Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 28 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. Apple security is known as .....
2. Where are users and permissions stored for an NTFS folder?
3. An end user's email account credentials were compromised. Everyone who has ever emailed the end user or have been emailed by the end user received an unstructured phishing attack from the attack.What does the unstructured phishing emails describe?
4. What is personal information?
5. You are asked to research prices for cloud-based services. The cloud service provider needs to supply servers, storage, and networks, but nothing else.Which of the following will BEST meet your needs?
6. Fill in the blank:Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise is called .....
7. It requires professional administration.
8. Which of the below does not constitute a cybercrime?
9. Which of the following is a type of malware that disguises itself as legitimate software?
10. What is the name given to describe viruses, trojans and worms?
11. Services running on a system are determined by .....
12. Personality tests are:
13. ..... enables administrators to realize the benefits of boot malware defenses
14. What is a keylogger?
15. What is a VPN and how does it enhance security?
16. Certified Information Systems Security Professional (CISSP)
17. Keywords you can use to find out how many teeth the great white shark has.
18. Which of these is a sign of malware on your computer?
19. Fill in the blank: ..... is proof of genuineness.
20. What does the ping command do?
21. The sending of fraudulent emails appearing to come from legitimate companies in order to steal passwords is known as .....
22. What are the signs of stolen identity?
23. What is the minimum age required to create an account on Facebook?
24. Inserting external drives in Domain systems is .....
25. We should turn on ..... to protect Our Computer from hacker.
26. The command that is used to display routing table, connection information, the status of ports, etc. is .....
27. Which of the following is a secret numeric password used for authentication?
28. Administrators in a business may back up their network files .....
29. What type of malicious software is designed to encrypt a victim's files and subsequently demands a ransom for their decryption?
30. What does the speaker highlight as a critical aspect of cybersecurity at work?
31. LongURL.org is used for:
32. Special program which can detect and remove viruses from computer is called
33. Quick, energetic, and active
34. Which one of the following shows respect for the confidentiality of information?
35. Complete the sentence.The action of sending text messages to fraudulently obtain another person's bank details is called .....
36. Encoding a message so that only authorized parties can read it
37. What are some common cyber security threats?
38. A financial institution requires its customers to create strong passwords for their online banking accounts.State one guideline that should be included in the institution's password policy.
39. ..... means the security of data from tampering by unidentified users.
40. Which of the following is a strong password practice?
41. ..... is the practice of using espionage techniques for commercial or financial purposes.
42. Exploiting a victim using email messages.
43. What is the full form of M2M?
44. Which type of threat actor has some level of information about the target but often needs more?
45. Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.
46. There will be some vulnerabilities identified by the scanner that cannot be tied back to a specific known .....
47. Which of the following is a type of computer memory that is volatile and loses its data when the power is turned off?
48. Which one of the following does NOT ensure that data is permanently destroyed?
49. What is the best practice for setting file permissions or privileges in an organisation?
50. Which of the following is the most secure configuration for home wireless network?
51. How many types of social networking services are there?
52. Bart is showing Wendell a new app that he downloaded from a third party onto his iPhone. Wendell has the same model of smartphone, but when he searches for the app, he is unable to find it. Of the following choices, what is the MOST likely explanation for this?
53. Which industry sector is NOT at risk for phishing attacks?
54. A type of crime in which your private information is stolen an used for criminal activity is called:
55. What is the function of the Network Layer?
56. What can be used to protect device from virus attack?
57. Which one is an antivirus software?
58. What are lower level languages sometimes called?
59. Which one of the following is an important part of a backup procedure?
60. Firewall is sued to protect against .....