This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 6 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. When choosing a password you should: A) Use something easy to remember like your pet's name. B) Use a combination of special characters, letters and numbers that mean something to you but no one else. C) Save all your passwords in a file on your computer in case you forget one. D) Use a foreign word that will not be in an English dictionary. Show Answer Correct Answer: B) Use a combination of special characters, letters and numbers that mean something to you but no one else. 2. Which of the following is a Hacker with Malicious/bad intentions? A) Grey Hat Hacker. B) Black Hat Hacker. C) Blue Hat Hacker. D) Red Hat Hacker. Show Answer Correct Answer: B) Black Hat Hacker. 3. Which protocol is mostly used in Wi-fi security? A) WPS. B) WPA. C) WPA2. D) BOTH A & b. Show Answer Correct Answer: C) WPA2. 4. Attacker intercepts a two-party transaction, inserting themselves in the middle to steal and manipulate information A) RootKits. B) DOS. C) Man In the Middle(MitM). D) Zero Day Exploit. Show Answer Correct Answer: C) Man In the Middle(MitM). 5. To delete all temporary internet files, you open your browser and go to: A) The browser's browsing history settings. B) The last web site you visited. C) The browser's hompe page. D) The browser's history. Show Answer Correct Answer: A) The browser's browsing history settings. 6. What is called that can be used to deducted money by sending a message? A) IM Trojan. B) SMS Trojan. C) Ransom Trojan. D) Backdoor Trojan. Show Answer Correct Answer: B) SMS Trojan. 7. These define access permissions for a user A) Group permissions. B) User Access levels. C) User Maintenance. D) Group and user settings. Show Answer Correct Answer: B) User Access levels. 8. Circuit-level gateway firewalls have which of the below disadvantages? A) They're expensive. B) They're complex to setup. C) They're complex in architecture. D) They do not filter individual packets. Show Answer Correct Answer: D) They do not filter individual packets. 9. The following activities are part of the Reconnaissance or Access categories? Ping sweeps, Port scans, Internet information queries, Packet sniffers. A) Reconnaissance. B) Access. C) All the above. D) None of the above. Show Answer Correct Answer: A) Reconnaissance. 10. 2) The best way to protect yourself is to have IoT devices using an isolated network, sharing it only with other IoT devices. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 11. Attackers recently exploited vulnerabilities in a web server hosted by your organization. Management has tasked administrator with checking the server and eliminating any weak configurations on it.Which of the following will meet this goal? A) Installing a NIDS. B) Disabling unnecessary services. C) Enabling root acounts. D) Implementing SSL encryption. Show Answer Correct Answer: B) Disabling unnecessary services. 12. Which is an advantage of on-premise database solution as opposed to a cloud service provider? A) The public API calls are likely protected with digital signatures. B) You will often leverage a cloud access security broker. C) The threat actors are typically internal privileged users. D) Many accounts will reduce the attack surface. Show Answer Correct Answer: C) The threat actors are typically internal privileged users. 13. What's the difference between a worm and a virus? A) A virus is green and a worm is brown. B) A worm can't be caught. C) A worm needs to be activated by a human. D) A worm doesn't need to be activated by a human. Show Answer Correct Answer: D) A worm doesn't need to be activated by a human. 14. Which networking device is used to regenerate and retransmit signals to extend the range of a network? A) Hub. B) Repeater. C) Firewall. D) Router. Show Answer Correct Answer: B) Repeater. 15. What is the purpose of availability in the CIA Triad? A) To detect unauthorized access. B) To ensure authorized users can access resources when needed. C) To encrypt data. D) To log user activities. Show Answer Correct Answer: B) To ensure authorized users can access resources when needed. 16. What is a strong password? A) A password that is only 4 characters long. B) A password that is written down on a sticky note. C) A password that is the same as the user's username. D) A password that is at least 12 characters long and includes a mix of letters, numbers, and special characters. Show Answer Correct Answer: D) A password that is at least 12 characters long and includes a mix of letters, numbers, and special characters. 17. Can a person who does not use internet become victim of Cyber Crime? A) Yes. B) No. C) All the above. D) None of the above. Show Answer Correct Answer: A) Yes. 18. Working at your desk, you've received an email from Microsoft explaining that your password it out of date, and you must set a new one. The link within the email will guide you through it. Your next step is? A) Follow the link and reset your password. B) Ignore the email and delete it. C) Reset your password manually. D) Any of the above. Show Answer Correct Answer: B) Ignore the email and delete it. 19. The ..... is used to monitors user activity on the internet and conducts its information to someone else. A) Malware. B) Trojan. C) Spyware. D) Adware. Show Answer Correct Answer: C) Spyware. 