This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 8 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. What are the best practices for practicing Cyber Hygiene? A) Regularly update software, use strong passwords, enable two-factor authentication, be cautious with emails, back up data, and stay informed about cybersecurity threats. B) Share personal information freely online. C) Ignore software updates. D) Use the same password for all accounts. Show Answer Correct Answer: A) Regularly update software, use strong passwords, enable two-factor authentication, be cautious with emails, back up data, and stay informed about cybersecurity threats. 2. Password email kemenkeu sebaiknya mengandung unsur ..... A) Tanggal lahir. B) Nama diri. C) Tempat lahir. D) Kombinasi angka, huruf kecil dan besar, serta karakter khusus. Show Answer Correct Answer: D) Kombinasi angka, huruf kecil dan besar, serta karakter khusus. 3. What is the purpose of encryption in data security? A) To create backups of data. B) To speed up data transfer rates. C) To improve the performance of applications. D) To make data unreadable to unauthorized users. Show Answer Correct Answer: D) To make data unreadable to unauthorized users. 4. Which one allows you to modify the ACL to allow users to edit view or copy A) DAC. B) MAC. C) RDAC. D) RBAC. Show Answer Correct Answer: A) DAC. 5. Dunia maya memberikan peluang besar kepada generasi muda, namun juga memiliki risiko. Apa yang dapat dilakukan untuk mengurangi risiko tersebut? A) Memastikan mereka tidak pernah menggunakan. B) Menyembunyikan informasi pribadi mereka secara total. C) Mengembangkan rasa kewarganegaraan digital untuk berperilaku baik di dunia maya. D) Mengajarkan mereka untuk menghindari teknologi sama sekali. E) Membiarkan begitu saja. Show Answer Correct Answer: C) Mengembangkan rasa kewarganegaraan digital untuk berperilaku baik di dunia maya. 6. Download copy, extract data from an open system done fraudulently is treated as ..... A) Cyber-warfare. B) Data-backup. C) Cyber-crime. D) Cyber-security act. Show Answer Correct Answer: C) Cyber-crime. 7. What is DNS Spoofing? A) Encrypting data with a key. B) Introducing data into a DNS resolver's cache to divert traffic. C) Sending phishing emails. D) Using antivirus software. Show Answer Correct Answer: B) Introducing data into a DNS resolver's cache to divert traffic. 8. Artificial Intelligence is related to A) Playing Games. B) Programming Computer wisely. C) Put your thinking in computer. D) Making the machine intelligent. Show Answer Correct Answer: D) Making the machine intelligent. 9. ..... is an active cyber defense activity. A) Maneuver. B) Threat Hunting. C) Intelligence Fusion. D) Configurations. Show Answer Correct Answer: B) Threat Hunting. 10. What is a botnet A) Computers trying to ATTACK you. B) Few computers. C) An interlinked connection of computers. D) Many computers. Show Answer Correct Answer: C) An interlinked connection of computers. 11. What is Steganography? A) A category of malicious software. B) A prehistoric creature. C) A technique for concealing information. D) A software application for graphing. Show Answer Correct Answer: C) A technique for concealing information. 12. What is the process of encoding information in a way so that only someone with a key can decode it? A) Compression. B) Data Encapsulation. C) Systemic variation. D) Encryption. Show Answer Correct Answer: D) Encryption. 13. The tasks of securing technology are frequently described as: A) Digital safety. B) Cybersecurity. C) Data protection. D) Network security. Show Answer Correct Answer: B) Cybersecurity. 14. Cyber Security can be defined as A) A catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information. B) The use of deception to trick somebody into sharing their personal information. C) The practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks. D) All of the above. E) None of the above. Show Answer Correct Answer: C) The practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks. 15. What can sometimes be a reason for unauthorized access to computer systems? A) Backdoors left by programmers. B) Strong passwords. C) Updated antivirus software. D) Public Wi-Fi networks. Show Answer Correct Answer: A) Backdoors left by programmers. 16. Its okay to use phone number as your password. A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 17. Apa yang dimaksud dengan serangan phishing dalam keamanan siber? A) Serangan yang mengirimkan virus ke perangkat. B) Serangan yang melumpuhkan jaringan komputer. C) Serangan yang menciptakan salinan data sensitif. D) Serangan yang mencuri informasi pribadi dengan menyamar sebagai entitas sah. Show Answer Correct Answer: D) Serangan yang mencuri informasi pribadi dengan menyamar sebagai entitas sah. 18. Which of the following describe a person looking for old credit card statements in to an attempts to obtain credit card number? A) Phishing. B) Social engineering. C) Shoulder surfing. D) Dumpster diving. Show Answer Correct Answer: D) Dumpster diving. 19. Legitimate-looking email is sent to target. The target click a link and sent to a fake website or fooled into giving personal data. A) Pharming. B) Hacking. C) Spamming. D) Phishing. Show Answer Correct Answer: D) Phishing. 