This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 5 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. Which of the following is a feature of a surge protect? A) Regulates power voltage and wattage. B) Protects against power5 spikes. C) Provides battery backup for device. D) Generates power for devices. Show Answer Correct Answer: A) Regulates power voltage and wattage. 2. The use of deception to gain personal and/or private information for unlawful purposes. A) Pretexting. B) Reconnaissance. C) Wiretapping. D) Social Engineering. Show Answer Correct Answer: D) Social Engineering. 3. Which is/are a type of Cyber Attack? A) DNS. B) Man in the Midddle. C) Phising. D) All of the above. Show Answer Correct Answer: D) All of the above. 4. An e-mail is sent out to mass recipients asking them to verify their bank account details. This is an example of: A) Cracking. B) Backdoor. C) Phising. D) Encryption. Show Answer Correct Answer: C) Phising. 5. You got an email that you won Rs 1, 00, 000 should you open it? A) Yes and claim the prize. B) No and delete it. C) Keep it for future use. D) None of the above. Show Answer Correct Answer: B) No and delete it. 6. Which of the following is not a security parameter according to CIA Triad? A) Availability. B) Integrity. C) Authenticity. D) Confidentiality. Show Answer Correct Answer: C) Authenticity. 7. Which is NOT a way to identify a phishing email attack? A) Generic Greeting OR Spelling/Grammar Mistakes. B) Check the "from" email address. C) Click the link to see if it's real. D) None of the above. Show Answer Correct Answer: C) Click the link to see if it's real. 8. What do you do when your mouse starts moving and click on its own? A) Run antivirus. B) Unplug the power cable. C) Disconnect internet connection. D) All of the above. Show Answer Correct Answer: D) All of the above. 9. Turning off the GPS function of your smartphone prevents any tracking of your phone's location. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 10. A ..... is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. A) Virus. B) Trojan. C) Worm. D) Zombie. Show Answer Correct Answer: A) Virus. 11. Attack with malware A) Cyber war. B) Cyber espionage. C) Cyber terrorism. D) Cyber crime. Show Answer Correct Answer: B) Cyber espionage. 12. Which of these is an example of a phishing email? A) You have won the lottery! Follow this link to claim. B) Your bank account has been hacked. Login in here to protect yourself. C) Help! I am stuck in Europe and I need money to travel home. D) All of the above!. Show Answer Correct Answer: D) All of the above!. 13. Criminal activities carried out by means of computers or the internet is called ..... A) CYBER. B) CYBER LAW. C) CYBER CRIME. D) NETWORK SECURITY. Show Answer Correct Answer: C) CYBER CRIME. 14. What security implementation principle is used for granting users only the rights that are necessary for them to perform their work? (Information Security & Risk Management Domain) a) Discretionary A) Access. B) Least Privilege. C) Mandatory Access. D) Separation of Duties. Show Answer Correct Answer: B) Least Privilege. 15. Which of the following connectors are utilized for attaching storage peripherals to a computer? A) VGA, DVI, HDMI, Component/RGA. B) PS/2, parallel serial. C) RJ45, Rj11 3.5mm. D) USB eSATA, FireWire. Show Answer Correct Answer: D) USB eSATA, FireWire. 16. What does the "https://" at the beginning of a URL denote, as opposed to "http://" (without the "s")? A) That information entered into the site is encrypted. B) That the site is the newest version available. C) That the site is not accessible to certain computers. D) None of the above. Show Answer Correct Answer: A) That information entered into the site is encrypted. 17. Select the correct dropdowns to describe YouTube's purpose and audience.YouTube is largely aimed at A) Older people. B) People of all ages. C) Younger people. D) None of the above. Show Answer Correct Answer: B) People of all ages. 18. Which of the following data is considered to be "personal data" when held by a school: A) The number of pupils in the school. B) The average percentage a*-c grades at gcse gained by pupils last year. C) The school's email address. D) The year that a particular pupil joined the school. Show Answer Correct Answer: D) The year that a particular pupil joined the school. 19. ..... is a computer network that is created for an individual person. A) LAN. B) PAN. C) WAN. D) None of the above. Show Answer Correct Answer: B) PAN. 20. A computer virus is a program that can copy or ..... its code in the system A) Change. B) Erase. C) Modify. D) Decode. Show Answer Correct Answer: C) Modify. 21. Which is not an antivirus program? A) Norton. B) Kaspersky. C) Quickheal. D) TeamViewer. Show Answer Correct Answer: D) TeamViewer. 