This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 4 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. What is the fullform of A.I A) Anonymous intelligemce. B) Artificial intelligence. C) American intelligence. D) Aquired intelligence. Show Answer Correct Answer: B) Artificial intelligence. 2. Which one of the following best describes the purpose of social engineering? A) Password cracking. B) Ethical hacking. C) Network sniffing. D) Information gathering. Show Answer Correct Answer: D) Information gathering. 3. Cyber Security provide security against what? A) Against Malware. B) Against cyber-terrorists. C) Defends a device from threat. D) All mentioned options. Show Answer Correct Answer: D) All mentioned options. 4. A malware program that, when executed, replicates by inserting copies of itself into other computer programs is known as? A) Virus. B) Rhinovirus. C) Covid-19. D) Spoofing. Show Answer Correct Answer: A) Virus. 5. Membuat password dengan tanggal lahir A) Aman. B) Tidak aman. C) All the above. D) None of the above. Show Answer Correct Answer: B) Tidak aman. 6. Which of the following best describes the term "subnetting" ? A) Dividing a network into smaller logical networks. B) Connecting multiple networks into one larger network. C) Encrypting data packets for security. D) Assigning IP addresses dynamically to devices. Show Answer Correct Answer: A) Dividing a network into smaller logical networks. 7. Anything of value that could be compromised, stolen, or harmed, including information, physical resources, and reputation. A) Control. B) Exploit. C) Asset. D) Threat. Show Answer Correct Answer: D) Threat. 8. Which of the following should be performed BEFORE installing memory in a computer? A) Connect antistatic straps to the ground. B) Configure the BIOS for the new memory. C) Locate the proper driver files. D) Use plastic tools to avoid shock from capacitor. Show Answer Correct Answer: A) Connect antistatic straps to the ground. 9. Which one of the following best describes why you should NOT disclose personal confidential information on social networking sites? A) The information may violate the terms and conditions of the website. B) The information may be difficult to remove from your user page. C) The information may be used by other users for identity theft. D) The information may affect the graphical appearance of the website. Show Answer Correct Answer: C) The information may be used by other users for identity theft. 10. True or false? If you change your mind you can delete a post and no one will ever be able to see it. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 11. In which category does compromising confidential information fall? A) Attack. B) Threat. C) Bug. D) Vulnerability. Show Answer Correct Answer: B) Threat. 12. Which of the following is a popular IP address and port scanner? A) Snort. B) Ettercap. C) Cain and Abel. D) Angry IP Scanner. Show Answer Correct Answer: D) Angry IP Scanner. 13. Which of the following is not a Phishing feature? A) Generic Greeting. B) Addressed to you. C) Sense of Urgency. D) Link to website. Show Answer Correct Answer: B) Addressed to you. 14. Residual traces of deleted data that still remain are known as: A) Data permanence. B) Data remanence. C) Trash bin. D) Degaussing. Show Answer Correct Answer: B) Data remanence. 15. What does identity theft involve? A) Creating a fake identity to play pranks online. B) A criminal uses someone else's identity or credentials to give them access to information. C) Forgetting one's own passwords and using someone else's by mistake. D) Accidentally sharing personal information on social media. Show Answer Correct Answer: B) A criminal uses someone else's identity or credentials to give them access to information. 16. There are ..... types of scanning in ethical hacking and cyber-security A) 4. B) 2. C) 3. D) 6. Show Answer Correct Answer: C) 3. 17. True or false? It is against the law to threaten someone online. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 18. Provides tracking ( "audit trail" ) of events A) Threat actor:. B) Accounting. C) Threat agent:. D) Threat likelihood:. Show Answer Correct Answer: B) Accounting. 19. ..... spies on data that travels from the users computer A) Spyware. B) Virus. C) Malware. D) Antivirus. Show Answer Correct Answer: A) Spyware. 20. What authentication type is the default for Active Directory? A) MS-CHAP. B) MS-CHAPv2. C) NTLM. D) Kerberos. Show Answer Correct Answer: D) Kerberos. 21. If your mobile device is lost, you can try to find it using: A) Remote disable. B) Remote wipe. C) Google Search. D) Locate device. Show Answer Correct Answer: D) Locate device. 