This quiz works best with JavaScript enabled. Home > Cbse > Class 12 > Science > Computer Science > Class 12 Computer Science Chapter 5 Networking And Cyber Security – Quiz 9 🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 9 (60 MCQs) Quiz Instructions Select an option to see the correct answer instantly. 1. A computer virus may: A) Overwrite your files and corrupt your data. B) Steal important information from your computer. C) Use a lot of memory and slow down your computer. D) All of the above. Show Answer Correct Answer: D) All of the above. 2. ..... is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain. A) Cyber-terrorism. B) Cyber-warfare. C) Cyberattack. D) Cyber campaign. Show Answer Correct Answer: A) Cyber-terrorism. 3. Which of the following four passwords is the most secure? A) Not sure. B) 123456. C) WTh!5Z. D) Boat123. Show Answer Correct Answer: C) WTh!5Z. 4. What do hackers do? A) They steal computer software. B) They steal your information. C) THEY PLAY MINECRAFT. D) They steal cars. Show Answer Correct Answer: B) They steal your information. 5. When a user does not have any broadband option, Which of the following will connect the computer to the internet? A) SSD. B) Modem. C) RAM eSATA. D) None of the above. Show Answer Correct Answer: B) Modem. 6. What is the role of a network security admin in cyber security? A) Designing posters and creating eye-catching images to teach people about security. B) Monitoring computer networks and detecting hackers. C) Teaching people how to spot scams and phishing attempts. D) Testing targeted systems to see if they can be hacked. Show Answer Correct Answer: B) Monitoring computer networks and detecting hackers. 7. What is one of the main challenges of securing mobile devices? A) Mobile devices are more prone to physical theft or loss than desktop computers. B) Mobile devices rely on OEMs to update the system software, which may be delayed or unavailable. C) Mobile devices use wireless connections that may be intercepted or hacked by attackers. D) All of the above. Show Answer Correct Answer: D) All of the above. 8. What is the purpose of hiding information in encrypted form in plain sight on real websites? A) To trick anti-virus programs. B) To confuse search engine bots. C) To evade spam filters. D) To communicate secretly. Show Answer Correct Answer: D) To communicate secretly. 9. IT criminality is estimated to be the world's 13th largest economy? A) False. B) True. C) Wrong Question. D) No answer. Show Answer Correct Answer: B) True. 10. Some of the legal consequences for violating copyright laws include: A) Ankle Bracelet. B) Imprisonment, Fines and loss of job prospects. C) House Seizure. D) Hard Labor. Show Answer Correct Answer: B) Imprisonment, Fines and loss of job prospects. 11. What is the purpose of the tracert command in Windows? A) Display all active network connections. B) Trace the route packets take to a destination. C) Test DNS resolution. D) Display routing tables. Show Answer Correct Answer: B) Trace the route packets take to a destination. 12. In which year India's IT act came into existance? A) 2009. B) 2001. C) 2000. D) 2002. Show Answer Correct Answer: C) 2000. 13. Why should you keep your passwords safe and secure? A) So anyone can access your bank account. B) To prevent someone having access to your personal accounts and information. C) So a stranger knows where to find you. D) So your neighbor knows your information. Show Answer Correct Answer: B) To prevent someone having access to your personal accounts and information. 14. Which of the following is not part of technology vulnerabilities? A) Network equipment vulnerabilities. B) TCP/IP protocol vulnerabilities. C) Lack of written security policies. D) Operating System vulnerabilities. Show Answer Correct Answer: C) Lack of written security policies. 15. What are the potential risks of using public Wi-Fi networks? A) Improved internet speed. B) Increased privacy and security. C) Potential risks include exposure to hackers, data interception, and unauthorized access to personal information. D) Financial gain. Show Answer Correct Answer: C) Potential risks include exposure to hackers, data interception, and unauthorized access to personal information. 