Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 29 (38 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. Teknik enkripsi yang menggunakan pasangan kunci publik dan kunci privat disebuta) Enkripsi Simetris
2. Cyber criminals want access to .....
3. Which one of the following is an important reason for permanently deleting data from a device?
4. What is meant by the Block in Blockchain?
5. Attached to an executable file but it cannot infect your computer unless you click on, run or open the malicious program. spread unknowingly by sharing infected files or sending emails
6. ..... is a type of challenge-response test used in computing to determine whether or not the user is human.
7. What is the most critical aspect of a computer system?
8. What is the risk of installing software from an untrustworthy source or downloading illegal copies of software?
9. What are the potential dangers of using unsecured public Wi-Fi networks?
10. Choose the BEST possible password.
11. ..... is a type of spyware that logs the keystrokes used and can collect data from an infected computer, including personal information such as websites visited, user logins and financial information.
12. Do you think you should use your real name for creating username?
13. Small files that Websites put on your computer hard disk drive when you first visit
14. What term describes the technique or method used to exploit a vulnerability or deliver a malware payload?
15. Encryption is a way of
16. Pick 1 security control categories
17. Who is popularly known as the father of cyber security?
18. Easy to set-up, install and configure.
19. Cyber-crime can be categorized into ..... types.
20. Who was the latest victim of cyber crime
21. What does the TCP/IP model define?
22. A Cyber Attack where a third party/attacker listens/alters the communication between two parties is known as
23. Information contained on devices is protected by three layers:Two of the layers are products and policies and procedures. What is the third layer?
24. A cryptographic hash function has variable output length.
25. Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $ 19.99 to $ 1.99.Which part of the CIA triad has been broken?
26. Which protocol uses the "three-way handshake" for connection establishment?
27. Which mitigation plan is most appropriate to limit the risk of unauthorized access to workstations?
28. Fill in the blank:Using trickery to cause the victim to act in the attacker's favor is known as .....
29. As I travel through "Cyberspace, " information I should never give out to someone I meet online is:
30. You see a post on facebook about some guy/girl you know with their pictures. The post says beware of this person, he/she is fraud. Share this post to all your friends.
31. Is the following an example of a Health issue or a Safety issue.Overloading sockets causing fire.
32. What is smishing?
33. If you click unknown link in email, you should wait for 5mins to make sure nothing happens & there is no need to contact IT dept
34. Unwanted email sent to a huge number of recipients
35. Software used to protect a computer system from viruses.
36. Which one is the pillar of cyber security
37. ..... works by measuring how far apart, relative to one another, your eyes, jaw, nose and cheekbones are.
38. BitLocker is available in the ..... operating system.