This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 7 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. What is the main goal of integrity in cyber security? A) To prevent unauthorized data access. B) To protect information from being modified by unauthorized parties. C) To authenticate users. D) To encrypt data. Show Answer Correct Answer: B) To protect information from being modified by unauthorized parties. 2. True or False:Using the same password for multiple accounts is encouraged to help you remember it A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 3. What is encryption used for? A) Converting text to hexadecimal. B) Changing the letters by a set number (Caesar Cipher). C) Converting text to ASCII code. D) Passing text through a mathematical algorithm to scramble the text. Show Answer Correct Answer: D) Passing text through a mathematical algorithm to scramble the text. 4. Which one of the following best describes a data subject? A) An individual who carries out data processing. B) An individual who provides their personal data to a data controller. C) An organisation who posts entries to social networking sites. D) An organisation who encrypts data without a user's consent. Show Answer Correct Answer: B) An individual who provides their personal data to a data controller. 5. What are two types of network layer firewalls? A) Dynamic & Static. B) Stateful & Stateless. C) Anomaly & Signature. D) Mandatory & Discretionary. Show Answer Correct Answer: B) Stateful & Stateless. 6. Is it safe to use the same password everywhere? A) Only on wifi. B) No. C) Yes. D) Notes. Show Answer Correct Answer: B) No. 7. What information should you not give out on public mode on social media to maintain privacy? A) Your phone number, D.O.B. B) Your email, Passwords. C) Your address & other relevant details. D) All the above. Show Answer Correct Answer: D) All the above. 8. A network site that appears to have valuable information but is isolated and monitored is A) Honeypot. B) Virtual Network. C) Canary Trap. D) Pseudo-network. Show Answer Correct Answer: A) Honeypot. 9. In what can we make copies of files of data A) Cookies. B) Biometrics. C) Password. D) Backups. Show Answer Correct Answer: D) Backups. 10. Di bawah ini merupakan jejaring finansial yang membekukan transaksi patron WikiLeaks, kecuali ..... A) Mastercard. B) Visa. C) Swiss-German Bank. D) Paypal. Show Answer Correct Answer: C) Swiss-German Bank. 11. Which of the following is NOT a common type of cyberattack?x A) Malware. B) Social networking. C) Social networking. D) Phishing. Show Answer Correct Answer: B) Social networking. 12. Which one of the following best describes the relationship between data and information? A) Data and information is the same. B) Data is the raw input that information is based on. C) Information is unorganized data. D) Information is any data that is in digital form. Show Answer Correct Answer: B) Data is the raw input that information is based on. 13. Which of the following is not a tip to avoid falling for scams? A) Thinking before you click. B) Doing a web search for a company's name before you give them any information about yourself. C) Only read the fine print. D) All answers listed. Show Answer Correct Answer: D) All answers listed. 14. How do hackers use viruses? A) To make a computer unusable. B) To get someone's personal information. C) To find out card details. D) All of the above. Show Answer Correct Answer: D) All of the above. 15. Indicate whether the statement is true or false. 4. Virtually anyone could type in a person's username and pretend to be that person. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: A) True. 16. To reduce the danger of eyestrain from using a computer: A) The room should be well-lit, not too bright and not too dim. B) The light should not reflect off your computer screen. C) You should take regular breaks. D) All of the above. Show Answer Correct Answer: D) All of the above. 17. The "Consensus" principle of social engineering is exemplified by which of the following examples? A) I'm the CEO calling. B) You know who I am. C) If you don't reset my password, I'll call your supervisor. D) I called last week and your colleague reset my password. Show Answer Correct Answer: D) I called last week and your colleague reset my password. 18. An individual who uses scripts or software written by someone else to exploit or break into a computer system. A) Script Kiddie. B) Cracker. C) Man in the middle. D) Ethical Hacker. Show Answer Correct Answer: A) Script Kiddie. 19. From a security perspective, which one of the following actions is most important before leaving a computer logged on to a network? A) Make sure to turn off the screen. B) Make sure to log off. C) Make sure to start a virus scan. D) Make sure to close all open programs. Show Answer Correct Answer: B) Make sure to log off. 20. What is a common method to enhance online account security? A) Using the same password across all accounts. B) Sharing passwords with friends for convenience. C) Enabling two-factor authentication. D) Disabling security questions. Show Answer Correct Answer: C) Enabling two-factor authentication. 