20. Which of the following is a fixed storage drive without mechanical component? A) Hard disk drive. B) Floppy disk drive. C) Solid state drive. D) Optical drive. Show Answer Correct Answer: C) Solid state drive. 21. What is a word pronunced (f-i-sh-ing) mean. A) Phishing. B) Fishing. C) All the above. D) None of the above. Show Answer Correct Answer: A) Phishing. 22. How can we make our Wi-Fi secure? A) Share your password with everyone. B) Use an open network. C) Disable all security features. D) Change default SSID and password, enable WPA3, disable WPS, update firmware, use guest network. Show Answer Correct Answer: D) Change default SSID and password, enable WPA3, disable WPS, update firmware, use guest network. 23. Which is not a type of malware A) Virus. B) Trojan. C) Worm. D) Sandwich. Show Answer Correct Answer: D) Sandwich. 24. Why may some people try to scam you? A) To steal your money and or credit card information. B) All answers are correct. C) Because they are a cyber-thief. D) To get your information to use in a harmful way. Show Answer Correct Answer: B) All answers are correct. 25. What is the number one cause of most cyber breaches? A) Viruses, malware and ransomware. B) Hackers getting into sensitive data. C) Employees revealing their passwords or financial information. D) Companies not being careful with your data. Show Answer Correct Answer: C) Employees revealing their passwords or financial information. 26. What is the primary responsibility of the Transport Layer? A) Reliable data delivery between applications. B) Routing and addressing of data packets. C) Physical transmission of data. D) Interacting with user applications. Show Answer Correct Answer: A) Reliable data delivery between applications. 27. Berikut adalah tindakan preventif yang dapat dilakukan untuk menjaga keamanan informasi, kecuali ..... A) Menerapkan kebijakan kata sandi yang baik. B) Melakukan backup data secara berkala. C) Menggunakan jaringan yang aman. D) Tidak memakai antivirus. Show Answer Correct Answer: D) Tidak memakai antivirus. 28. Which one of the following is an online activity that should only be undertaken on a secure web page? A) Using a search engine. B) Purchasing a gift. C) Watching a TV show. D) Paying a game. Show Answer Correct Answer: B) Purchasing a gift. 29. Firewall is the concept of ..... A) Authorization. B) Keep a bad people out of the computer. C) Keep a good people out of the computer. D) Authentication. Show Answer Correct Answer: B) Keep a bad people out of the computer. 30. In mandatory access control, what determines the assignment of data classifications? (Information Security & Risk Management Domain) A) The user's evaluation of a particular information element. B) A security classification policy / guideline. C) The assessment by the information security department. D) The analysis of the users in conjunction with the audit department. Show Answer Correct Answer: B) A security classification policy / guideline. 31. Apa yang dimaksud dengan "ransomware" ? A) Program antivirus yang baik. B) Jenis malware yang mengenkripsi data dan meminta pembayaran tebusan. C) Program yang melindungi perangkat dari virus. D) Serangan yang mencuri data pribadi. Show Answer Correct Answer: B) Jenis malware yang mengenkripsi data dan meminta pembayaran tebusan. 32. How do we keep our computers safe? A) Use strong passwords, install antivirus software, keep software updated, avoid suspicious links, and back up data. B) Ignore software updates. C) Use the same password for all accounts. D) Click on all email links without checking. Show Answer Correct Answer: A) Use strong passwords, install antivirus software, keep software updated, avoid suspicious links, and back up data. 33. Terrorists who turn their attacks to the network and computer infrastructure to cause panic among citizens are known as which of the following? A) Hactivists. B) Cyberterrorists. C) Hackers. D) Spies. Show Answer Correct Answer: B) Cyberterrorists. 34. Which one of the following is a method of social engineering? A) Creating accounts on several popular social networking sites. B) Uploading videos on a blog very frequently. C) Linking to many websites from a social networking site. D) Sending e-mail that falsely claims to be from a legitimate source. Show Answer Correct Answer: D) Sending e-mail that falsely claims to be from a legitimate source. 35. Can a password from your old MySpace account provide access to valuable information if it falls into the wrong hands? A) No, who is even using MySpace today?. B) I don't know. C) Absolutely!. D) No, I am not using the account anymore. Show Answer Correct Answer: C) Absolutely!. 36. What are the potential dangers of clicking on unknown links or pop-ups while browsing the internet? A) Learning new skills and knowledge. B) Getting free gifts and prizes. C) Improving internet speed. D) Potential dangers include malware, viruses, phishing scams, and identity theft. Show Answer Correct Answer: D) Potential dangers include malware, viruses, phishing scams, and identity theft. 37. What is a common method of protecting data by creating a duplicate copy of it, often stored in a different location? A) Encryption. B) Firewalls. C) Data backup. D) Password protection. Show Answer Correct Answer: C) Data backup. 38. Which protocol uses port 443 for secure communications? A) FTP. B) HTTP. C) SMTP. D) HTTPS. Show Answer Correct Answer: D) HTTPS. 