This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 28 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 28 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. Apple security is known as ..... A) Chips on System (SoCs). B) Knox. C) Systems on Chip (SoCs). D) Titan. Show Answer Correct Answer: C) Systems on Chip (SoCs). 2. Where are users and permissions stored for an NTFS folder? A) Access log. B) Access file. C) Registry. D) ACL. Show Answer Correct Answer: C) Registry. 3. An end user's email account credentials were compromised. Everyone who has ever emailed the end user or have been emailed by the end user received an unstructured phishing attack from the attack.What does the unstructured phishing emails describe? A) STIX. B) IoC. C) TTP. D) APT. Show Answer Correct Answer: B) IoC. 4. What is personal information? A) Your shoe. B) Your address. C) The pizza restaurant phone number. D) None of the above. Show Answer Correct Answer: B) Your address. 5. You are asked to research prices for cloud-based services. The cloud service provider needs to supply servers, storage, and networks, but nothing else.Which of the following will BEST meet your needs? A) PaaS. B) IaaS. C) SaaS. D) XaaS. Show Answer Correct Answer: B) IaaS. 6. Fill in the blank:Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise is called ..... A) Vishing. B) Spoofing. C) Smishing. D) Phishing. Show Answer Correct Answer: D) Phishing. 7. It requires professional administration. A) Peer-to-peer Network. B) Client-Server Network. C) All the above. D) None of the above. Show Answer Correct Answer: B) Client-Server Network. 8. Which of the below does not constitute a cybercrime? A) Man in the middle. B) Phishing. C) Refusal of service. D) AES. Show Answer Correct Answer: D) AES. 9. Which of the following is a type of malware that disguises itself as legitimate software? A) Worm. B) Trojan horse. C) Spyware. D) Ransomware. Show Answer Correct Answer: B) Trojan horse. 10. What is the name given to describe viruses, trojans and worms? A) Adware. B) Firmware. C) Malware. D) Software. Show Answer Correct Answer: C) Malware. 11. Services running on a system are determined by ..... A) The port assigned. B) The system's network name. C) The system's IP address. D) The Active Directory. Show Answer Correct Answer: A) The port assigned. 12. Personality tests are: A) A fun way to learn more about yourself. B) A way for cybercriminals to collect facts about you to collect your private information. C) A way of making you more attractive. D) None of these are correct. Show Answer Correct Answer: B) A way for cybercriminals to collect facts about you to collect your private information. 13. ..... enables administrators to realize the benefits of boot malware defenses A) Customization Cold Boot. B) Customization Secret Boot. C) Customization Safety Boot. D) Customization Secure Boot. Show Answer Correct Answer: D) Customization Secure Boot. 14. What is a keylogger? A) A device / program that records the keys pressed. B) Code that will run a malicious function if certain functions are met. C) Malware that steals senstive information. D) Malware that locks your files until you pay the hacker to unlock them. Show Answer Correct Answer: A) A device / program that records the keys pressed. 15. What is a VPN and how does it enhance security? A) A VPN improves speed by reducing latency and increasing bandwidth. B) A VPN enhances security by encrypting internet traffic and masking the user's IP address. C) A VPN enhances privacy by storing user data on remote servers. D) A VPN protects against malware by blocking harmful websites and ads. Show Answer Correct Answer: B) A VPN enhances security by encrypting internet traffic and masking the user's IP address. 16. Certified Information Systems Security Professional (CISSP) A) A college degree in computer science. B) Certification for those with managerial and technical skills. C) Certification in coding. D) None of the above. Show Answer Correct Answer: B) Certification for those with managerial and technical skills. 17. Keywords you can use to find out how many teeth the great white shark has. A) Teeth great white shark. B) Shark bites. C) Great white facts. D) Shark teeth. Show Answer Correct Answer: A) Teeth great white shark. 18. Which of these is a sign of malware on your computer? A) Your browser alerts you it has blocked a pop-up window. B) You receive a fraudulent email. C) Your browser alerts you to update to a newer version. D) Your homepage has changed unexpectedly. Show Answer Correct Answer: D) Your homepage has changed unexpectedly. 19. Fill in the blank: ..... is proof of genuineness. A) Authentication:. B) Seal. C) Evidence. D) Certificate. Show Answer Correct Answer: A) Authentication:. 