Impacts of technologies and cybersecurity

What is the term used to describe unauthorized access or use of computer systems?
Hacking
Phishing
Malware
Encryption
Which of the following is an example of a strong password?
P
123456
Password123
Qwerty
Abc123
What does the acronym 'VPN' stand for?
Virtual Private Network
Virus Protection Network
Virtual Personal Network
Very Private Network
Which of the following is an example of two-factor authentication?
Entering a password and receiving a verification code via SMS
Using a fingerprint scanner
Answering security questions
Using a PIN code
What is the purpose of a firewall in cybersecurity?
To monitor and control incoming and outgoing network traffic
To encrypt sensitive data
To detect and remove malware
To authenticate users
What is the term used to describe a malicious software that disguises itself as legitimate software?
Malware
Spyware
Ransomware
Adware
What is the main purpose of encryption in cybersecurity?
To secure sensitive data by converting it into unreadable form
To detect and remove viruses
To prevent unauthorized access to networks
To authenticate users
What is the term used to describe a cyber attack where an attacker attempts to deceive individuals into revealing sensitive information?
Phishing
Hacking
Malware
Firewall
Which of the following is an example of a physical security measure?
Biometric access control systems
Firewalls
Antivirus software
Encryption
What is the term used to describe a program that replicates itself and spreads to other computers without user intervention?
Worm
Virus
Trojan
Spyware
{"name":"Impacts of technologies and cybersecurity", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What is the term used to describe unauthorized access or use of computer systems?, Which of the following is an example of a strong password?, What does the acronym 'VPN' stand for?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker