Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 9 (60 MCQs)

Quiz Instructions

Select an option to see the correct answer instantly.

1. A computer virus may:
2. ..... is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain.
3. Which of the following four passwords is the most secure?
4. What do hackers do?
5. When a user does not have any broadband option, Which of the following will connect the computer to the internet?
6. What is the role of a network security admin in cyber security?
7. What is one of the main challenges of securing mobile devices?
8. What is the purpose of hiding information in encrypted form in plain sight on real websites?
9. IT criminality is estimated to be the world's 13th largest economy?
10. Some of the legal consequences for violating copyright laws include:
11. What is the purpose of the tracert command in Windows?
12. In which year India's IT act came into existance?
13. Why should you keep your passwords safe and secure?
14. Which of the following is not part of technology vulnerabilities?
15. What are the potential risks of using public Wi-Fi networks?
16. How can Akhil protect his personal information while using social media?
17. You can be confident your passwords are completely secure if:
18. A small file stored in user's computer by a website so the website can customize its appearance special for that user.
19. Your organization has been using more cloud resources and Lisa, the new CIO, is concerned about security. She want to add a service that is logically placed between the organization's network and the cloud provider. This service will monitor all network traffic and ensure that data sent to the cloud for storage is encrypted.Which of the following will BEST meet these requirements?
20. What is the default port number for the Telnet protocol?
21. What is the purpose of phishing attacks?
22. If you receive a call from someone that says to be a clerk from your bank, is it ok to give your bank account details over the phone?
23. Serangan yang melibatkan pengiriman email palsu yang tampak berasal dari sumber tepercaya untuk mencuri informasi sensitif disebut
24. What is the definition of RTO?
25. Identify the OSI model layer responsible for data encryption.
26. What is the speaker's ultimate goal in discussing cybersecurity?
27. What is the format of a MAC address?
28. Why is it important to keep the operating system updated and supported?
29. How can Veer protect his personal information while using social media?
30. Targeting phishing attacks where the attacker uses personal information about you in the attack is called .....
31. How can you create a strong password?
32. Which of the following passwords is the most secure?
33. 6) You probably have more than one online account, and each account should have a unique password.
34. A type of malware which restricts access to the computer system that it infects, and demands a fee be paid to the operators of the malware in order for the restriction to be removed is known as?
35. Which type of hacker has permission to hack?
36. A device that can convert digital signals to analog
37. Organisations holding personal data are allowed to:
38. The purpose of system software is
39. Which of these indicates a website is secure?
40. Internet of Things is not related to
41. Who is the father of computer security?
42. Shellshock adalah .....
43. Yang dimaksud dengan Cyber Security Awareness adalah .....
44. What is the most important activity in system hacking?
45. Posting comments about your boss could get you in trouble with
46. Taking an advantage of the small window when firmware being updated and before it's implimementd
47. What is Spyware?
48. Pemerintah Indonesia telah membentuk BSSN untuk menjaga keamanan jaringan Indonesia di dunia maya. Apakah kepanjangan dari BSSN?
49. Any company or agency's IT protection is managed and maintained by?
50. What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?
51. The following is NOT a security risk when a computer is connected to the internet
52. Which of these is the best description of extortion?
53. When should you use AntiVirus software?
54. Legitimate companies rarely send you emails that require you to enter your account name/username/password immediately or face really bad consequences. How do you check to be sure the email is really from a company you know?
55. Which of the following is not a social engineering technique?
56. Key Management process involves
57. The first phase of hacking an IT system is compromise of which foundation of security?
58. Posting comments about your teacher could get you in trouble with
59. What can you do to start preparing for a career in cyber security?
60. Which one of the following is known by the term WEP?