Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. When choosing a password you should:
2. Which of the following is a Hacker with Malicious/bad intentions?
3. Which protocol is mostly used in Wi-fi security?
4. Attacker intercepts a two-party transaction, inserting themselves in the middle to steal and manipulate information
5. To delete all temporary internet files, you open your browser and go to:
6. What is called that can be used to deducted money by sending a message?
7. These define access permissions for a user
8. Circuit-level gateway firewalls have which of the below disadvantages?
9. The following activities are part of the Reconnaissance or Access categories? Ping sweeps, Port scans, Internet information queries, Packet sniffers.
10. 2) The best way to protect yourself is to have IoT devices using an isolated network, sharing it only with other IoT devices.
11. Attackers recently exploited vulnerabilities in a web server hosted by your organization. Management has tasked administrator with checking the server and eliminating any weak configurations on it.Which of the following will meet this goal?
12. Which is an advantage of on-premise database solution as opposed to a cloud service provider?
13. What's the difference between a worm and a virus?
14. Which networking device is used to regenerate and retransmit signals to extend the range of a network?
15. What is the purpose of availability in the CIA Triad?
16. What is a strong password?
17. Can a person who does not use internet become victim of Cyber Crime?
18. Working at your desk, you've received an email from Microsoft explaining that your password it out of date, and you must set a new one. The link within the email will guide you through it. Your next step is?
19. The ..... is used to monitors user activity on the internet and conducts its information to someone else.
20. Program that misrepresents itself as a safe program or utility in order to persuade a victim to install it. Drops the destructive payload once the app is opened
21. Botnets are a collection of
22. What is the purpose of confidentiality in cyber security?
23. Which of the following principle is violated if computer system is not accessible?
24. What is the code word mentioned in the cryptic message on the social media site?
25. In an asymmetric-key cipher, the receiver uses the ..... key
26. Which is not a Private information?
27. What is the Internet of Things (IoT) and how does it impact cybersecurity?
28. Megabits per second (Mbps) refers to a speed of .....
29. A policy that defines the actions users may or may not perform while accessing systems and networking equipment is known as:
30. Indicate whether the statement is true or false. 1. The weakness of passwords centers on human memory.
31. What is the role of encryption in network security?
32. There is a tab VOIP in packet sniffing tool what does it do?
33. Which is a trick that Cyber attackers use to fall for phishing scams?
34. What can virus affect?
35. What advantage do younger generations have in the field of cyber security?
36. A malicious program is installed in target computer or the target user is accessing malicious website and automatically redirected to a fake website.
37. Phishing is cybercrime where an attacker sends emails that appear to be from a ..... source.
38. An event in which a hacker tries to gain access to a secure account, such as an email or bank account, in order to steal personal information.
39. In computer security, ..... means that the information in a computer system only be accessible for reading by authorized parities.
40. Apa peran utama Virtual Private Network (VPN)?
41. Encrypts all information sent and received
42. What is the role of a cybersecurity analyst?
43. Why should you lock your computer when stepping away from your desk?
44. Why must you have different passwords for all your accounts?
45. Untuk menjaga keamanan ketika browsing di internet, kita harus melakukan hal-hal ini, kecuali .....
46. What is hacking?
47. How are computer viruses usually caught?
48. How can malware affect a computer system?
49. The attempt to acquire sensitive information such as usernames, passwords, and credit card details by pretending you are a trustworthy entity in an electronic communication is known as?
50. A program that is loaded on your computer without your knowledge.
51. The best passwords include your name, age, or birthday.
52. What is the significance of strong passwords?
53. Apa manfaat dari menggunakan manajer kata sandi?
54. Apabila ingin melakukan remote dekstop saat WFH, apakah yang perlu dilakukan?
55. Why is it important for Tara, Sanya, and Aarush to be cautious about sharing personal information on social media?
56. PILIH CIRI-CIRI THREAT ACTOR.
57. The address an email comes from cannot be faked
58. If you accidentally come across something inappropriate what should you do?
59. The ..... type of malware that is triggered by the user. code automatically makes copies of itself.
60. Which one of the following is a characteristic of anti-virus software?