20. What does the ping command do? A) Displays network configuration. B) Lists open network ports. C) Tests connectivity to a specific host. D) Copies files to a remote server. Show Answer Correct Answer: C) Tests connectivity to a specific host. 21. The sending of fraudulent emails appearing to come from legitimate companies in order to steal passwords is known as ..... A) Smishing. B) Vishing. C) Pharming. D) Phishing. Show Answer Correct Answer: D) Phishing. 22. What are the signs of stolen identity? A) Email from online activity you did not do. B) Sharing of social media content you did not share. C) Unable to receive regular bills. D) None of the above. E) All of the above. Show Answer Correct Answer: E) All of the above. 23. What is the minimum age required to create an account on Facebook? A) 13 years. B) No age limit. C) 18 years. D) 15 years. Show Answer Correct Answer: A) 13 years. 24. Inserting external drives in Domain systems is ..... A) Allowed under latest IT security policy. B) It is allowed after approval from Branch Head. C) Restricted and should not be practiced. D) Allowed for official work. Show Answer Correct Answer: C) Restricted and should not be practiced. 25. We should turn on ..... to protect Our Computer from hacker. A) VLC. B) Script. C) Antivirus. D) Firewall. Show Answer Correct Answer: D) Firewall. 26. The command that is used to display routing table, connection information, the status of ports, etc. is ..... A) Traceroute. B) Host. C) Ipconfig. D) Netstat. Show Answer Correct Answer: D) Netstat. 27. Which of the following is a secret numeric password used for authentication? A) Digital signature. B) Digital certificate. C) PIN. D) Security token. Show Answer Correct Answer: C) PIN. 28. Administrators in a business may back up their network files ..... A) Daily. B) Monthly. C) Yearly. D) Weekly. Show Answer Correct Answer: A) Daily. 29. What type of malicious software is designed to encrypt a victim's files and subsequently demands a ransom for their decryption? A) Ransomware. B) Worm. C) Trojan Horse. D) Spyware. Show Answer Correct Answer: A) Ransomware. 30. What does the speaker highlight as a critical aspect of cybersecurity at work? A) Preventing social media browsing. B) Limiting personal phone calls. C) Balancing productivity and security. D) Enforcing strict dress codes. Show Answer Correct Answer: C) Balancing productivity and security. 31. LongURL.org is used for: A) For checking the length of characters in a long URL. B) For browsing in incognito mode. C) For checking where the suspected link is destined without clicking on it. D) For masking your IP address. Show Answer Correct Answer: C) For checking where the suspected link is destined without clicking on it. 32. Special program which can detect and remove viruses from computer is called A) Virus. B) Custom. C) Anti virus. D) Group ware. Show Answer Correct Answer: C) Anti virus. 33. Quick, energetic, and active A) Palatable. B) Brick. C) Brisk. D) None of the above. Show Answer Correct Answer: C) Brisk. 34. Which one of the following shows respect for the confidentiality of information? A) Disclosing confidential information only to authorised individuals. B) Emailing confidential information to a colleague. C) Discussing confidential information over the telephone. D) Uploading confidential information to a shared web site. Show Answer Correct Answer: A) Disclosing confidential information only to authorised individuals. 35. Complete the sentence.The action of sending text messages to fraudulently obtain another person's bank details is called ..... A) Spam. B) Vishing. C) Smishing. D) Pharming. E) Phishing. Show Answer Correct Answer: C) Smishing. 36. Encoding a message so that only authorized parties can read it A) Encryption. B) Password. C) Protocol. D) Biometrics. E) Security. Show Answer Correct Answer: A) Encryption. 37. What are some common cyber security threats? A) Password Expiration. B) Firewall Breach. C) Data Encryption Failure. D) Phishing, Malware, Ransomware, Denial of Service (DoS), Man-in-the-Middle (MitM) attacks, SQL Injection, and Insider Threats. Show Answer Correct Answer: D) Phishing, Malware, Ransomware, Denial of Service (DoS), Man-in-the-Middle (MitM) attacks, SQL Injection, and Insider Threats. 38. A financial institution requires its customers to create strong passwords for their online banking accounts.State one guideline that should be included in the institution's password policy. A) Password must include a favorite color. B) Password must include at least one number. C) Password must include a favorite movie. D) Password must include a pet's name. Show Answer Correct Answer: B) Password must include at least one number. 39. ..... means the security of data from tampering by unidentified users. A) Confidentiality. B) Integrity. C) Authentication. D) Non-repudiation. Show Answer Correct Answer: B) Integrity. 