39. Devices are connected directly to each other without any additional networking devices between them. A) Peer-to-peer Network. B) Client-Server Network. C) All the above. D) None of the above. Show Answer Correct Answer: A) Peer-to-peer Network. 40. A program that can replicate itself with the intention of deleting, creating or corrupting files A) Virus. B) Cookies. C) Spyware. D) Spams. Show Answer Correct Answer: A) Virus. 41. Evelyn is working as a graphic designer in a cyber security company. What is her primary role in the company? A) Designing posters and creating eye-catching images to teach people about security. B) Monitoring computer networks for potential attacks. C) Testing targeted systems to find vulnerabilities. D) Explaining the possible dangers of social media to people. Show Answer Correct Answer: A) Designing posters and creating eye-catching images to teach people about security. 42. What does MIRAI mean? A) Future. B) A botnet. C) Joseph White. D) None of the above. Show Answer Correct Answer: A) Future. 43. Is it considered safe to use the same complex password on all websites? A) Yes. B) No. C) All the above. D) None of the above. Show Answer Correct Answer: B) No. 44. A method to verify that data comes from a secure and trusted source A) Authentication. B) Encryption. C) Caching. D) Decryption. Show Answer Correct Answer: A) Authentication. 45. Memasukkan semua gambar aktivitas dan lokasi ke dalam sosial media A) Benar. B) Salah. C) All the above. D) None of the above. Show Answer Correct Answer: B) Salah. 46. The previous question was related to which topic A) Cyber security. B) A.I. C) Digital marketing. D) All of them. Show Answer Correct Answer: C) Digital marketing. 47. Why should you be careful to open or download from a website A) Could be inappropriate. B) Could have a virus. C) It could steal your information. D) All of the above. Show Answer Correct Answer: D) All of the above. 48. What is social engineering in the context of cyber security? A) A method to enhance network security protocols. B) Social engineering is the manipulation of individuals to obtain confidential information for malicious purposes. C) A technique for improving user interface design. D) A strategy for increasing software performance. Show Answer Correct Answer: B) Social engineering is the manipulation of individuals to obtain confidential information for malicious purposes. 49. Which of the following malware infection is responsible for installing an application on a device and reporting on the user's activities? A) Adware. B) Virus. C) Worm. D) Ransomware. Show Answer Correct Answer: B) Virus. 50. What is the result of data sets that are large and complex, making traditional data processing applications inadequate? A) Big data. B) Bring Your Own Device (BYOD). C) Internet of Things (IoT). D) Advanced persistent threat (APT). Show Answer Correct Answer: A) Big data. 51. What is the point of encryption? A) To prevent malware. B) So that only people who have the key can decrypt sensitive data. C) To make the WiFi faster. D) To create jobs for computer experts. Show Answer Correct Answer: B) So that only people who have the key can decrypt sensitive data. 52. Under the Computer Misuse Act, it is illegal to: A) Look at someone else's computer files without permission. B) Look at someone else's computer files without permission with intent to commit further criminal offences. C) Change data on someone else's computer files without permission. D) All of the above. Show Answer Correct Answer: D) All of the above. 53. What is a single entrance for multiple connectivities called? A) Worms. B) Directory service. C) Web services. D) Phishing. Show Answer Correct Answer: B) Directory service. 54. Apa kepanjangan dari BCN? A) Biro Cyber Nusantara. B) Biro Cendekia Nasional. C) Badan Security Nasional. D) Badan Cyber Nasional. Show Answer Correct Answer: D) Badan Cyber Nasional. 55. Cyber-laws are incorporated for punishing all criminals only A) True. B) False. C) All the above. D) None of the above. Show Answer Correct Answer: B) False. 56. What does TLS stand for? A) Thread Local Storage. B) Target Level of Safety. C) Transport Layer Security. D) Threaded Locking System. Show Answer Correct Answer: C) Transport Layer Security. 57. According to the speaker, what is the role of cybersecurity in organizations? A) To limit employee internet access. B) To protect and secure digital assets. C) To monitor employee productivity. D) To advertise products online. Show Answer Correct Answer: B) To protect and secure digital assets. 58. Is it useful to run antivirus software on an Android phone? A) Yes. B) It depends, only if you download apps from outside of Google's official app store. C) NO. D) None of the above. Show Answer Correct Answer: B) It depends, only if you download apps from outside of Google's official app store. 59. What is an non-technical way for an attacker to gather information A) Brute Force Attack. B) Shoulder surfing. C) Scarware. D) Phishing. Show Answer Correct Answer: B) Shoulder surfing. 60. Laws that protect an author's work. A) CopyLeft Legal Spies. B) Copyright Laws. C) Copyleft Laws. D) Copyright Rules. Show Answer Correct Answer: B) Copyright Laws. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 9 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books