Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. Which of the following is a feature of a surge protect?
2. The use of deception to gain personal and/or private information for unlawful purposes.
3. Which is/are a type of Cyber Attack?
4. An e-mail is sent out to mass recipients asking them to verify their bank account details. This is an example of:
5. You got an email that you won Rs 1, 00, 000 should you open it?
6. Which of the following is not a security parameter according to CIA Triad?
7. Which is NOT a way to identify a phishing email attack?
8. What do you do when your mouse starts moving and click on its own?
9. Turning off the GPS function of your smartphone prevents any tracking of your phone's location.
10. A ..... is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs.
11. Attack with malware
12. Which of these is an example of a phishing email?
13. Criminal activities carried out by means of computers or the internet is called .....
14. What security implementation principle is used for granting users only the rights that are necessary for them to perform their work? (Information Security & Risk Management Domain) a) Discretionary
15. Which of the following connectors are utilized for attaching storage peripherals to a computer?
16. What does the "https://" at the beginning of a URL denote, as opposed to "http://" (without the "s")?
17. Select the correct dropdowns to describe YouTube's purpose and audience.YouTube is largely aimed at
18. Which of the following data is considered to be "personal data" when held by a school:
19. ..... is a computer network that is created for an individual person.
20. A computer virus is a program that can copy or ..... its code in the system
21. Which is not an antivirus program?
22. What are digital rights?
23. HTTP supports which of the following:
24. In your game chat you see ..... Hey guys ..... you've gotta see this super cute bunny video! Click the link to view.(link ..... )
25. The following are the goals of network security, except.
26. Which of the following is safe online behavior?
27. What is the fullform of CISO in respect to IT Security?
28. When shopping online, which payment method is generally safest?
29. Why do many companies not report being threatened?
30. You should never keep your password
31. What does biometrics use for identification?
32. Attempting to attract intruders to a system set up to monitor them is called what
33. Which of these is NOT a type of cyberattack?
34. If someone is on my E-mail "buddy list, " "friend list, " or "contact list" and I only know that person online, he or she is
35. You receive an email from '[email protected]' that urges you to reset your Hyundai password. What should you do?
36. What is the unauthorized movement of data?
37. Which one of the following should be carried out to prevent loss of data?
38. Hard to maintain because no central control.
39. A strong feeling among a group of people in reaction to a change or recent events in society or politics
40. What does the National Cybersecurity Workforce Framework help organizations with?
41. When would you use a Load Balancer in a network infrastructure?
42. What is a common tactic used in social engineering attacks?
43. Which security principles are covered by the CIA triad?
44. What does cyber security protect?
45. Which of the following is a type of cyber security?
46. Virus is a .....
47. What is it called if a user misspells the URL or uses the incorrect domain and is sent to a fake look-alike site?
48. Which of the following is not a type of cyber crime?
49. ..... is a tools which protects company data on mobile devices without infringing into personal data.
50. Being involved in a situation where you are not wanted or do not belong
51. How is adware malicious?
52. When Should Cybersecurity Measures be Implemented?
53. What is a password, and why is it important for cybersecurity?
54. Pishing emails are mostly filtered and sent to filter mail section
55. Special types of viruses that can travel from computer to computer without human action; self-replicating and can multiply until it uses up the computer's resources
56. Data Encryption Standard (DES) algorithms use ..... bit key to provide security
57. Bulatkan jawapan yang betul mengikut TERM & Description berkaitan.
58. Name three types of cyber attacks.
59. Which of the following key s could cause new letters that are typed to overwrite existing character?
60. True or False ..... You must update your passwords at least every 3 months