This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 3 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. Which one of the following best describes when the auto complete function should be disabled, when completing an online form? A) When entering your address. B) When entering your credit card information. C) When entering your screen or username. D) When entering your date of birth. Show Answer Correct Answer: B) When entering your credit card information. 2. What are the key responsibilities of the Data Link Layer? A) Defines the electrical characteristics of the signal. B) Packages data into frames and adds error detection bits. C) Routes packets through the network. D) Establishes sessions between applications. Show Answer Correct Answer: B) Packages data into frames and adds error detection bits. 3. Which of the following is not a cloud service? A) ICloud. B) Dropbox. C) McAffe Drive. D) OneDrive. Show Answer Correct Answer: C) McAffe Drive. 4. Imagine if customers of a bank are unable to access its account resources than which objective of security will be compromised here. A) Confidentiality. B) Availability. C) Authenticity. D) Integrity. Show Answer Correct Answer: B) Availability. 5. Data ..... is used to ensure confidentiality. A) Decryption. B) Backup. C) Encryption. D) Locking. Show Answer Correct Answer: C) Encryption. 6. What's pharming? A) Scam through bogus websites. B) Scams through emails. C) Scams through phone calls. D) Scams through text messages. Show Answer Correct Answer: A) Scam through bogus websites. 7. Is the following an example of a Health issue or a Safety issue.Tripping over loose wires. A) Health. B) Safety. C) All the above. D) None of the above. Show Answer Correct Answer: B) Safety. 8. What type of program lets a user create and store multiple strong passwords in a single user database file that is protected by one strong master password? A) Password manager. B) Password generator. C) Password fault program. D) Password vault program. Show Answer Correct Answer: A) Password manager. 9. Gaining unauthorised access to someone else's computer files is known as: A) Copyright infringement. B) Virus attack. C) Data theft. D) Hacking. Show Answer Correct Answer: D) Hacking. 10. A phishing email is one which: A) Requests a payment for goods you have not received. B) Offers you products in which you may have no interest. C) Encourages you to click on a link to a fraudulent website. D) Contains abusive and threatening language. Show Answer Correct Answer: C) Encourages you to click on a link to a fraudulent website. 11. Which of the below is an internet fraud in which a consumer is digitally persuaded to reveal personal data by cybercriminals? A) DoS attack. B) MiTM attack. C) Website attack. D) Phishing attack. Show Answer Correct Answer: D) Phishing attack. 12. Which one of the following is NOT a possible threat to data A) Service providers. B) Screen resolution. C) Trojans. D) Employees. Show Answer Correct Answer: B) Screen resolution. 13. Find out which one is not a type of topology? A) Star. B) Rng. C) Tree. D) Oval. Show Answer Correct Answer: D) Oval. 14. Even without risk management, your information will still be safe. A) TRUE. B) FALSE. C) All the above. D) None of the above. Show Answer Correct Answer: B) FALSE. 15. What kind of issues does Chris deal with in his job? A) Only network issues. B) Both hardware and software issues. C) Only software issues. D) Only hardware issues. Show Answer Correct Answer: B) Both hardware and software issues. 16. Which of the following may result in a malware infection? A) Opening an email attachment. B) Downloading a file from a website. C) Clicking on an infected link. D) All of the above. Show Answer Correct Answer: D) All of the above. 17. Which of the following is an alternate method instead of passwords for authentication? A) Anonymous user id. B) Fictious security answer. C) Special email account. D) Biometrics. Show Answer Correct Answer: D) Biometrics. 18. A software that INFECTS a computer with the permission or knowledge of the user is a ..... A) Botnet. B) Worm. C) Trojan Horse. D) Virus. Show Answer Correct Answer: D) Virus. 19. What surprising fact does the speaker share about his child's understanding of technology? A) His child invented a new game. B) His child used the word 'download' correctly. C) His child could program a computer. D) His child hacked a secure network. Show Answer Correct Answer: B) His child used the word 'download' correctly. 20. Which of the following wireless protocol uses TKIP? A) WEP. B) WPA. C) WPA2. D) WPS. Show Answer Correct Answer: B) WPA. 21. All Public Keys have a matching Private Key A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 22. Mengajarkan keterampilan komunikasi yang baik di platform daring termasuk dalam fungsi kewarganegaraan digital. Mengapa keterampilan ini penting? A) Agar dapat bertindak positif dan menghormati orang lain di dunia maya. B) Agar dapat berbicara lebih cepat. C) Agar terkenal akan keterampilan komunikasinya. D) Agar dapat berkolaborasi dengan lebih banyak orang. E) Agar dapat menghindari konflik di dunia nyata. Show Answer Correct Answer: D) Agar dapat berkolaborasi dengan lebih banyak orang. 