This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 29 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 29 (38 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. Teknik enkripsi yang menggunakan pasangan kunci publik dan kunci privat disebuta) Enkripsi Simetris A) Enkripsi Asimetris. B) Enkripsi DES. C) Enkripsi Hash. D) Enkripsi simetris. Show Answer Correct Answer: A) Enkripsi Asimetris. 2. Cyber criminals want access to ..... A) All of the above. B) Your parents information. C) Finanacial information. D) Access to your computer. Show Answer Correct Answer: A) All of the above. 3. Which one of the following is an important reason for permanently deleting data from a device? A) It makes applications start a lot faster. B) It makes the data completely inaccessible. C) It makes the recycle bin available for file storage. D) It makes the device more energy efficient. Show Answer Correct Answer: B) It makes the data completely inaccessible. 4. What is meant by the Block in Blockchain? A) A hash point. B) A timestamp. C) Transaction data. D) All of these. Show Answer Correct Answer: D) All of these. 5. Attached to an executable file but it cannot infect your computer unless you click on, run or open the malicious program. spread unknowingly by sharing infected files or sending emails A) Spyware. B) Adware. C) Virus. D) Worm. Show Answer Correct Answer: C) Virus. 6. ..... is a type of challenge-response test used in computing to determine whether or not the user is human. A) CAPTCHA. B) Voice recognition. C) Finger print. D) None of the above. Show Answer Correct Answer: A) CAPTCHA. 7. What is the most critical aspect of a computer system? A) Operating system. B) User. C) Data. D) DVD. Show Answer Correct Answer: C) Data. 8. What is the risk of installing software from an untrustworthy source or downloading illegal copies of software? A) The software may contain malware or spyware that can compromise the security of the system or data. B) The software may not work properly or have bugs that can affect the performance of the system or data. C) The software may violate the intellectual property rights of the original developer or publisher. D) All of the above. Show Answer Correct Answer: D) All of the above. 9. What are the potential dangers of using unsecured public Wi-Fi networks? A) Improved internet speed. B) Increased privacy and security. C) Potential dangers include exposure to hackers, data interception, and unauthorized access to personal information. D) Financial gain. Show Answer Correct Answer: C) Potential dangers include exposure to hackers, data interception, and unauthorized access to personal information. 10. Choose the BEST possible password. A) Pinkhorn123. B) P1nkH0rn!23. C) PinkHorn123. D) None of the above. Show Answer Correct Answer: B) P1nkH0rn!23. 11. ..... is a type of spyware that logs the keystrokes used and can collect data from an infected computer, including personal information such as websites visited, user logins and financial information. A) Spyware. B) Trogan. C) Adware. D) Keylogger. Show Answer Correct Answer: D) Keylogger. 12. Do you think you should use your real name for creating username? A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 13. Small files that Websites put on your computer hard disk drive when you first visit A) Instant Files. B) Chips. C) Cookies. D) Hardware. Show Answer Correct Answer: C) Cookies. 14. What term describes the technique or method used to exploit a vulnerability or deliver a malware payload? A) Threat actor. B) Threat vector. C) Threat category. D) Threat agent. Show Answer Correct Answer: B) Threat vector. 15. Encryption is a way of A) Securing Viruses. B) Deleting applications. C) Securing Information on a network. D) Hacking Passwords. Show Answer Correct Answer: C) Securing Information on a network. 16. Pick 1 security control categories A) A. Technical. B) B. System. C) C. Security base. D) None of the above. Show Answer Correct Answer: A) A. Technical. 17. Who is popularly known as the father of cyber security? A) Bob Thomas. B) Robert. C) Charles. D) August Kerckhoffs. Show Answer Correct Answer: D) August Kerckhoffs. 18. Easy to set-up, install and configure. A) Peer-to-peer Network. B) Client-Server Network. C) All the above. D) None of the above. Show Answer Correct Answer: A) Peer-to-peer Network. 19. Cyber-crime can be categorized into ..... types. A) 6. B) 2. C) 4. D) 3. Show Answer Correct Answer: C) 4. 20. Who was the latest victim of cyber crime A) Snapchat. B) British Airways. C) Foxconn. D) Google. E) Facebook. Show Answer Correct Answer: B) British Airways. 