16. How can Akhil protect his personal information while using social media? A) Share personal information with anyone who asks for it. B) Use strong and unique passwords for social media accounts, enable privacy settings, and avoid sharing sensitive information publicly. C) Ignore privacy settings and share all personal information publicly. D) Use the same password for all social media accounts. Show Answer Correct Answer: B) Use strong and unique passwords for social media accounts, enable privacy settings, and avoid sharing sensitive information publicly. 17. You can be confident your passwords are completely secure if: A) They are at least 6 characters long. B) You change them regularly like once a year. C) You use different passwords for all your online accounts. D) None of the above. Show Answer Correct Answer: D) None of the above. 18. A small file stored in user's computer by a website so the website can customize its appearance special for that user. A) Virus. B) Cookies. C) Spam. D) Spyware. Show Answer Correct Answer: B) Cookies. 19. Your organization has been using more cloud resources and Lisa, the new CIO, is concerned about security. She want to add a service that is logically placed between the organization's network and the cloud provider. This service will monitor all network traffic and ensure that data sent to the cloud for storage is encrypted.Which of the following will BEST meet these requirements? A) CASB. B) Storage permissions. C) A storage encryption policy. D) Firewall. Show Answer Correct Answer: A) CASB. 20. What is the default port number for the Telnet protocol? A) 21. B) 23. C) 30. D) 25. Show Answer Correct Answer: B) 23. 21. What is the purpose of phishing attacks? A) To steal sensitive information by masquerading as a trustworthy entity. B) To create backups of data. C) To provide two-factor authentication. D) To secure web applications. Show Answer Correct Answer: A) To steal sensitive information by masquerading as a trustworthy entity. 22. If you receive a call from someone that says to be a clerk from your bank, is it ok to give your bank account details over the phone? A) Yes. B) Never. C) Only if I recognize that the phone number is from my bank. D) None of the above. Show Answer Correct Answer: C) Only if I recognize that the phone number is from my bank. 23. Serangan yang melibatkan pengiriman email palsu yang tampak berasal dari sumber tepercaya untuk mencuri informasi sensitif disebut A) Spyware. B) Malware. C) Phising. D) Ransomeware. Show Answer Correct Answer: C) Phising. 24. What is the definition of RTO? A) Recovery Time Objective is the time it takes to restore a business process after a failure. B) Recovery Time Occurrences are the number of systems failures within a given reporting period. C) Recovery Time Objective is the amount of time that has transpired since a previous failure. D) Recovery Time Operations are the times associated with each recovery operation needed to recover from a failure. Show Answer Correct Answer: A) Recovery Time Objective is the time it takes to restore a business process after a failure. 25. Identify the OSI model layer responsible for data encryption. A) Session Layer. B) Transport Layer. C) Network Layer. D) Presentation Layer. Show Answer Correct Answer: D) Presentation Layer. 26. What is the speaker's ultimate goal in discussing cybersecurity? A) To sell cybersecurity software. B) To discourage the use of the internet. C) To promote his cybersecurity company. D) To encourage the audience to embrace cybersecurity. Show Answer Correct Answer: D) To encourage the audience to embrace cybersecurity. 27. What is the format of a MAC address? A) 32-bit decimal number. B) 48-bit hexadecimal number. C) 128-bit binary number. D) 64-bit alphanumeric string. Show Answer Correct Answer: B) 48-bit hexadecimal number. 28. Why is it important to keep the operating system updated and supported? A) To fix any security vulnerabilities or bugs that may be exploited by attackers. B) To add new features or functionalities that may improve the user experience or productivity. C) To maintain compatibility with other software or hardware components that may change over time. D) All of the above. Show Answer Correct Answer: D) All of the above. 29. How can Veer protect his personal information while using social media? A) Share personal information with anyone who asks for it. B) Use strong and unique passwords for social media accounts, enable privacy settings, and avoid sharing sensitive information publicly. C) Ignore privacy settings and share all personal information publicly. D) Use the same password for all social media accounts. Show Answer Correct Answer: B) Use strong and unique passwords for social media accounts, enable privacy settings, and avoid sharing sensitive information publicly. 30. Targeting phishing attacks where the attacker uses personal information about you in the attack is called ..... A) Whaling. B) Spear Phishing. C) Vishing. D) Smishing. Show Answer Correct Answer: B) Spear Phishing. 31. How can you create a strong password? A) Use only lowercase letters. B) Create a strong password by using a combination of uppercase and lowercase letters, numbers, and special characters. C) Use a password that is easy to guess. D) Use the same password for all accounts. Show Answer Correct Answer: B) Create a strong password by using a combination of uppercase and lowercase letters, numbers, and special characters. 32. Which of the following passwords is the most secure? A) 123456. B) WTh!5Z. C) QWERT123. D) Thisisapassword. Show Answer Correct Answer: B) WTh!5Z. 33. 6) You probably have more than one online account, and each account should have a unique password. A) False. B) True. C) All the above. D) None of the above. Show Answer Correct Answer: B) True. 34. A type of malware which restricts access to the computer system that it infects, and demands a fee be paid to the operators of the malware in order for the restriction to be removed is known as? A) Spim. B) Ransomware. C) Spam. D) Virus. Show Answer Correct Answer: B) Ransomware. 35. Which type of hacker has permission to hack? A) White Hat. B) Grey Hat. C) Black Hat. D) Blue Hat. Show Answer Correct Answer: A) White Hat. 36. A device that can convert digital signals to analog A) A packet. B) A modem. C) An emulator. D) None of the above. Show Answer Correct Answer: B) A modem. 37. Organisations holding personal data are allowed to: A) Sell the data to other organisations. B) Keep the data for ever. C) Sell the data for research purposes after removing bits of data from which individuals can be identified. D) None of the above. Show Answer Correct Answer: C) Sell the data for research purposes after removing bits of data from which individuals can be identified. 38. The purpose of system software is A) To act as a bridge between your apps and the hardware. B) To plan projects. C) To create files such as spreadsheets. D) To write programs/games in languages like VB, Python or Java. Show Answer Correct Answer: A) To act as a bridge between your apps and the hardware. 39. Which of these indicates a website is secure? A) You found the website on Google or clicked it from a link in an email. B) A little lock icon next to the website address. C) The website shows a company name and logo and looks real. D) None of the above. Show Answer Correct Answer: B) A little lock icon next to the website address. 40. Internet of Things is not related to A) Capacity. B) Privatization. C) Cyber Security. D) Data Storage Standard. Show Answer Correct Answer: A) Capacity. 41. Who is the father of computer security? A) August kercknoffs. B) Robert. C) Charles. D) Bob thomas. Show Answer Correct Answer: A) August kercknoffs. 42. Shellshock adalah ..... A) Shock pada lubang keamanan. B) Lubang keamanan di shell bash. C) Shell yang banyak digunakan. D) Sebuah program yang menerima perintah dari kita, kemudian mengeksekusinya. Show Answer Correct Answer: B) Lubang keamanan di shell bash. 43. Yang dimaksud dengan Cyber Security Awareness adalah ..... A) Kesadaran tentang ancaman keamanan digital. B) Kesadaran tentang ancaman penculikan. C) Kesadaran tentang ancaman bencana alam. D) Kesadaran tentang ancaman kesehatan. E) Kesadaran tentang ancaman komputer. Show Answer Correct Answer: A) Kesadaran tentang ancaman keamanan digital. 44. What is the most important activity in system hacking? A) Covering Tracks. B) Information Gathering. C) Cracking Password. D) Escalating Privileges. Show Answer Correct Answer: C) Cracking Password. 45. Posting comments about your boss could get you in trouble with A) Your friends. B) Your school. C) Your employer. D) None of the above. Show Answer Correct Answer: C) Your employer. 46. Taking an advantage of the small window when firmware being updated and before it's implimementd A) Virus. B) Worm. C) Zero Day Exploit. D) Password Attack. Show Answer Correct Answer: C) Zero Day Exploit. 