20. Program that misrepresents itself as a safe program or utility in order to persuade a victim to install it. Drops the destructive payload once the app is opened A) Worm. B) Trojan Horse. C) Virus. D) Adware. Show Answer Correct Answer: B) Trojan Horse. 21. Botnets are a collection of A) Traffic computers. B) Denial computers. C) Zombie computers. D) Broken computers. Show Answer Correct Answer: C) Zombie computers. 22. What is the purpose of confidentiality in cyber security? A) Protecting the physical security of data centers. B) Preventing the disclosure of data to unauthorized parties. C) Preventing unauthorized data modification. D) Ensuring data is available to authorized parties. Show Answer Correct Answer: B) Preventing the disclosure of data to unauthorized parties. 23. Which of the following principle is violated if computer system is not accessible? A) Authentication. B) Confidentiality. C) Availability. D) Access Control. Show Answer Correct Answer: C) Availability. 24. What is the code word mentioned in the cryptic message on the social media site? A) Hacktime4attack. B) Time4hackattack. C) Attack4timehack. D) Hack4timeattack. Show Answer Correct Answer: B) Time4hackattack. 25. In an asymmetric-key cipher, the receiver uses the ..... key A) Private. B) Public. C) None of the above. D) None of the above. Show Answer Correct Answer: A) Private. 26. Which is not a Private information? A) Favourite Game. B) Password. C) Parent's phone number. D) Address. Show Answer Correct Answer: A) Favourite Game. 27. What is the Internet of Things (IoT) and how does it impact cybersecurity? A) The connection of various devices to the Internet, increasing the amount of data needing protection. B) A growing threat to organizations with BYOD policies. C) A network of traditional PCs connected to the Internet. D) A collection of technologies that limit data access. Show Answer Correct Answer: A) The connection of various devices to the Internet, increasing the amount of data needing protection. 28. Megabits per second (Mbps) refers to a speed of ..... A) A million bits per second. B) A hundred bits per second. C) A thousand bits per second. D) A thousand million bits per second. Show Answer Correct Answer: A) A million bits per second. 29. A policy that defines the actions users may or may not perform while accessing systems and networking equipment is known as: A) Acceptable Use Policy. B) Password Policy. C) Email Policy. D) End User License Agreement. Show Answer Correct Answer: A) Acceptable Use Policy. 30. Indicate whether the statement is true or false. 1. The weakness of passwords centers on human memory. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 31. What is the role of encryption in network security? A) Encryption only protects data from physical theft. B) Encryption slows down network performance. C) Encryption protects data from unauthorized access and ensures privacy and confidentiality. D) Encryption makes data more accessible to unauthorized users. Show Answer Correct Answer: C) Encryption protects data from unauthorized access and ensures privacy and confidentiality. 32. There is a tab VOIP in packet sniffing tool what does it do? A) Used to record calls. B) Used to track the location. C) Used to listen calls. D) Used to track ip address. Show Answer Correct Answer: C) Used to listen calls. 33. Which is a trick that Cyber attackers use to fall for phishing scams? A) Urgency/Fear. B) Too good to be true. C) Heart strings (Desire to please). D) All of the answers listed. Show Answer Correct Answer: D) All of the answers listed. 34. What can virus affect? A) Keyboard. B) Hard drive. C) RAM. D) All of the above. Show Answer Correct Answer: D) All of the above. 35. What advantage do younger generations have in the field of cyber security? A) They have more experience using computers and technology. B) They have better problem-solving skills. C) They have more knowledge about programming languages. D) They have more opportunities for training and education. Show Answer Correct Answer: A) They have more experience using computers and technology. 36. A malicious program is installed in target computer or the target user is accessing malicious website and automatically redirected to a fake website. A) Hacking. B) Pharming. C) Phishing. D) Spamming. Show Answer Correct Answer: B) Pharming. 37. Phishing is cybercrime where an attacker sends emails that appear to be from a ..... source. A) Trusted. B) Phishing. C) Virus. D) Known. Show Answer Correct Answer: A) Trusted. 38. An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information. A) Denial of Service. B) Password Attack. C) Browser Attack. D) Replay Attack. Show Answer Correct Answer: B) Password Attack. 39. In computer security, ..... means that the information in a computer system only be accessible for reading by authorized parities. A) Integrity. B) Confidentiality. C) Authenticity. D) Availability. Show Answer Correct Answer: B) Confidentiality. 40. Apa peran utama Virtual Private Network (VPN)? A) Melindungi data dari perangkat tertentu. B) Mencegah akses ke situs web berbahaya. C) Menyembunyikan aktivitas online dan mengenkripsi koneksi internet. D) Mengamankan perangkat dari virus. Show Answer Correct Answer: C) Menyembunyikan aktivitas online dan mengenkripsi koneksi internet. 41. Encrypts all information sent and received A) HTTPS. B) FTP. C) HTTP. D) SMTP. Show Answer Correct Answer: A) HTTPS. 