contains rules regarding consumer privacy? A) Credit and Transactions Act. B) Fair and Accurate Credit Transactions Act. C) Fair Credit Reporting Act. D) Accurate Transactions Act. Show Answer Correct Answer: B) Fair and Accurate Credit Transactions Act. 9. Someone sent you a text message that you have won 1 Billion VND, to claim the prize, you must get the ATM Card which you need to redeem from an authorized courier that asks you 500K VND for the services. A) Phishing. B) Kissing. C) Vishing. D) Smishing. Show Answer Correct Answer: D) Smishing. 10. Apa yang dimaksud dengan "phishing email" ? A) Email yang berisi iklan. B) Email yang mencoba memperoleh informasi pribadi atau keuangan dengan cara menipu. C) Email yang dikirim dari teman. D) Email yang mengandung virus komputer. Show Answer Correct Answer: B) Email yang mencoba memperoleh informasi pribadi atau keuangan dengan cara menipu. 11. You receive an email: "Your account will be deactivated, click here to secure it." What is this? A) Password reset. B) Virus. C) Phishing attack. D) Legitimate alert. Show Answer Correct Answer: C) Phishing attack. 12. Type of malicious software program (malware) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them. A) Computer Worm. B) Malicious Code. C) Computer Virus. D) MyDoom. Show Answer Correct Answer: C) Computer Virus. 13. What are the common cyber-attacks which can be used by hackers to damage network? A) Phishing & Password attacks. B) Malware & Malvertising. C) DDoS & Drive-by downloads. D) All of the above. Show Answer Correct Answer: D) All of the above. 14. What is the process of identifying an individual? A) Authorization. B) Accounting. C) Authentication. D) Auditing. Show Answer Correct Answer: C) Authentication. 15. Accessing Wi-Fi dishonestly is a cyber-crime. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 16. Which OSI layer is responsible for session management? A) Session Layer. B) Transport Layer. C) Data Link Layer. D) Network Layer. Show Answer Correct Answer: A) Session Layer. 17. An online shop delivers boxes of fruit and veg which customers can order online thru the website. Customers input contact and payment details into a form on the website. Cybercriminals attacked the website and have access to stored customer information.Identify the legislation that was broken during the cyber security attack A) Computer misuse Act 1990. B) GDPR 2018. C) Counterfeiting Act 2000. D) Data protection Act 1998. Show Answer Correct Answer: A) Computer misuse Act 1990. 18. What kind of malware is designed to take advantage of a security hole before it is known? A) Spyware. B) Zero Day. C) Trojan Horse. D) Ransomware. Show Answer Correct Answer: B) Zero Day. 19. In an asymmetric-key cipher, the sender uses the ..... key A) Private. B) Public. C) None of the above. D) None of the above. Show Answer Correct Answer: B) Public. 20. True or false? It's fine to post pictures of other people without their permission. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 21. This is the concept for guiding information security policy within a corporation, firm, or organisation. What exactly is "this" in this context? A) Non-repudiation. B) CIA Triad. C) Confidentiality. D) Authenticity. Show Answer Correct Answer: B) CIA Triad. 22. Which of the following is a weak password? A) 123456. B) P@ssw0rd. C) ILoveYou123. D) All of the above. Show Answer Correct Answer: A) 123456. 23. Permasalahan yang dapat timbul dari serangan DDOS (Distributed Denial of Service) akan berkaitan dengan prinsip keamanan informasi, yaitu ..... A) Maintainability. B) Integrity. C) Confidentiality. D) Availability. Show Answer Correct Answer: D) Availability. 24. 4) It is best to access or send any sensitive personal information over a public wireless network. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 25. A legal statement of the terms of how software can be used. A) License Agreement. B) Driver" s License. C) Internet Agreement. D) Lease Agreement. Show Answer Correct Answer: A) License Agreement. 26. Your organization is switching from a COPE model to BYOD model due to the cost of replacing lost or damaged mobile devices.Which of the following is the BEST choice to protect the organization's data when using a BYOD model? A) Full-disk encryption. B) Geolocation. C) Remote wipe. D) Containerization. Show Answer Correct Answer: D) Containerization. 27. Fill in the blank:The use of Internet-based social media platforms to stay connected with friends, family, or peers is called ..... A) Cyber networking. B) Social networking. C) Online networking. D) Virtual communities. Show Answer Correct Answer: B) Social networking. 