21. Differentiate between Remote VPN and Site-to-Site VPN. A) Remote VPN is for individual users, Site-to-Site VPN is for connecting networks. B) Remote VPN is used for gaming, Site-to-Site VPN is for streaming. C) Remote VPN is free, Site-to-Site VPN requires a subscription. D) Remote VPN is hardware-based, Site-to-Site VPN is software-based. Show Answer Correct Answer: A) Remote VPN is for individual users, Site-to-Site VPN is for connecting networks. 22. What is the special algorithm that creates a scrambled password from a user entered password? A) Scrambled. B) Modification. C) Hash. D) Brute force. Show Answer Correct Answer: C) Hash. 23. What is the function of an intrusion detection system? A) The function of an intrusion detection system is to monitor and analyze network traffic for signs of unauthorized access or attacks. B) To encrypt sensitive data during transmission. C) To manage user access permissions on a server. D) To provide a firewall for network protection. Show Answer Correct Answer: A) The function of an intrusion detection system is to monitor and analyze network traffic for signs of unauthorized access or attacks. 24. What is the role of a Firewall in network security? A) A Firewall is designed to improve hardware performance. B) A Firewall plays a crucial role in network security by filtering and monitoring network traffic to protect against unauthorized access and cyber threats. C) A Firewall is responsible for managing software licenses. D) A Firewall is used to increase network speed. Show Answer Correct Answer: B) A Firewall plays a crucial role in network security by filtering and monitoring network traffic to protect against unauthorized access and cyber threats. 25. Which part of https://www.security.org indicates that it is a secure website? A) WWW. B) .org. C) Https. D) Security. Show Answer Correct Answer: C) Https. 26. Serangan siber yang mengirim email spam untuk menanamkan softare adalah ..... A) DDOS. B) Dump. C) Hacking. D) Phising. Show Answer Correct Answer: B) Dump. 27. In cybersecurity, what does CIA stand for? A) Central Intelligence Agency. B) Confidentiality, Integrity, Availability. C) Cybersecurity, Internet, Accessibility. D) Cybersecurity Investigation Agency. Show Answer Correct Answer: B) Confidentiality, Integrity, Availability. 28. How can we keep our router safe? A) Use the default password. B) Enable WEP encryption. C) Ignore firmware updates. D) Change default credentials, enable WPA3, update firmware, disable WPS, use strong passwords. Show Answer Correct Answer: D) Change default credentials, enable WPA3, update firmware, disable WPS, use strong passwords. 29. What is a web-based attack? A) An attack that occurs on a website or web applications. B) An attack that targets physical servers. C) An attack that targets desktop applications. D) An attack that only occurs via email. Show Answer Correct Answer: A) An attack that occurs on a website or web applications. 30. Select the correct dropdowns to describe TikTok's purpose and audience.TikTok is designed for sharing A) Professional Networking. B) Short Videos. C) Long Videos. D) Photos. Show Answer Correct Answer: B) Short Videos. 31. Your personal information is meant to be ..... A) Shared with others. B) Kept private. C) All the above. D) None of the above. Show Answer Correct Answer: B) Kept private. 32. Someone who knows about a business or organization because they are part of it A) Alarmist. B) Insider. C) Executive. D) None of the above. Show Answer Correct Answer: B) Insider. 33. Which of the following is the first computer virus? A) Creeper. B) Blaster. C) Sasser. D) None of the above. Show Answer Correct Answer: A) Creeper. 34. The Code Red is a sort of a ..... ? A) Antivirus Program. B) Video Editing Software. C) Computer Virus. D) Photo Editing Software. Show Answer Correct Answer: C) Computer Virus. 35. I can use public computers for work, such as those in hotel lobbies, libraries, etc. A) True. B) False. C) Depends on the information. D) None of the above. Show Answer Correct Answer: B) False. 36. What does VPN stand for? A) Verified Protected Network. B) Very Private Network. C) Variable Protocol Node. D) Virtual Private Network. Show Answer Correct Answer: D) Virtual Private Network. 37. What popular online activity involves allowing users to stay connected with friends, family, and peers? A) Affiliate networking. B) Social marketing. C) Social networking. D) Affiliate marketing. Show Answer Correct Answer: C) Social networking. 38. Gaining logical or physical access without permission to a computer network, system, application software, data, or other resource. A) Insecure servers. B) Unauthorized access. C) Virus spreading. D) None of the above. Show Answer Correct Answer: B) Unauthorized access. 39. Taking a secret message and reproducing the original plain text is known as? A) Encryption. B) Cipher Text. C) Decryption. D) Caesar Cipher. Show Answer Correct Answer: C) Decryption. 40. 10) Wireless networks allow Wi-Fi enabled devices, such as laptops and tablets, to connect to the network by way of the network identifier, known as the Service Set Identifier (SSID). A) False. B) True. C) All the above. D) None of the above. Show Answer Correct Answer: B) True. 41. A system that requires at least two steps to unlock protected information. A) Pen Testing. B) Multi-factor authentication. C) Rootkit. D) Social Engineering. Show Answer Correct Answer: B) Multi-factor authentication. 