Quiz Password Attack and Insider Threat
Quiz about password attack and insider threat.
0
0
0
1
1.What is a password attack?
b) An attempt to guess a password by entering all possible combinations
a) A type of computer virus
c) A method of encrypting passwords
d) A software program for password management
2
2.What is a way to prevent password attacks?
D) Write down your password and keep it in a visible place
C) Share your password with friends and family
B) Use the same password for all accounts
A) Use a combination of uppercase and lowercase letters, numbers, and symbols for your password
3
3.What is the most commonly used password?
c) qwerty
b) password
d) admin
a) 123456
4
4.Which of the following is NOT a recommended password practice?
d) Writing down passwords on a sticky note and leaving it on your desk
b) Using a unique password for each account
c) Using a password manager to generate and store passwords
a) Using a combination of upper and lower case letters, numbers, and symbols
5
5.Which of the following is a recommended password length?
b) 12 characters
c) 16 characters
a) 8 characters
d) 4 characters
6
6.Which of the following is a common example of a phishing password attack?
d) Asking a user to change their password on a legitimate website
b) Physically stealing a password written down on a piece of paper
a) Sending an email with a link to a fake login page
c) Guessing a password by trying different combinations
7
7.What is the term used for a password attack that tries every possible combination of characters until it finds the correct password?
c) Phishing attack
a) Dictionary attack
b) Brute force attack
d) Spoofing attack
8
8.What is the term used for a password attack that uses a pre-determined list of common passwords to try and guess the correct one?
c) Phishing attack
a) Dictionary attack
d) Spoofing attack
b) Brute force attack
9
9.Which of the following is a type of biometric authentication?
c) Answering security questions
b) Entering a PIN code
a) Entering a passphrase
d) Scanning a fingerprint
10
10.Which of the following is NOT a recommended strategy for securing passwords?
b) Storing passwords in plain text
a) Using a password manager
c) Enabling two-factor authentication
d) Keeping passwords confidential and not sharing them
11
11.What is an insider threat?
A) An employee or contractor who misuses their access to an organization's systems or data
B) An external hacker attacking a system
C) A security vulnerability in software
D) A natural disaster that disrupts business operations
12
12.What are some common types of insider threats?
A) Data theft or sabotage by employees
D) Malware infections
B) Phishing attacks
C) Social engineering scams
13
13.What is the best way to prevent insider threats?
A) Fire all employees and contractors
D) Provide employees with unlimited access to all systems and data
B) Implement strong access controls and monitoring
C) Ignore the problem and hope it goes away
14
14.What is the principle of least privilege?
C) Making sure all employees have the same level of access
A) Granting access based on seniority or job title
B) Giving all employees unlimited access to all systems and data
D) Providing employees with only the minimum access necessary to do their jobs
15
15.What is a common method used by insiders to steal data?
A) Printing the data and physically stealing it
C) Sending the data over email
B) Hacking into the system
D) Using a USB drive or other removable storage device
16
16.In 2018, Facebook fired a security engineer accused of exploiting the privileged information his position accorded him to stalk women online.
True
False
17
17.In 2018, a Twitter employee was alleged to have sabotaged company systems and sent proprietary information to third parties
False
True
18
18.In the 2019 Capital One data breach, a former Amazon engineer retrieved more than 100 million customer records. They exploited their inside knowledge Amazon EC2 to circumvent a misconfigured firewall in Capital One’s cloud server.
False
True
19
19.In 2020, a former Instagram executive was sentenced to 18 months in prison for stealing trade secrets from Google’s self-driving-car division and handed them over to Uber, his new employer.
True
False
20
20.How to prevent insider theater from entering your company?
D) Insider Threat Detection Solutions
A) Enforce Policies
B) Create a Baseline of Normal User and Device Behavior
C) All solutions mentioned