28. What cybersecurity principle involves ensuring that data is not modified? A) Confidentiality. B) Availability. C) Authentication. D) Integrity. Show Answer Correct Answer: D) Integrity. 29. If your friend shares his/her password with you, what should you do? A) I should share his/her passoword with other friends too. B) I should share my password with him/her too. C) I should use the password to access his/her account to play games. D) I should tell my friends why its not safe to share his/her password to anyone. Show Answer Correct Answer: D) I should tell my friends why its not safe to share his/her password to anyone. 30. Compromising confidential information comes under ..... A) Vulnerability. B) Attack. C) Threat. D) Bug. Show Answer Correct Answer: C) Threat. 31. ..... attempt to exploit a vulnerability when it is found. A) Non-intrusive scan. B) Active scan. C) Intrusive scan. D) Passive scan. Show Answer Correct Answer: C) Intrusive scan. 32. Public key certificate binds A) Public key and identifier of the key owner. B) Identifier of the key owner and sign of the trusted third party. C) Public key and identifier of the key owner and signature. D) None. Show Answer Correct Answer: C) Public key and identifier of the key owner and signature. 33. Attack through various pop-up advertisements is known as A) Spamware. B) Advertisement Software. C) Malware. D) Spyware. Show Answer Correct Answer: B) Advertisement Software. 34. Which one of the following is an unsafe online activity? A) Meeting someone you met online face-to-face in the company of your parents. B) Using a screen name or nickname that cannot identify you. C) Giving your home address to someone you met in a chat room. D) Keeping your social network profile private. Show Answer Correct Answer: C) Giving your home address to someone you met in a chat room. 35. Fake e-mail message appearing to be from a trusted business, social network or other contact Asks for personal information or requests a user to click on a link or download a file to verify personal information so that Hackers can secretly collect personal information and passwords. This act is called? A) Inside Threats. B) Ransomware. C) Advances persistent Threats. D) Phishing. Show Answer Correct Answer: D) Phishing. 36. Where does Full system scan, custom, virus defnition actions taken by antivirus A) Encryption software. B) Antivirus. C) Firewall. D) None of the above. Show Answer Correct Answer: B) Antivirus. 37. Memberikan alamat dan nomor Handphone kepada teman bermain game online yang belum dikenal A) Benar. B) Salah. C) All the above. D) None of the above. Show Answer Correct Answer: B) Salah. 38. Pengertian dari Cyber Security adalah ..... A) Pengamanan data dan sistem digital. B) Perangkat lunak. C) Jaringan komputer. D) Keselamatan perangkat keras. E) Keamanan fisik komputer. Show Answer Correct Answer: A) Pengamanan data dan sistem digital. 39. Which of the following is an antivirus program? A) Norton. B) K7. C) QuickHeal. D) All of These. Show Answer Correct Answer: D) All of These. 40. Personal data stored on SIM cards, USB sticks, SD cards are exempt from the Data Protection Act principles as it is on removable media. A) Only sometimes true. B) Only sometimes false. C) True. D) False. Show Answer Correct Answer: D) False. 41. When visiting a website, you notice a lock icon in the lower-right corner of the browser window. What does the lock represent? A) A link to open another site. B) A webpage that has a secure connection. C) A program that prevents you from leaving the page. D) A warning that you are not allowed to view this webpage. Show Answer Correct Answer: B) A webpage that has a secure connection. 42. ..... is an international information security community baseline standard. A) CVSS. B) SCAP. C) OVAL. D) XCCDF. Show Answer Correct Answer: C) OVAL. 43. What is AntiVirus software? A) Software that blocks all unwanted ads. B) Software that keeps you from getting sick. C) Software that protects your device from viruses and malware. D) None of the above. Show Answer Correct Answer: C) Software that protects your device from viruses and malware. 44. Which one of the following is a disadvantage of data encryption? A) The strength of the encryption is decreased if the key has many characters. B) The strength of the encryption is decreased if the key has few characters. C) Encrypted data cannot be deleted unless it is first decrypted. D) Encrypted data cannot be copied unless it is first decrypted. Show Answer Correct Answer: B) The strength of the encryption is decreased if the key has few characters. 45. An application hosted for use throughout an organization is an example of: A) Virtualization. B) Cloud. C) External. D) Direct. Show Answer Correct Answer: D) Direct. 