Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. What is the main goal of integrity in cyber security?
2. True or False:Using the same password for multiple accounts is encouraged to help you remember it
3. What is encryption used for?
4. Which one of the following best describes a data subject?
5. What are two types of network layer firewalls?
6. Is it safe to use the same password everywhere?
7. What information should you not give out on public mode on social media to maintain privacy?
8. A network site that appears to have valuable information but is isolated and monitored is
9. In what can we make copies of files of data
10. Di bawah ini merupakan jejaring finansial yang membekukan transaksi patron WikiLeaks, kecuali .....
11. Which of the following is NOT a common type of cyberattack?x
12. Which one of the following best describes the relationship between data and information?
13. Which of the following is not a tip to avoid falling for scams?
14. How do hackers use viruses?
15. Indicate whether the statement is true or false. 4. Virtually anyone could type in a person's username and pretend to be that person.
16. To reduce the danger of eyestrain from using a computer:
17. The "Consensus" principle of social engineering is exemplified by which of the following examples?
18. An individual who uses scripts or software written by someone else to exploit or break into a computer system.
19. From a security perspective, which one of the following actions is most important before leaving a computer logged on to a network?
20. What is a common method to enhance online account security?
21. Differentiate between Remote VPN and Site-to-Site VPN.
22. What is the special algorithm that creates a scrambled password from a user entered password?
23. What is the function of an intrusion detection system?
24. What is the role of a Firewall in network security?
25. Which part of https://www.security.org indicates that it is a secure website?
26. Serangan siber yang mengirim email spam untuk menanamkan softare adalah .....
27. In cybersecurity, what does CIA stand for?
28. How can we keep our router safe?
29. What is a web-based attack?
30. Select the correct dropdowns to describe TikTok's purpose and audience.TikTok is designed for sharing
31. Your personal information is meant to be .....
32. Someone who knows about a business or organization because they are part of it
33. Which of the following is the first computer virus?
34. The Code Red is a sort of a ..... ?
35. I can use public computers for work, such as those in hotel lobbies, libraries, etc.
36. What does VPN stand for?
37. What popular online activity involves allowing users to stay connected with friends, family, and peers?
38. Gaining logical or physical access without permission to a computer network, system, application software, data, or other resource.
39. Taking a secret message and reproducing the original plain text is known as?
40. 10) Wireless networks allow Wi-Fi enabled devices, such as laptops and tablets, to connect to the network by way of the network identifier, known as the Service Set Identifier (SSID).
41. A system that requires at least two steps to unlock protected information.
42. The security of the OS (operating system) cannot be enhanced by:
43. RSI (Repetitive Strain Injury) can be caused by:
44. Which one of the following is the key emerging cyber security risks as a result of COVID-19?
45. It helps keep data and equipment safe by giving only the appropriate people access.
46. Which term is best described as a person or element that has the power to carry out a threat?
47. Apa kepanjangan DOS dalam keamanan jaringan?
48. Which one of the following best describes the effect of enabling an application to run macros?
49. What are some best practices for preventing malware infections?
50. A computer virus is a small program which:
51. Password email kemenkeu sebaiknya diubah secara berkali, maksimal setelah ..... hari
52. In view of cyber threat, which one is the highest mitigation cost?
53. Which of the following are the features of cloud computing
54. A network security device that monitors incoming and outgoing network traffic and decides whether it is safe.
55. What are internet cookies?
56. Viruses are .....
57. Under which law must healthcare enterprises guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format?
58. Which one of the following applications would you use to delete browsing history?
59. Firewall protecting it's information from .....
60. The ability to ensure that someone can't deny that they performed a certain act.