22. Which one of the following describes why firewalls are used? A) To prevent unauthorised access by incoming transmissions. B) To prevent destruction of a computer in the event of a fire. C) To enable easy downloading of data from web sites. D) To detect and disable viruses already on a computer. Show Answer Correct Answer: A) To prevent unauthorised access by incoming transmissions. 23. Which of the following is not an example of an attack vector? A) Wi-Fi. B) Encryption key. C) Bluetoothtextregistered. D) Internet connection. Show Answer Correct Answer: B) Encryption key. 24. True or False:The things you share on social networking sites like Facebook are generally more public than things you share over email or instant messaging. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 25. Which one of the following best describes why you should protect your personal information? A) To avoid losing backed up data files. B) To protect the computer from degaussing the hard drive. C) To prevent computer virus attacks. D) To reduce the risk of identity theft. Show Answer Correct Answer: D) To reduce the risk of identity theft. 26. What is encryption? A) Converting text into hexadecimal representation. B) Utilizing mathematical algorithms to transform text into a scrambled format. C) Translating characters into ASCII code. D) Modifying letters by a predetermined number (Caesar Cipher). Show Answer Correct Answer: B) Utilizing mathematical algorithms to transform text into a scrambled format. 27. Which category of the National Cybersecurity Workforce Framework involves conceptualizing, designing, and building secure IT systems? A) Operate and Maintain. B) Protect and Defend. C) Securely Provision. D) Investigate. Show Answer Correct Answer: C) Securely Provision. 28. Intrusive tests are typically much more accurate. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 29. Data Theft is one type of cyber security incident. Identify one other type of incident. A) Data destruction. B) Data Plan. C) Data save. D) Data available. Show Answer Correct Answer: A) Data destruction. 30. Which department does Chris work in at his current job? A) Marketing. B) Logistics. C) Human Resources. D) Sales. Show Answer Correct Answer: B) Logistics. 31. Mana di antara berikut ini yang bukan merupakan contoh dari ancaman siber? A) Penyebaran ajaran radikalisme. B) Pishing. C) Kekeringan. D) Pencurian identitas. Show Answer Correct Answer: C) Kekeringan. 32. ..... is the art of manipulating people so they give up confidential information. A) Phishing. B) Social engineering. C) Blagging. D) Pharming. Show Answer Correct Answer: B) Social engineering. 33. Only recently formed or started, but likely to grow larger quickly A) Nasent. B) Nacent. C) Nascent. D) None of the above. Show Answer Correct Answer: C) Nascent. 34. Serangan yang melibatkan mengunci atau mengenkripsi data korban dan meminta tebusan untuk memulihkan akses disebut A) Ransomware. B) Worm. C) Phishing. D) Spyware. Show Answer Correct Answer: A) Ransomware. 35. Which of the following could be used to prevent attacks? A) A firewall. B) Stronger cables. C) Better processors. D) None of the above. Show Answer Correct Answer: A) A firewall. 36. Why has the demand for cybersecurity specialists grown significantly in recent years? A) Decreased vulnerability of technology. B) Declining interest in other IT jobs. C) Constant changes in technology and cybersecurity. D) Lack of challenges in the cybersecurity field. Show Answer Correct Answer: C) Constant changes in technology and cybersecurity. 37. Data travels across networks in A) Packets. B) Parts. C) Nibbles. D) Bytes. Show Answer Correct Answer: A) Packets. 38. Unintentional damage to software occurs because of poor training, lack of adherence to simple backup procedures, or simple human error. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 39. Which of the following tool is used in Wi-fi hacking? A) Wireshark. B) Cloud scan. C) Norton. D) Aircrack-ng. Show Answer Correct Answer: D) Aircrack-ng. 40. Which scenario describes a breach of integrity? A) An unauthorized change to data. B) A data leak exposing confidential information. C) Slow network speeds. D) A server downtime incident. Show Answer Correct Answer: A) An unauthorized change to data. 41. Manakah di bawah ini yang bukan merupakan jenis malware? A) Virus. B) Firewall. C) Worm. D) Trojan. Show Answer Correct Answer: B) Firewall. 42. What are the most popular targets in the current threat landscape? i. Computing and power resourcesii. Financial informationiii. Account informationiv. National security dataSELECT THE BEST ANSWER FOR THE QUESTION ABOVE A) I, ii & iii. B) I & iii. C) I, ii, iii & iv. D) Ii & iv. Show Answer Correct Answer: C) I, ii, iii & iv. 43. How many hours per day were teens found to spend on connected devices? A) About 5 hours. B) About 7 hours. C) About 9 hours. D) About 11 hours. Show Answer Correct Answer: C) About 9 hours. 