42. What is the role of a cybersecurity analyst? A) The role of a cybersecurity analyst is to protect an organization's systems and networks from cyber threats. B) To oversee human resources and employee relations. C) To develop software applications for businesses. D) To manage the company's financial resources. Show Answer Correct Answer: A) The role of a cybersecurity analyst is to protect an organization's systems and networks from cyber threats. 43. Why should you lock your computer when stepping away from your desk? A) The wallpaper has a Beautiful Model Photo. B) To protect your data from being seen or stolen, in your absence. C) It saves Battery. D) So Laptop don't get Hot. Show Answer Correct Answer: B) To protect your data from being seen or stolen, in your absence. 44. Why must you have different passwords for all your accounts? A) You shouldn't, they're too difficult to remember. B) In case you forget them all. C) Once they have your password, they will have access to all your accounts. D) It will help you to improve your memory. Show Answer Correct Answer: C) Once they have your password, they will have access to all your accounts. 45. Untuk menjaga keamanan ketika browsing di internet, kita harus melakukan hal-hal ini, kecuali ..... A) Memastikan link yang ingin diakses sesuai. B) Tidak asal/ sembarangan mengklik link yang muncul di browser. C) Membuka situs yang tidak jelas. D) Tidak asal/sembarangan install. Show Answer Correct Answer: C) Membuka situs yang tidak jelas. 46. What is hacking? A) Unauthorized access. B) Cleaning computers. C) Watching videos. D) Playing games. Show Answer Correct Answer: A) Unauthorized access. 47. How are computer viruses usually caught? A) People are tricked into thinking it's a gift. B) From a person-usually infected. C) Downloaded or via an email/text message. D) Computers sneezing on one another. Show Answer Correct Answer: C) Downloaded or via an email/text message. 48. How can malware affect a computer system? A) Malware can enhance system performance and speed. B) Malware can create backups and restore lost files. C) Malware can corrupt files, steal data, disrupt operations, and allow unauthorized access. D) Malware can improve software compatibility and updates. Show Answer Correct Answer: C) Malware can corrupt files, steal data, disrupt operations, and allow unauthorized access. 49. The attempt to acquire sensitive information such as usernames, passwords, and credit card details by pretending you are a trustworthy entity in an electronic communication is known as? A) Hacking. B) Fishing. C) Phishing. D) Converting. Show Answer Correct Answer: C) Phishing. 50. A program that is loaded on your computer without your knowledge. A) Virus. B) Worm. C) Chocolate Chip Cookie. D) Both A and C. E) Both A and B. Show Answer Correct Answer: E) Both A and B. 51. The best passwords include your name, age, or birthday. A) TRUE. B) FALSE. C) All the above. D) None of the above. Show Answer Correct Answer: B) FALSE. 52. What is the significance of strong passwords? A) Strong passwords protect against unauthorized access and enhance security. B) Strong passwords are easy to remember and share. C) Strong passwords are only needed for online accounts. D) Weak passwords can improve system performance. Show Answer Correct Answer: A) Strong passwords protect against unauthorized access and enhance security. 53. Apa manfaat dari menggunakan manajer kata sandi? A) Mencatat kata sandi di catatan umum. B) Membantu mengelola dan menyimpan kata sandi dengan aman. C) Menghasilkan kata sandi yang mudah diingat. D) Mengubah kata sandi secara otomatis setiap hari. Show Answer Correct Answer: B) Membantu mengelola dan menyimpan kata sandi dengan aman. 54. Apabila ingin melakukan remote dekstop saat WFH, apakah yang perlu dilakukan? A) Mengajukan permintaan akses remote dekstop ke Direktorat SITP. B) Melakukan remote sendiri dengan software Anydesk. C) Melakukan remote sendiri dengan software teamviewer. D) Melakukan remote sendiri dengan softwareAeroadmin. Show Answer Correct Answer: A) Mengajukan permintaan akses remote dekstop ke Direktorat SITP. 55. Why is it important for Tara, Sanya, and Aarush to be cautious about sharing personal information on social media? A) To make new friends. B) To increase social media followers. C) To receive more targeted advertisements. D) To protect privacy and security. Show Answer Correct Answer: D) To protect privacy and security. 56. PILIH CIRI-CIRI THREAT ACTOR. A) Hired Hacker. B) Insider. C) Outsider. D) CyberSecurity. Show Answer Correct Answer: A) Hired Hacker. 57. The address an email comes from cannot be faked A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 58. If you accidentally come across something inappropriate what should you do? A) Don't click on anything. B) Tell Ms. Luther. C) Tell an adult. D) All of the above. Show Answer Correct Answer: D) All of the above. 59. The ..... type of malware that is triggered by the user. code automatically makes copies of itself. A) Keystroke logger. B) Toolbar. C) Virus. D) Worm. Show Answer Correct Answer: C) Virus. 60. Which one of the following is a characteristic of anti-virus software? A) It stores. important passwords. safely. B) It alerts at any unauthorized firewall intrusion. C) It prevents fraudulent users from logging on. D) It scans the computer for malware. Show Answer Correct Answer: D) It scans the computer for malware. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 9 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books