Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. What are the best practices for practicing Cyber Hygiene?
2. Password email kemenkeu sebaiknya mengandung unsur .....
3. What is the purpose of encryption in data security?
4. Which one allows you to modify the ACL to allow users to edit view or copy
5. Dunia maya memberikan peluang besar kepada generasi muda, namun juga memiliki risiko. Apa yang dapat dilakukan untuk mengurangi risiko tersebut?
6. Download copy, extract data from an open system done fraudulently is treated as .....
7. What is DNS Spoofing?
8. Artificial Intelligence is related to
9. ..... is an active cyber defense activity.
10. What is a botnet
11. What is Steganography?
12. What is the process of encoding information in a way so that only someone with a key can decode it?
13. The tasks of securing technology are frequently described as:
14. Cyber Security can be defined as
15. What can sometimes be a reason for unauthorized access to computer systems?
16. Its okay to use phone number as your password.
17. Apa yang dimaksud dengan serangan phishing dalam keamanan siber?
18. Which of the following describe a person looking for old credit card statements in to an attempts to obtain credit card number?
19. Legitimate-looking email is sent to target. The target click a link and sent to a fake website or fooled into giving personal data.
20. Which of the following is a fixed storage drive without mechanical component?
21. What is a word pronunced (f-i-sh-ing) mean.
22. How can we make our Wi-Fi secure?
23. Which is not a type of malware
24. Why may some people try to scam you?
25. What is the number one cause of most cyber breaches?
26. What is the primary responsibility of the Transport Layer?
27. Berikut adalah tindakan preventif yang dapat dilakukan untuk menjaga keamanan informasi, kecuali .....
28. Which one of the following is an online activity that should only be undertaken on a secure web page?
29. Firewall is the concept of .....
30. In mandatory access control, what determines the assignment of data classifications? (Information Security & Risk Management Domain)
31. Apa yang dimaksud dengan "ransomware" ?
32. How do we keep our computers safe?
33. Terrorists who turn their attacks to the network and computer infrastructure to cause panic among citizens are known as which of the following?
34. Which one of the following is a method of social engineering?
35. Can a password from your old MySpace account provide access to valuable information if it falls into the wrong hands?
36. What are the potential dangers of clicking on unknown links or pop-ups while browsing the internet?
37. What is a common method of protecting data by creating a duplicate copy of it, often stored in a different location?
38. Which protocol uses port 443 for secure communications?
39. Devices are connected directly to each other without any additional networking devices between them.
40. A program that can replicate itself with the intention of deleting, creating or corrupting files
41. Evelyn is working as a graphic designer in a cyber security company. What is her primary role in the company?
42. What does MIRAI mean?
43. Is it considered safe to use the same complex password on all websites?
44. A method to verify that data comes from a secure and trusted source
45. Memasukkan semua gambar aktivitas dan lokasi ke dalam sosial media
46. The previous question was related to which topic
47. Why should you be careful to open or download from a website
48. What is social engineering in the context of cyber security?
49. Which of the following malware infection is responsible for installing an application on a device and reporting on the user's activities?
50. What is the result of data sets that are large and complex, making traditional data processing applications inadequate?
51. What is the point of encryption?
52. Under the Computer Misuse Act, it is illegal to:
53. What is a single entrance for multiple connectivities called?
54. Apa kepanjangan dari BCN?
55. Cyber-laws are incorporated for punishing all criminals only
56. What does TLS stand for?
57. According to the speaker, what is the role of cybersecurity in organizations?
58. Is it useful to run antivirus software on an Android phone?
59. What is an non-technical way for an attacker to gather information
60. Laws that protect an author's work.