22. What are digital rights? A) Digital rights involve the ability to create and sell digital products. B) Digital rights refer to the legal ownership of physical property. C) Digital rights are the permissions granted by software developers. D) Digital rights are the rights of individuals to access, use, and control digital content and data. Show Answer Correct Answer: D) Digital rights are the rights of individuals to access, use, and control digital content and data. 23. HTTP supports which of the following: A) Proxy Server. B) Proxy Documents. C) Proxy Domain. D) All of the above. Show Answer Correct Answer: C) Proxy Domain. 24. In your game chat you see ..... Hey guys ..... you've gotta see this super cute bunny video! Click the link to view.(link ..... ) A) Report this message. It might be phishing. B) Click the link who doesn't like cute bunnies?. C) Ignore it, it's nothing. D) Type the entire website address into your browser and watch it that way. Show Answer Correct Answer: A) Report this message. It might be phishing. 25. The following are the goals of network security, except. A) Asset Identification. B) Risk assessment. C) Threat assessment. D) Confidentiality. Show Answer Correct Answer: D) Confidentiality. 26. Which of the following is safe online behavior? A) Clicking unknown email links. B) Keeping software up to date. C) Sharing your password with friends. D) Using public Wi-Fi for banking. Show Answer Correct Answer: B) Keeping software up to date. 27. What is the fullform of CISO in respect to IT Security? A) Chief Information security Officer. B) Chief Internet security Officer. C) Chief Intelligence security Officer. D) Chief Intranet security Officer. Show Answer Correct Answer: A) Chief Information security Officer. 28. When shopping online, which payment method is generally safest? A) Bank transfer. B) Creditcard. C) Cash. D) Direct wire transfer. Show Answer Correct Answer: D) Direct wire transfer. 29. Why do many companies not report being threatened? A) They are happy to pay up. B) They don't think it's important. C) They think the police might not believe them. D) They think it may harm their reputation. Show Answer Correct Answer: D) They think it may harm their reputation. 30. You should never keep your password A) Your name. B) Hard. C) Numbers letters. D) Fingerprint. Show Answer Correct Answer: A) Your name. 31. What does biometrics use for identification? A) Email addresses. B) Biological identification like fingerprints. C) Social Security numbers. D) Passwords and PINs. Show Answer Correct Answer: B) Biological identification like fingerprints. 32. Attempting to attract intruders to a system set up to monitor them is called what A) Intrusion banishment. B) Intrusion deflection. C) Intrusion routing. D) Intrusion dettection. Show Answer Correct Answer: D) Intrusion dettection. 33. Which of these is NOT a type of cyberattack? A) Phishing. B) Ransomware. C) Firewall. D) Trojan Horse. Show Answer Correct Answer: C) Firewall. 34. If someone is on my E-mail "buddy list, " "friend list, " or "contact list" and I only know that person online, he or she is A) My friend and someone I can trust. B) The person he or she claims to be. C) Someone I should be careful about, because I don't know him or her well. D) None of the above. Show Answer Correct Answer: C) Someone I should be careful about, because I don't know him or her well. 35. You receive an email from '[email protected]' that urges you to reset your Hyundai password. What should you do? A) Change my password immediately as per the instructions given in the email. B) Don't proceed and delete the email. C) All the above. D) None of the above. Show Answer Correct Answer: B) Don't proceed and delete the email. 36. What is the unauthorized movement of data? A) Data exfiltration. B) Data infiltration. C) Database hacking. D) Data cracking. Show Answer Correct Answer: A) Data exfiltration. 37. Which one of the following should be carried out to prevent loss of data? A) Decryption. B) Formatting. C) Cracking. D) Backups. Show Answer Correct Answer: D) Backups. 38. Hard to maintain because no central control. A) Peer-to-peer Network. B) Client-Server Network. C) All the above. D) None of the above. Show Answer Correct Answer: A) Peer-to-peer Network. 39. A strong feeling among a group of people in reaction to a change or recent events in society or politics A) Backlash. B) Creepy line. C) Exfiltration. D) None of the above. Show Answer Correct Answer: A) Backlash. 40. What does the National Cybersecurity Workforce Framework help organizations with? A) Identifying major types of cybersecurity threats. B) Providing a common language to define cybersecurity work. C) Creating a set of tasks and skills for cybersecurity professionals. D) Developing professional requirements in networking. Show Answer Correct Answer: B) Providing a common language to define cybersecurity work. 41. When would you use a Load Balancer in a network infrastructure? A) When you want to increase latency in the network. B) When you need to evenly distribute incoming network traffic across multiple servers. C) When you need to concentrate all traffic on a single server. D) When you want to slow down network traffic. Show Answer Correct Answer: B) When you need to evenly distribute incoming network traffic across multiple servers. 