21. What does the TCP/IP model define? A) How to assign IP addresses. B) How to secure network communications. C) How data is transmitted over the internet. D) How to manage network devices. Show Answer Correct Answer: C) How data is transmitted over the internet. 22. A Cyber Attack where a third party/attacker listens/alters the communication between two parties is known as A) Man-in-the-Middle. B) Monster-in-the-Middle. C) Machine-in-the-Middle. D) All of the Above. Show Answer Correct Answer: D) All of the Above. 23. Information contained on devices is protected by three layers:Two of the layers are products and policies and procedures. What is the third layer? A) Applications. B) Systems. C) Tools. D) People. Show Answer Correct Answer: D) People. 24. A cryptographic hash function has variable output length. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 25. Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $ 19.99 to $ 1.99.Which part of the CIA triad has been broken? A) Confidentiality. B) Integrity. C) Availability. D) None of the above. Show Answer Correct Answer: B) Integrity. 26. Which protocol uses the "three-way handshake" for connection establishment? A) TCP. B) ICMP. C) UDP. D) SNMP. Show Answer Correct Answer: A) TCP. 27. Which mitigation plan is most appropriate to limit the risk of unauthorized access to workstations? A) Physically lock workstations. B) Password protection. C) Access control mechanisms. D) Limit the time a user is allowed to use the workstation. Show Answer Correct Answer: B) Password protection. 28. Fill in the blank:Using trickery to cause the victim to act in the attacker's favor is known as ..... A) Exploitation. B) Manipulation. C) Social engineering. D) Deception. Show Answer Correct Answer: C) Social engineering. 29. As I travel through "Cyberspace, " information I should never give out to someone I meet online is: A) The names of my favorite books and movies. B) My real name, address, telephone number, the school I attend, or my photograph. C) The name of my pet. D) None of the above. Show Answer Correct Answer: B) My real name, address, telephone number, the school I attend, or my photograph. 30. You see a post on facebook about some guy/girl you know with their pictures. The post says beware of this person, he/she is fraud. Share this post to all your friends. A) You will ignore the post. B) Forward and share it with all your friends. C) Talk to the person as you know them and inform them about post. D) Comment on post saying such people should be punished and banished. Show Answer Correct Answer: C) Talk to the person as you know them and inform them about post. 31. Is the following an example of a Health issue or a Safety issue.Overloading sockets causing fire. A) Health. B) Safety. C) All the above. D) None of the above. Show Answer Correct Answer: B) Safety. 32. What is smishing? A) When a criminal uses malware to infect your device. B) When a criminal sends text messages to try and get personal information from people. C) When a criminal calls you pretending to be from a legitimate company. D) When a criminal uses social engineering to trick you in person. Show Answer Correct Answer: B) When a criminal sends text messages to try and get personal information from people. 33. If you click unknown link in email, you should wait for 5mins to make sure nothing happens & there is no need to contact IT dept A) False. B) True. C) All the above. D) None of the above. Show Answer Correct Answer: A) False. 34. Unwanted email sent to a huge number of recipients A) Hacking. B) Cracking. C) Firewall. D) Keylogger. E) Spam. Show Answer Correct Answer: E) Spam. 35. Software used to protect a computer system from viruses. A) Anti-virus software. B) Google hardware. C) Spyware software. D) Anti-virus hardware. Show Answer Correct Answer: A) Anti-virus software. 36. Which one is the pillar of cyber security A) Cell phone. B) Confidentiality. C) Congruence. D) Confidence. Show Answer Correct Answer: B) Confidentiality. 37. ..... works by measuring how far apart, relative to one another, your eyes, jaw, nose and cheekbones are. A) Finger print scanners. B) Facial recognition. C) Email verification. D) None of the above. Show Answer Correct Answer: B) Facial recognition. 38. BitLocker is available in the ..... operating system. A) Mac. B) Linux. C) Windows. D) Android. Show Answer Correct Answer: C) Windows. ← PreviousRelated QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books