Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. Which one of the following best describes when the auto complete function should be disabled, when completing an online form?
2. What are the key responsibilities of the Data Link Layer?
3. Which of the following is not a cloud service?
4. Imagine if customers of a bank are unable to access its account resources than which objective of security will be compromised here.
5. Data ..... is used to ensure confidentiality.
6. What's pharming?
7. Is the following an example of a Health issue or a Safety issue.Tripping over loose wires.
8. What type of program lets a user create and store multiple strong passwords in a single user database file that is protected by one strong master password?
9. Gaining unauthorised access to someone else's computer files is known as:
10. A phishing email is one which:
11. Which of the below is an internet fraud in which a consumer is digitally persuaded to reveal personal data by cybercriminals?
12. Which one of the following is NOT a possible threat to data
13. Find out which one is not a type of topology?
14. Even without risk management, your information will still be safe.
15. What kind of issues does Chris deal with in his job?
16. Which of the following may result in a malware infection?
17. Which of the following is an alternate method instead of passwords for authentication?
18. A software that INFECTS a computer with the permission or knowledge of the user is a .....
19. What surprising fact does the speaker share about his child's understanding of technology?
20. Which of the following wireless protocol uses TKIP?
21. All Public Keys have a matching Private Key
22. Mengajarkan keterampilan komunikasi yang baik di platform daring termasuk dalam fungsi kewarganegaraan digital. Mengapa keterampilan ini penting?
23. Which of the following is an example of malware?
24. Editing a program to remove copy protection or add malware
25. Which one of the following best describes malware?
26. What is a Phishing email?
27. Which one of the following is a method to ensure data is permanently destroyed?
28. Malware used to take over and link a large number of computers in order to execute a attack.
29. The activity of watching someone carefully, especially by the police or army, because they are expected to do something wrong
30. The discovering of secrets, especially political or military information of another country or the industrial information of a business
31. What is the importance of software updates?
32. .... is not a valid scanning method.
33. Which of the following actions does not constitute a cyber crime?
34. Which one of the following best describes why anti-virus software should be updated regularly?
35. A black hat hacker in an ethical hacker.
36. What are the consequences of a data breach?
37. Which one of the following usually used in the process of Wi-Fi-hacking?
38. Apa kelemahan Artifical Intelligence (AI) dalam pertahanan siber?
39. What does 's' in https stand for?
40. What is cyber security?
41. The command that is used to check your internet connection is .....
42. What is the main concern for cybersecurity professionals in two critical situations mentioned in the text?
43. A fraudulent email which is trying to obtain your username and password for a particular site will typically:
44. Which one of these is a computer virus's name
45. Without a plan for issuing security fixes to affected systems, those systems will remain vulnerable to a variety of potential threats.What does this statement refers to?
46. Sesuatu hal yang berhubungan dengan komputer, jaringan komputer, dan internet adalah .....
47. Which type of encryption uses the same key for both encryption and decryption?
48. Which of the following is also a scam?
49. Malware that steals and encrypts data and demand money for the return of the data is known as what type of malware?
50. Where is Chris based?
51. Which of the below security encryption standards is the weakest?
52. Which of the following options is considered WEAK in terms of password strength?
53. Your internet banking profile is being hacked. What should you do?
54. Apa yang sebaiknya Anda lakukan setelah menerima email yang mencurigakan?
55. Which of the following are likely to collect and store personal data on a computer system?
56. What should you do if you receive a suspicious email?
57. Which of the following is a clue to recognising a phishing emails?
58. Which of the below is a kind of cyber security?
59. What is SPAM fighter?
60. The motives behind cyber crime include