47. What is Spyware? A) Something that James Bond does. B) A software that spies on what the computer user is doing. C) Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. D) Software that obtains and coverts the users information from the computer hardware. Show Answer Correct Answer: C) Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. 48. Pemerintah Indonesia telah membentuk BSSN untuk menjaga keamanan jaringan Indonesia di dunia maya. Apakah kepanjangan dari BSSN? A) Badan Siber dan Sandi Nasional. B) Badan Siber dan Silang Nasional. C) Bagan Siber dan Silang Nasional. D) None of the above. Show Answer Correct Answer: A) Badan Siber dan Sandi Nasional. 49. Any company or agency's IT protection is managed and maintained by? A) IT Security Engineer. B) Security Auditor. C) CEO of the organisation. D) Software Security Specialist. Show Answer Correct Answer: A) IT Security Engineer. 50. What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)? A) De-anonymization by Network Operators. B) Phishing Attacks. C) Key-logging. D) Snooping by Hackers. Show Answer Correct Answer: D) Snooping by Hackers. 51. The following is NOT a security risk when a computer is connected to the internet A) Pharming. B) Smishing. C) Cooking. D) Phishing. Show Answer Correct Answer: C) Cooking. 52. Which of these is the best description of extortion? A) Computers are locked and payment is demanded to unlock them. B) A leak of confidential information is threatened if a payment is not made. C) Websites are covered in graffiti. D) Email addresses are sent thousands of emails. Show Answer Correct Answer: B) A leak of confidential information is threatened if a payment is not made. 53. When should you use AntiVirus software? A) When you first purchase a new computer. B) All the time, only on your laptop-and ensure it is regularly updated!. C) All the time, on ALL digital devices-and ensure they are regularly updated!. D) When you start experiencing symptoms of a computer virus. Show Answer Correct Answer: C) All the time, on ALL digital devices-and ensure they are regularly updated!. 54. Legitimate companies rarely send you emails that require you to enter your account name/username/password immediately or face really bad consequences. How do you check to be sure the email is really from a company you know? A) Open your web browser & log-on to the site the way you normally would. B) Click on the link in the email. C) All the above. D) None of the above. Show Answer Correct Answer: A) Open your web browser & log-on to the site the way you normally would. 55. Which of the following is not a social engineering technique? A) Blagging. B) Hacking. C) Phishing. D) Pharming. Show Answer Correct Answer: B) Hacking. 56. Key Management process involves A) Key generation,. B) Storage. C) Key generation only. D) Both Key generation and storage. Show Answer Correct Answer: D) Both Key generation and storage. 57. The first phase of hacking an IT system is compromise of which foundation of security? A) Integrity. B) Authentication. C) Availability. D) Confidentiality. Show Answer Correct Answer: D) Confidentiality. 58. Posting comments about your teacher could get you in trouble with A) Your friends. B) Your school. C) Your employer. D) None of the above. Show Answer Correct Answer: B) Your school. 59. What can you do to start preparing for a career in cyber security? A) Take courses online. B) Practice coding and talk to others interested in computers and security. C) Find a mentor. D) All of the above. Show Answer Correct Answer: D) All of the above. 60. Which one of the following is known by the term WEP? A) Wired Enabled Protection. B) Wi-Fi Enabled Protection. C) Wired Equivalent Privacy. D) Wi-Fi Equivalent Privacy. Show Answer Correct Answer: C) Wired Equivalent Privacy. ← PreviousNext →Related QuizzesScience QuizzesClass 12 QuizzesClass 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 1Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 2Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 3Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 4Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 5Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 6Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 7Class 12 Computer Science Chapter 5 Networking And Cyber Security Quiz 8 🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books