40. Which of the following is a strong password practice? A) Using the same password for multiple accounts. B) Using a simple password like "1234" for easy recall. C) Including a mix of uppercase letters, lowercase letters, numbers, and special characters. D) Writing down your password on a sticky note for easy access. Show Answer Correct Answer: C) Including a mix of uppercase letters, lowercase letters, numbers, and special characters. 41. ..... is the practice of using espionage techniques for commercial or financial purposes. A) PHISHING. B) CORPORATE ESPIONAGE. C) FINANCIAL RECESSION. D) CYBERL LIBEL. Show Answer Correct Answer: B) CORPORATE ESPIONAGE. 42. Exploiting a victim using email messages. A) Email Attack. B) Browser Attack. C) Replay Attack. D) Password Attack. Show Answer Correct Answer: A) Email Attack. 43. What is the full form of M2M? A) Money to Money. B) Machine to Machine. C) Mobile to Machine. D) Mobile to Mobile. Show Answer Correct Answer: B) Machine to Machine. 44. Which type of threat actor has some level of information about the target but often needs more? A) Blue hat. B) White hat. C) Gray hat. D) Black hat. Show Answer Correct Answer: C) Gray hat. 45. Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer. A) Email Attack. B) Password Attack. C) Replay Attack. D) Browser Attack. Show Answer Correct Answer: D) Browser Attack. 46. There will be some vulnerabilities identified by the scanner that cannot be tied back to a specific known ..... A) XCCDF. B) SCAP. C) OVAL. D) CVE. Show Answer Correct Answer: D) CVE. 47. Which of the following is a type of computer memory that is volatile and loses its data when the power is turned off? A) EEPROM. B) Cache. C) ROM. D) RAM. Show Answer Correct Answer: D) RAM. 48. Which one of the following does NOT ensure that data is permanently destroyed? A) Shredding a memory card. B) Smashing a portable disk to pieces. C) Degaussing a hard drive. D) Moving data to the recycle bin. Show Answer Correct Answer: D) Moving data to the recycle bin. 49. What is the best practice for setting file permissions or privileges in an organisation? A) Granting read-only access to everyone. B) Granting full access to everyone. C) Granting access based on the principle of least privilege. D) Granting access based on the principle of most privilege. Show Answer Correct Answer: C) Granting access based on the principle of least privilege. 50. Which of the following is the most secure configuration for home wireless network? A) WPA2, Default Password & WPS enabled. B) WEP, Default Password & WPS enabled. C) WPA2, Unique Password & WPS disabled. D) WEP, Unique Password & WPS disabled. Show Answer Correct Answer: C) WPA2, Unique Password & WPS disabled. 51. How many types of social networking services are there? A) Three. B) Four. C) Five. D) Two. Show Answer Correct Answer: A) Three. 52. Bart is showing Wendell a new app that he downloaded from a third party onto his iPhone. Wendell has the same model of smartphone, but when he searches for the app, he is unable to find it. Of the following choices, what is the MOST likely explanation for this? A) Sidebreaking. B) Jailbreaking. C) Tethering. D) Rooting. Show Answer Correct Answer: B) Jailbreaking. 53. Which industry sector is NOT at risk for phishing attacks? A) Schools. B) Banks. C) Hospitals. D) None of the above. Show Answer Correct Answer: D) None of the above. 54. A type of crime in which your private information is stolen an used for criminal activity is called: A) Identification. B) Burglary. C) Identity Theft. D) None of the above. Show Answer Correct Answer: C) Identity Theft. 55. What is the function of the Network Layer? A) Routes packets through the network based on their destination addresses. B) Provides reliable end-to-end data delivery. C) Translates data between different formats. D) Establishes, manages, and terminates sessions. Show Answer Correct Answer: A) Routes packets through the network based on their destination addresses. 56. What can be used to protect device from virus attack? A) Anti-Virus Program. B) Spam emails. C) Spray. D) Malware. Show Answer Correct Answer: A) Anti-Virus Program. 57. Which one is an antivirus software? A) Notepad. B) Quick heal. C) MS word. D) VLC. Show Answer Correct Answer: B) Quick heal. 58. What are lower level languages sometimes called? A) Source languages. B) Machine languages. C) Compiled languages. D) High-level languages. Show Answer Correct Answer: B) Machine languages. 59. Which one of the following is an important part of a backup procedure? A) Delete the original files. B) Store the files in a different location. C) Copy files manually one by one. D) Include the operating system files. Show Answer Correct Answer: B) Store the files in a different location. 60. Firewall is sued to protect against ..... A) Virus Attack. B) Unauthorized attack. C) Fire Attack. D) Data driven attack. Show Answer Correct Answer: B) Unauthorized attack. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books