46. What is keylogging? A) A method for encrypting keystrokes to prevent detection. B) A way of tracking every key and character that is typed on a keyboard. C) A tool for measuring the speed of typing. D) A software that helps in correcting typing errors. Show Answer Correct Answer: B) A way of tracking every key and character that is typed on a keyboard. 47. ..... is an attack that tricks a user into clicking a webpage element which is invisible or disguised as another element A) Click Jacking. B) Key Logging. C) Interface Jacking. D) Cursor Jacking. Show Answer Correct Answer: A) Click Jacking. 48. What is the best way to monitor your online profile? A) Use password manager. B) Google yourself. C) Ask your friends to tell you what you see. D) Make sure you have all of your personal information visible. Show Answer Correct Answer: B) Google yourself. 49. Hackers use their social skills to trick people into revealing access credentials or other valuable information. A) Social engineering. B) Pen Testing. C) Rootkit. D) Clickjacking. Show Answer Correct Answer: A) Social engineering. 50. It is a program or hardware device that filters the information coming through an internet connection to a network or internet connection ..... A) Antivirus. B) Cookies. C) Firewall. D) Cyber Safety. Show Answer Correct Answer: C) Firewall. 51. What does the term "Data Breach" mean? A) Data is stolen without permission. B) Data is stored safely. C) Data is deleted by user. D) Data is shared with permission. Show Answer Correct Answer: A) Data is stolen without permission. 52. A technician receives an email notification about an OS updater for a zero-day virus.Which of the following steps should be performed FIRST to update the company? A) Perform the update during the next maintenance window. B) Perform the update after work hour. C) Perform the update in a test environment. D) Perform the update immediately. Show Answer Correct Answer: D) Perform the update immediately. 53. Which of the following is not a typical characteristic of an ethical hacker? A) Excellent knowledge of Windows. B) Understands the process of exploiting network vulnerabilities. C) Patience, persistence and perseverance. D) Has the highest level of security for the organization. Show Answer Correct Answer: D) Has the highest level of security for the organization. 54. Fill in the blank: ..... is a law that contains rules regarding consumer privacy. A) Fair and Accurate Credit Transactions Act (FACTA) of hoax. B) Consumer Protection Act. C) Data Protection Regulation. D) Privacy Rights Act. Show Answer Correct Answer: A) Fair and Accurate Credit Transactions Act (FACTA) of hoax. 55. What does CIA stand for? A) Conditioning, icing, and age. B) Confidentiality, ink, and average. C) Confidentiality, integrity, and availability. D) Confidentiality, integrity, and able. Show Answer Correct Answer: C) Confidentiality, integrity, and availability. 56. How can users identify a phishing email? A) The email is from a known contact. B) The email has a professional tone. C) Users can identify a phishing email by checking the sender's address, looking for spelling errors, and being cautious of urgent requests. D) The email contains a company logo. Show Answer Correct Answer: C) Users can identify a phishing email by checking the sender's address, looking for spelling errors, and being cautious of urgent requests. 57. What does 'CIA' stand for in the context of cyber security? A) Cyber Intelligence Association. B) Computer Information Agency. C) Central Intelligence Agency. D) Confidentiality, Integrity, and Availability. Show Answer Correct Answer: D) Confidentiality, Integrity, and Availability. 58. What should you NOT click in an unknown email? A) Link. B) Greeting. C) Text. D) Picture. Show Answer Correct Answer: A) Link. 59. What is the main reason why cyber security experts are in high demand? A) There are too many hackers and not enough experts to fight them. B) Companies are investing more in cyber security. C) The internet is constantly changing and new threats are emerging. D) Cyber security is becoming a popular career choice. Show Answer Correct Answer: C) The internet is constantly changing and new threats are emerging. 60. Which of the following describes the concept of RPO? A) Recovery Point Operation describes the work required to recovery from a failure. B) Recovery Point Objective describes a point in time at which a disaster occurs. C) Recovery Point Occurrence describes the the data that is logged when a failure occurs. D) Recovery Point Objective describes the acceptable amount of data loss over a given time. Show Answer Correct Answer: D) Recovery Point Objective describes the acceptable amount of data loss over a given time. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books