23. Which of the following is an example of malware? A) A text message asking for your personal details. B) An email that looks legitimate but is actually a scam. C) Viruses, spyware, and adware. D) A program that helps to improve computer performance. Show Answer Correct Answer: C) Viruses, spyware, and adware. 24. Editing a program to remove copy protection or add malware A) Hacking. B) Cracking. C) Firewall. D) Keylogger. E) Spam. Show Answer Correct Answer: B) Cracking. 25. Which one of the following best describes malware? A) Software that is generally of low quality. B) Software that is obtained at no cost for the user. C) Software that is copied in violation with the license agreement. D) Software that is designed to harm a computer system. Show Answer Correct Answer: D) Software that is designed to harm a computer system. 26. What is a Phishing email? A) A type of river fish native to Hertfordshire. B) A type of email fraud. C) An important message. D) A type of malware. Show Answer Correct Answer: B) A type of email fraud. 27. Which one of the following is a method to ensure data is permanently destroyed? A) Compress files before moving them to the recycle bin. B) Empty the recycle bin twice for complete destruction. C) Make sure the storage media is physically destroyed. D) Expose the storage media shortly to infra-red light. Show Answer Correct Answer: C) Make sure the storage media is physically destroyed. 28. Malware used to take over and link a large number of computers in order to execute a attack. A) Zero-Day Exploit. B) Phishing. C) Backdoor. D) Social Engineering. E) Botnet. Show Answer Correct Answer: E) Botnet. 29. The activity of watching someone carefully, especially by the police or army, because they are expected to do something wrong A) Exfiltration. B) Insider threat. C) Surveillance. D) None of the above. Show Answer Correct Answer: C) Surveillance. 30. The discovering of secrets, especially political or military information of another country or the industrial information of a business A) Intellectual property theft. B) Espionage. C) Insider threat. D) None of the above. Show Answer Correct Answer: B) Espionage. 31. What is the importance of software updates? A) Software updates are important for security, performance, and functionality. B) Software updates are unnecessary for most users. C) Software updates slow down device performance. D) Software updates are only for fixing bugs. Show Answer Correct Answer: A) Software updates are important for security, performance, and functionality. 32. .... is not a valid scanning method. A) Cloud scan. B) Null Scan. C) SYN Stealth scan. D) Xmas Tree scan. Show Answer Correct Answer: A) Cloud scan. 33. Which of the following actions does not constitute a cyber crime? A) Exploring the Dark Web. B) Deceiving individuals into downloading malicious software. C) Creating an account on a platform for which you do not meet the age requirements. D) Unauthorized access to data or using someone else's computer without consent. Show Answer Correct Answer: A) Exploring the Dark Web. 34. Which one of the following best describes why anti-virus software should be updated regularly? A) To make sure it starts when the computer starts. B) To make sure infected files will be deleted. C) To protect against new computer viruses. D) To protect against accidental removal of the software. Show Answer Correct Answer: C) To protect against new computer viruses. 35. A black hat hacker in an ethical hacker. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 36. What are the consequences of a data breach? A) Increased employee productivity. B) Enhanced data security measures. C) Improved customer engagement. D) Consequences of a data breach include identity theft, financial loss, reputational damage, legal penalties, and loss of customer trust. Show Answer Correct Answer: D) Consequences of a data breach include identity theft, financial loss, reputational damage, legal penalties, and loss of customer trust. 37. Which one of the following usually used in the process of Wi-Fi-hacking? A) Aircrack-ng. B) Wireshark. C) Norton. D) All of the above. Show Answer Correct Answer: A) Aircrack-ng. 38. Apa kelemahan Artifical Intelligence (AI) dalam pertahanan siber? A) AI dapat mennganalisis data yang banyak dalam waktu yang singkat. B) AI dapat menemukan kelemahan aplikasi dan memperkuatnya. C) AI dapat mendeteksi serangan siber dengan cepat. D) Penggunaan AI dapat menimbulkan kelemahan etis. Show Answer Correct Answer: D) Penggunaan AI dapat menimbulkan kelemahan etis. 39. What does 's' in https stand for? A) Safety. B) Suspicious. C) Secure. D) Standard. Show Answer Correct Answer: C) Secure. 