42. The security of the OS (operating system) cannot be enhanced by: A) Installing multiple web browsers to access the Internet. B) Using legitimate antivirus software. C) Using a firewall to filter network traffic. D) Managing user accounts securely. Show Answer Correct Answer: A) Installing multiple web browsers to access the Internet. 43. RSI (Repetitive Strain Injury) can be caused by: A) Moving heavy computers about frequently. B) Using a computer in almost all of your lessons. C) Using a keyboard for several hours a day over and over again. D) Sitting in the same position for too long. Show Answer Correct Answer: C) Using a keyboard for several hours a day over and over again. 44. Which one of the following is the key emerging cyber security risks as a result of COVID-19? A) Disruption to the workforce and global supply chains. B) Change in the cyber security risk landscape post COVID-19. C) A shift to remote working and prioritising business operations. D) All above. Show Answer Correct Answer: D) All above. 45. It helps keep data and equipment safe by giving only the appropriate people access. A) Network Security. B) Firewall. C) Antivirus. D) Security Threats. Show Answer Correct Answer: A) Network Security. 46. Which term is best described as a person or element that has the power to carry out a threat? A) Risk. B) Attack agent. C) Vulnerability. D) Threat agent. Show Answer Correct Answer: D) Threat agent. 47. Apa kepanjangan DOS dalam keamanan jaringan? A) Deniel of Service attack. B) Deny of Service Attack. C) Domw of Service Attack. D) None of the above. Show Answer Correct Answer: A) Deniel of Service attack. 48. Which one of the following best describes the effect of enabling an application to run macros? A) Your computer will be more technically stable. B) Your computer will be more energy efficient. C) Your computer will be more at risk from viruses. D) Your computer will be more at risk from power outages. Show Answer Correct Answer: C) Your computer will be more at risk from viruses. 49. What are some best practices for preventing malware infections? A) Click on all email attachments and links without caution. B) Never update software or operating systems. C) Use simple and easily guessable passwords. D) Regularly update software and operating systems, use strong passwords, be cautious of email attachments and links, use antivirus software, and regularly back up data. Show Answer Correct Answer: D) Regularly update software and operating systems, use strong passwords, be cautious of email attachments and links, use antivirus software, and regularly back up data. 50. A computer virus is a small program which: A) Will destroy your computer hardware. B) You may unintentionally transmit to other computers and infect them. C) Can only be transmitted via email. D) Cannot be removed from your computer. Show Answer Correct Answer: B) You may unintentionally transmit to other computers and infect them. 51. Password email kemenkeu sebaiknya diubah secara berkali, maksimal setelah ..... hari A) 90 hari. B) 120 hari. C) 60 hari. D) 30 hari. Show Answer Correct Answer: A) 90 hari. 52. In view of cyber threat, which one is the highest mitigation cost? A) Third Party Provider. B) Hacker Hobbyist. C) Cyber Terrorist. D) State Sponsored Attacks. Show Answer Correct Answer: D) State Sponsored Attacks. 53. Which of the following are the features of cloud computing A) Security. B) Availabilty. C) None of the above. D) Both a and b. Show Answer Correct Answer: D) Both a and b. 54. A network security device that monitors incoming and outgoing network traffic and decides whether it is safe. A) Anti-virus. B) Firewall. C) Encryption. D) Malware. Show Answer Correct Answer: B) Firewall. 55. What are internet cookies? A) A small text file that is stored on your computer when you visit some websites. B) A type of virus that can be downloaded from attachments. C) When a hacker tries to steal your information. D) A website that stores all your social networking profile details. Show Answer Correct Answer: A) A small text file that is stored on your computer when you visit some websites. 56. Viruses are ..... A) Man Made. B) Machine Made. C) Naturally Occur. D) All of the above. Show Answer Correct Answer: A) Man Made. 57. Under which law must healthcare enterprises guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format? A) COPPA. B) Sarbox. C) HIPAA. D) GLBA. Show Answer Correct Answer: C) HIPAA. 58. Which one of the following applications would you use to delete browsing history? A) Microsoft Access. B) Adobe Reader. C) OpenOffice Writer. D) Internet Explorer. Show Answer Correct Answer: D) Internet Explorer. 59. Firewall protecting it's information from ..... A) Application Security. B) Cloud security. C) Network thread. D) Financial risk. Show Answer Correct Answer: C) Network thread. 60. The ability to ensure that someone can't deny that they performed a certain act. A) MultifactorAuthentication. B) Non-repudiation. C) Authorization. D) Logging. Show Answer Correct Answer: B) Non-repudiation. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 9 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books