Please refer to Computer Science For Network Security Class 12 Computer Science Exam Questions provided below. These questions and answers for Class 12 Computer Science have been designed based on the past trend of questions and important topics in your class 12 Computer Science books. You should go through all Class 12 Computer Science Important Questions provided by our teachers which will help you to get more marks in upcoming exams.
Class 12 Computer Science Exam Questions Network Security
Very Short Answer Type Questions :
Question. Define the term Cookies?
Answer: Cookies are messages that a Web server transmits to a Web browser so that the Web server can keep track of the user’s activity on a specific website.
Question. Differentiate the Hackers and Crackers?
Answer: Hackers are the programmers more interested in gaining knowledge about computer system and possibly using this knowledge for playful pranks.
Crackers are the malicious programmers who break into secure systems.
Question. Amit works for a marketing company as a salesman. He works on Internet for 6-8 hours a day. His laptop got infected with viruses due to some causes. Which one of the following is a Virus prevention method, he did not follow?
a) Create a separate folder for spam mails.
b) Installing an antivirus software and keep up to date.
c) Creating a secure password for the laptop.
d) Using credit card for online shopping.
Answer: Installing an antivirus software and keep up to date.
Question. What is Cyberlaw?
Answer: Cyberlaw refers to all the legal and regulatory aspects of Internet and the world wide web (www).
Question. Define the term Cyber Crime?
Answer: Cyber Crime refers to an unlawful act where in the computer is either a tool or a target or both. Cybercrime is committed in an electronic medium
Question. Define the following terms :
b) Trojan Horse
Answer: a) Virus is a malicious program that requires a host and is designed to make a system sick.
b) Trojan Horses is code hidden in a program such as a game or spreadsheet that looks safe to run but has hidden side effects.
c) Worm is a program designed to replicate. It is self-contained and does not require a host.
Question. Name the Protection methods used to reduce the security threats?
Answer: Authorization, Authentication, Encrypted Smart Cards, Biometric System, Firewall etc.
Question. What is Firewall?
Answer: A system designed to prevent unauthorized access to or from a private network is called Firewall.
Question. Which of the following is defined as a Spam?
a) A malicious program that requires a host and is designed to make a system sick.
b) Code hidden in a program.
c) An electronic junk mail or junk newsgroup postings.
d) A program designed to replicate
Answer: An electronic junk mail or junk newsgroup postings.
Question. What are the different Cyber Crimes (Any Four)?
Answer: a) Tempering with computer course documents
c) Child pornography
d) Accessing protected system