MCQ Mojo
access_time
menu
Quiz
Web Stories
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
Quiz
Quiz
/
Cyber security Class 12 MCQ Questions With Answers
1.
To keep your browser private, you can use the _______ mode.
incognito
confidential
encrypted
deception
2.
Which is NOT a type of malware?
Virus
Worm
Trojan horse
Sandwich
3.
What should you look out for when reading emails
All of above
Poor spelling and grammar
Sender's email
Request for personal information
4.
Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access
True
False
5.
Some websites have “http://” extension while some have “https://”What does the ‘s’ mean?
That the data entered on the website is secure and encrypted.
It’s a special website.
That it’s the latest version of the site.
Its being loaded in a simple format.
6.
______________ is way of protecting internet-connected systems, including: hardware, software and data, from cyberattacks
Cyber Security
Cyber Safe
SPAM
DDOS
7.
How did the reporters gain access to peoples voicemail in mobile phone hacking scandal in 2012?
They spoke to the victoms
They hacked their computers
They tried using the default PIN number which was frequently unchanged
They used white box testing
8.
Which of these is not a form of phishing
fake email
fake website link
spam
key logger
9.
Whats encryption?
Passing text thorough a maths algorithm to scramble text
Changing the letters by a set number (Caesar Cipher)
Changing to ASCII code
Converting text to hex
10.
Which of the following are activities that a hacker might attempt?
Stealing usernames and passwords
Modifying website content
Disrupting network communications
All of the above
11.
Businesses, Banks, Shops, Schools and Exam Boards all keep data on you and are required to keep it safe?
True
False
12.
Qwerty123 is a Strong Password (i.e. not a cyber security risk)
True
False
13.
Viruses, worms, and trojans are common security threats that are often used in spreading. What is the name for them all?
Malware
Formalware
Scams
The Spreading attackers
14.
Which one of the following is NOT a security threat?
Worms
Hacking
Anti-Virus
Pharming
15.
What is a keylogger?
Malware that locks your files until you pay the hacker to unlock them
Code that will run a malicious function if certain functions are met
Malware that steals senstive information.
A device / program that records the keys pressed.
16.
How does malware get onto your computer?
Email attachments or links
By visiting dodgy websites
On USB sticks
All of the above
17.
What type of program can you install to prevent malware?
Antivirus software
Office software
A new operating system
A disk defragmenter
18.
What is blagging?
Observing a person's private info over their shoulder
Cyber attack to redirect a website's traffic to another, fake site
Inventing a scenario to target someone into divulging information
A virus that registers key strokes
19.
Which one of the following is NOT a type of CyberSecurity Attack?
Worms
Randsomware
Spyware
Password Management
20.
Detecting Vulnerabilities in a computer system/network also includes employee behaviours and procedures?
True
False
Report Question
Previous
Next
warning
Submit
access_time
Time
Report Question
A bunch of text
Support mcqmojo.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page