Cyber Security Quiz

What is the term used to describe a malicious software that disguises itself as a legitimate program?
Malware
Spyware
Adware
Ransomware
Which of the following is an example of a strong password?
IndrA*1 Punishing 9sQuarsons!
123456
MyDog'sName
Tr0ub4dor&3
Which of the following is an example of a phishing attack?
Receiving an email asking for your bank account details
Downloading a suspicious attachment from an unknown sender
Updating your antivirus software
Changing your password regularly
What is the purpose of a firewall in network security?
To monitor and control incoming and outgoing network traffic
To encrypt data transmissions
To detect and remove malware
To authenticate user access
What is the term used to describe a program that exploits vulnerabilities in software to gain unauthorized access to a system?
Exploit
Virus
Trojan Horse
Worm
Which of the following is an example of two-factor authentication?
Entering a password and receiving a verification code via SMS
Using a fingerprint scanner and entering a PIN
Creating a strong password
Enabling automatic software updates
What is the term used to describe the practice of tricking individuals into revealing sensitive information or performing actions they shouldn't?
Social Engineering
Phishing
Malware
Hacking
Which of the following is NOT a recommended practice for ensuring online privacy?
Using public Wi-Fi networks without encryption
Regularly clearing browser cookies and cache
Enabling private browsing mode
Using a virtual private network (VPN)
What is the term used to describe a type of attack that floods a network or website with excessive traffic, causing it to become unavailable?
DDoS (Distributed Denial of Service) attack
Phishing attack
Malware attack
Brute force attack
What does VPN stand for?
Virtual Private Network
Virus Protection Network
Very Private Network
Virtual Personal Network
{"name":"Cyber Security Quiz", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What is the term used to describe a malicious software that disguises itself as a legitimate program?, Which of the following is an example of a strong password?, Which of the following is an example of a phishing attack?","img":"https://cdn.poll-maker.com/US/94-4613430/photo-1572985025310-cc8cafbbf394.jpg?sz=1200-00000000001000005300"}
Powered by: Quiz Maker