Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. What is the fullform of A.I
2. Which one of the following best describes the purpose of social engineering?
3. Cyber Security provide security against what?
4. A malware program that, when executed, replicates by inserting copies of itself into other computer programs is known as?
5. Membuat password dengan tanggal lahir
6. Which of the following best describes the term "subnetting" ?
7. Anything of value that could be compromised, stolen, or harmed, including information, physical resources, and reputation.
8. Which of the following should be performed BEFORE installing memory in a computer?
9. Which one of the following best describes why you should NOT disclose personal confidential information on social networking sites?
10. True or false? If you change your mind you can delete a post and no one will ever be able to see it.
11. In which category does compromising confidential information fall?
12. Which of the following is a popular IP address and port scanner?
13. Which of the following is not a Phishing feature?
14. Residual traces of deleted data that still remain are known as:
15. What does identity theft involve?
16. There are ..... types of scanning in ethical hacking and cyber-security
17. True or false? It is against the law to threaten someone online.
18. Provides tracking ( "audit trail" ) of events
19. ..... spies on data that travels from the users computer
20. What authentication type is the default for Active Directory?
21. If your mobile device is lost, you can try to find it using:
22. Which one of the following describes why firewalls are used?
23. Which of the following is not an example of an attack vector?
24. True or False:The things you share on social networking sites like Facebook are generally more public than things you share over email or instant messaging.
25. Which one of the following best describes why you should protect your personal information?
26. What is encryption?
27. Which category of the National Cybersecurity Workforce Framework involves conceptualizing, designing, and building secure IT systems?
28. Intrusive tests are typically much more accurate.
29. Data Theft is one type of cyber security incident. Identify one other type of incident.
30. Which department does Chris work in at his current job?
31. Mana di antara berikut ini yang bukan merupakan contoh dari ancaman siber?
32. ..... is the art of manipulating people so they give up confidential information.
33. Only recently formed or started, but likely to grow larger quickly
34. Serangan yang melibatkan mengunci atau mengenkripsi data korban dan meminta tebusan untuk memulihkan akses disebut
35. Which of the following could be used to prevent attacks?
36. Why has the demand for cybersecurity specialists grown significantly in recent years?
37. Data travels across networks in
38. Unintentional damage to software occurs because of poor training, lack of adherence to simple backup procedures, or simple human error.
39. Which of the following tool is used in Wi-fi hacking?
40. Which scenario describes a breach of integrity?
41. Manakah di bawah ini yang bukan merupakan jenis malware?
42. What are the most popular targets in the current threat landscape? i. Computing and power resourcesii. Financial informationiii. Account informationiv. National security dataSELECT THE BEST ANSWER FOR THE QUESTION ABOVE
43. How many hours per day were teens found to spend on connected devices?
44. Spyware is software that gathers information about a person or organisation without their knowledge?
45. The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do?
46. Which one of the following allows a device to connect to the Internet using another mobile device's data connection?
47. A word meaning "procedures to ensure safety"
48. A networking device that connects a LAN to another LAN is .....
49. Which of the following is a file system commonly used in Windows operating systems?
50. The following command that is used to get the route of a packet is .....
51. Joe, a business user, is having trouble starting his computer every morning. Sometimes it takes a a long time to start and stays at a startup screen, and Joe needs to hold the power button to shut it down and try again. Which of the following is the FIRST thing Joe should do if this happens again?
52. ..... involves the authorization of access to data in a network, which is controlled by the network administrator.
53. What are the three key aspects of data security?
54. What industry sectors are mentioned as offering networking infrastructure systems that are vulnerable to cyberattacks?
55. What is the tactic that cyber criminals use to hide information in plain sight on real websites?
56. Which of the following are the cyber tips one must follow?
57. Your organization is planning to implement a BYOD policy. However, management wants to implement a comprehensive solution to protect the organization's data when the BYOD policy is put into place.Which of the following is the BEST choice to meet these needs?
58. Attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.
59. What is the default port number for FTP?
60. How can Mira identify and avoid phishing attempts while using email?