42. What is a common tactic used in social engineering attacks? A) Providing detailed information. B) Offering free software. C) Creating a sense of urgency. D) Using complex passwords. Show Answer Correct Answer: C) Creating a sense of urgency. 43. Which security principles are covered by the CIA triad? A) Certified, integrated, accessible. B) Continuity, integrity, accessibility. C) Confidentiality, integrity, availability. D) Confidentiality, installation, assembly. Show Answer Correct Answer: C) Confidentiality, integrity, availability. 44. What does cyber security protect? A) Cyber security protects criminals. B) Cyber security protects internet-connected systems. C) Cyber security protects hackers. D) None of the mentioned. Show Answer Correct Answer: B) Cyber security protects internet-connected systems. 45. Which of the following is a type of cyber security? A) Cloud Security. B) Network Security. C) Application Security. D) All Of The Above. Show Answer Correct Answer: D) All Of The Above. 46. Virus is a ..... A) Software. B) Unused data. C) Machine. D) Hardware. Show Answer Correct Answer: A) Software. 47. What is it called if a user misspells the URL or uses the incorrect domain and is sent to a fake look-alike site? A) Phishing. B) Typo squatting. C) Polling. D) Pharming. Show Answer Correct Answer: B) Typo squatting. 48. Which of the following is not a type of cyber crime? A) Data theft. B) Forgery. C) Damage to data and systems. D) Installing antivirus for protection. Show Answer Correct Answer: D) Installing antivirus for protection. 49. ..... is a tools which protects company data on mobile devices without infringing into personal data. A) Mobile Device Administration. B) Mobile Data Administration. C) Mobile Device Management. D) Mobile Data Management. Show Answer Correct Answer: C) Mobile Device Management. 50. Being involved in a situation where you are not wanted or do not belong A) Malicious. B) Intrusive. C) Adversary. D) None of the above. Show Answer Correct Answer: B) Intrusive. 51. How is adware malicious? A) Deletes files. B) Inappropriate and wastes your time. C) Slows your pc down. D) Spies on you, collecting your information. Show Answer Correct Answer: B) Inappropriate and wastes your time. 52. When Should Cybersecurity Measures be Implemented? A) Cybersecurity measures should always be implemented with up-to-date systems. B) Cybersecurity measures should only be implemented during cyber attacks. C) Cybersecurity measures are not necessary for small organizations. D) Cybersecurity measures should only be implemented by IT professionals. Show Answer Correct Answer: A) Cybersecurity measures should always be implemented with up-to-date systems. 53. What is a password, and why is it important for cybersecurity? A) A type of computer virus. B) A secret combination of characters used to access a computer. C) A popular song title. D) A special code for opening doors. Show Answer Correct Answer: B) A secret combination of characters used to access a computer. 54. Pishing emails are mostly filtered and sent to filter mail section A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 55. Special types of viruses that can travel from computer to computer without human action; self-replicating and can multiply until it uses up the computer's resources A) Worms. B) Phishing. C) Spyware. D) Trojans. Show Answer Correct Answer: A) Worms. 56. Data Encryption Standard (DES) algorithms use ..... bit key to provide security A) 64. B) 256. C) 56. D) 128. Show Answer Correct Answer: C) 56. 57. Bulatkan jawapan yang betul mengikut TERM & Description berkaitan. A) A. Asset/ the intentional act of attemping to bypass one or more security services or controls of an information system. B) B. Threat/ Any event or action that could pontentially cause damage to an asset or an interruption of services. C) C. control/ Anything of value that could be compromised stolen or hamed including information physikal resources and reputation. D) None of the above. Show Answer Correct Answer: B) B. Threat/ Any event or action that could pontentially cause damage to an asset or an interruption of services. 58. Name three types of cyber attacks. A) Botnets, Credential Stuffing, Eavesdropping. B) Malware, Phishing, Denial-of-Service. C) Adware, Social Engineering, SQL Injection. D) Spyware, Ransomware, Keylogging. Show Answer Correct Answer: B) Malware, Phishing, Denial-of-Service. 59. Which of the following key s could cause new letters that are typed to overwrite existing character? A) Scroll lock. B) Backspace. C) Delete. D) Insert. Show Answer Correct Answer: D) Insert. 60. True or False ..... You must update your passwords at least every 3 months A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 9 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books