44. Spyware is software that gathers information about a person or organisation without their knowledge? A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 45. The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do? A) Turn your computer off. B) Disconnect your computer from the network. C) Unplug your mouse. D) Run anti-virus. E) All of the above. Show Answer Correct Answer: B) Disconnect your computer from the network. 46. Which one of the following allows a device to connect to the Internet using another mobile device's data connection? A) A personal/mobile hotspot. B) A personal folder. C) A personal domain. D) A person firewalls. Show Answer Correct Answer: A) A personal/mobile hotspot. 47. A word meaning "procedures to ensure safety" A) Protocol. B) Security. C) Firewall. D) Biometrics. E) Encryption. Show Answer Correct Answer: B) Security. 48. A networking device that connects a LAN to another LAN is ..... A) Adaptor. B) Router. C) Gateway. D) Bridge. Show Answer Correct Answer: D) Bridge. 49. Which of the following is a file system commonly used in Windows operating systems? A) NTFS. B) EXT4. C) HFS+. D) FAT32. Show Answer Correct Answer: A) NTFS. 50. The following command that is used to get the route of a packet is ..... A) Ping. B) Arp. C) Traceroute. D) Ifconfig. Show Answer Correct Answer: C) Traceroute. 51. Joe, a business user, is having trouble starting his computer every morning. Sometimes it takes a a long time to start and stays at a startup screen, and Joe needs to hold the power button to shut it down and try again. Which of the following is the FIRST thing Joe should do if this happens again? A) Ignore the issue and keep restarting. B) Unplug the cables and try again. C) Call technical supports. D) Install security software. Show Answer Correct Answer: C) Call technical supports. 52. ..... involves the authorization of access to data in a network, which is controlled by the network administrator. A) CORPORATE ESPIONAGE. B) NETWORK SECURITY. C) CYBER LAW. D) COMPUTER LAW. Show Answer Correct Answer: B) NETWORK SECURITY. 53. What are the three key aspects of data security? A) Confidentiality, Availability, Integrity. B) Privacy, Safety, Accessibility. C) Protection, Encryption, Storage. D) Security, Control, Management. Show Answer Correct Answer: A) Confidentiality, Availability, Integrity. 54. What industry sectors are mentioned as offering networking infrastructure systems that are vulnerable to cyberattacks? A) Manufacturing, energy, communication, and transportation. B) Education, healthcare, and finance. C) Telecommunication, transportation, and power generation. D) Google and Facebook. Show Answer Correct Answer: A) Manufacturing, energy, communication, and transportation. 55. What is the tactic that cyber criminals use to hide information in plain sight on real websites? A) Spam emails. B) Encryption. C) Google bombing. D) Backwards text. Show Answer Correct Answer: D) Backwards text. 56. Which of the following are the cyber tips one must follow? A) Keep a close eye on your mobile device. B) Keep It Locked. C) Know Your Apps. D) Only Connect to the Internet if Needed. E) All of the above. Show Answer Correct Answer: E) All of the above. 57. Your organization is planning to implement a BYOD policy. However, management wants to implement a comprehensive solution to protect the organization's data when the BYOD policy is put into place.Which of the following is the BEST choice to meet these needs? A) MDM. B) FDE. C) SED. D) MAM. Show Answer Correct Answer: A) MDM. 58. Attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. A) DDos. B) Service Hacker. C) Virus. D) Trojan Horse. Show Answer Correct Answer: A) DDos. 59. What is the default port number for FTP? A) 23. B) 21. C) 20. D) 22. Show Answer Correct Answer: B) 21. 60. How can Mira identify and avoid phishing attempts while using email? A) Always click on any link provided in the email. B) Ignore the sender's identity and trust all unsolicited messages. C) Be cautious of unsolicited emails and messages, verify the sender's identity, avoid clicking on suspicious links, and never share personal information. D) Share personal information with anyone who asks for it online. Show Answer Correct Answer: C) Be cautious of unsolicited emails and messages, verify the sender's identity, avoid clicking on suspicious links, and never share personal information. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 9 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books