40. What is cyber security? A) Cyber security is the protection of internet-connected systems such as hardware, software and data from cyberthreats. B) Cyber security is the the protection of internet connectedd systems such as handware, software and data from cyberthearts. C) Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreatss. D) None of these. Show Answer Correct Answer: A) Cyber security is the protection of internet-connected systems such as hardware, software and data from cyberthreats. 41. The command that is used to check your internet connection is ..... A) Whatis. B) Pwd. C) Ping. D) Hostname. Show Answer Correct Answer: C) Ping. 42. What is the main concern for cybersecurity professionals in two critical situations mentioned in the text? A) Ensuring data accuracy. B) Protecting networked systems. C) Identifying and collecting data. D) Safeguarding identities and data. Show Answer Correct Answer: D) Safeguarding identities and data. 43. A fraudulent email which is trying to obtain your username and password for a particular site will typically: A) Offer large sums of money. B) Address you by name. C) Have a heading with a logo which appears genuine. D) Appear to come from a friend. Show Answer Correct Answer: C) Have a heading with a logo which appears genuine. 44. Which one of these is a computer virus's name A) Worm. B) Malware. C) Omicron. D) Delta. Show Answer Correct Answer: A) Worm. 45. Without a plan for issuing security fixes to affected systems, those systems will remain vulnerable to a variety of potential threats.What does this statement refers to? A) A. Unpatched systems. B) B. Lack of effective anti-malware tools. C) All the above. D) None of the above. Show Answer Correct Answer: A) A. Unpatched systems. 46. Sesuatu hal yang berhubungan dengan komputer, jaringan komputer, dan internet adalah ..... A) Cyber. B) Data. C) Informasi. D) Komputer. E) Security. Show Answer Correct Answer: A) Cyber. 47. Which type of encryption uses the same key for both encryption and decryption? A) Asymmetric encryption. B) Base64 encoding. C) Symmetric encryption. D) Hashing. Show Answer Correct Answer: C) Symmetric encryption. 48. Which of the following is also a scam? A) Become a laptop tester job advertisement email. B) Free Sports equipment for filling out a survey. C) Bank of American security asking you to change your password by clicking the link. D) All of the above. Show Answer Correct Answer: D) All of the above. 49. Malware that steals and encrypts data and demand money for the return of the data is known as what type of malware? A) Spyware. B) Cookie. C) Adware. D) Ransomware. Show Answer Correct Answer: D) Ransomware. 50. Where is Chris based? A) Manchester. B) London. C) Liverpool. D) Lancashire. Show Answer Correct Answer: D) Lancashire. 51. Which of the below security encryption standards is the weakest? A) WPA2. B) WPA3. C) WPA. D) WEP. Show Answer Correct Answer: D) WEP. 52. Which of the following options is considered WEAK in terms of password strength? A) "Tr3ndy$ ecureP@ss". B) "Pr0t3ctMyD@t@". C) "D0g$ L0v3r!". D) "Password123". Show Answer Correct Answer: D) "Password123". 53. Your internet banking profile is being hacked. What should you do? A) Call the providers and shut down the profile. B) Start a new account and don't tell anyone. C) Don't do anything-they might be dangerous. D) Hire an attorney. Show Answer Correct Answer: A) Call the providers and shut down the profile. 54. Apa yang sebaiknya Anda lakukan setelah menerima email yang mencurigakan? A) Mengklik tautan atau lampiran yang ada di dalam email. B) Verifikasi keaslian email dengan sumber yang sah sebelum mengambil tindakan lebih lanjut. C) Membalas email dengan memberikan informasi yang diminta. D) Mengabaikan email tersebut. Show Answer Correct Answer: B) Verifikasi keaslian email dengan sumber yang sah sebelum mengambil tindakan lebih lanjut. 55. Which of the following are likely to collect and store personal data on a computer system? A) All of these are true. B) A doctor's office. C) A bank. D) A government office. Show Answer Correct Answer: A) All of these are true. 56. What should you do if you receive a suspicious email? A) Check the source and verify. B) Ignore it completely. C) Click on the links to verify. D) Forward it to your friends. Show Answer Correct Answer: A) Check the source and verify. 57. Which of the following is a clue to recognising a phishing emails? A) Link to unknown website. B) Sender's email address not recognised. C) Threats or promise of reward. D) All of the above (A, B, C). Show Answer Correct Answer: D) All of the above (A, B, C). 58. Which of the below is a kind of cyber security? A) Cloud Security. B) Application Security. C) Cloud Security. D) All options mentioned above. Show Answer Correct Answer: D) All options mentioned above. 59. What is SPAM fighter? A) A type of Spam mail. B) Anti-Spamming Tool. C) Operating System. D) Antivirus. Show Answer Correct Answer: B) Anti-Spamming Tool. 60. The motives behind cyber crime include A) Financial gain. B) Political agendas. C) Personal vendettas. D) The desire for notoriety. E) All the above. Show Answer Correct Answer: E) All the above. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 9 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books