Quiz Password Attack and Insider Threat
Quiz about password attack and insider threat.
0
0
0
1
1.What is a password attack?
c) A method of encrypting passwords
d) A software program for password management
a) A type of computer virus
b) An attempt to guess a password by entering all possible combinations
2
2.What is a way to prevent password attacks?
A) Use a combination of uppercase and lowercase letters, numbers, and symbols for your password
C) Share your password with friends and family
D) Write down your password and keep it in a visible place
B) Use the same password for all accounts
3
3.What is the most commonly used password?
d) admin
c) qwerty
b) password
a) 123456
4
4.Which of the following is NOT a recommended password practice?
a) Using a combination of upper and lower case letters, numbers, and symbols
c) Using a password manager to generate and store passwords
b) Using a unique password for each account
d) Writing down passwords on a sticky note and leaving it on your desk
5
5.Which of the following is a recommended password length?
b) 12 characters
a) 8 characters
d) 4 characters
c) 16 characters
6
6.Which of the following is a common example of a phishing password attack?
d) Asking a user to change their password on a legitimate website
c) Guessing a password by trying different combinations
b) Physically stealing a password written down on a piece of paper
a) Sending an email with a link to a fake login page
7
7.What is the term used for a password attack that tries every possible combination of characters until it finds the correct password?
b) Brute force attack
d) Spoofing attack
a) Dictionary attack
c) Phishing attack
8
8.What is the term used for a password attack that uses a pre-determined list of common passwords to try and guess the correct one?
d) Spoofing attack
c) Phishing attack
b) Brute force attack
a) Dictionary attack
9
9.Which of the following is a type of biometric authentication?
a) Entering a passphrase
d) Scanning a fingerprint
b) Entering a PIN code
c) Answering security questions
10
10.Which of the following is NOT a recommended strategy for securing passwords?
a) Using a password manager
b) Storing passwords in plain text
c) Enabling two-factor authentication
d) Keeping passwords confidential and not sharing them
11
11.What is an insider threat?
C) A security vulnerability in software
B) An external hacker attacking a system
A) An employee or contractor who misuses their access to an organization's systems or data
D) A natural disaster that disrupts business operations
12
12.What are some common types of insider threats?
D) Malware infections
C) Social engineering scams
B) Phishing attacks
A) Data theft or sabotage by employees
13
13.What is the best way to prevent insider threats?
D) Provide employees with unlimited access to all systems and data
C) Ignore the problem and hope it goes away
B) Implement strong access controls and monitoring
A) Fire all employees and contractors
14
14.What is the principle of least privilege?
A) Granting access based on seniority or job title
D) Providing employees with only the minimum access necessary to do their jobs
C) Making sure all employees have the same level of access
B) Giving all employees unlimited access to all systems and data
15
15.What is a common method used by insiders to steal data?
C) Sending the data over email
A) Printing the data and physically stealing it
D) Using a USB drive or other removable storage device
B) Hacking into the system
16
16.In 2018, Facebook fired a security engineer accused of exploiting the privileged information his position accorded him to stalk women online.
False
True
17
17.In 2018, a Twitter employee was alleged to have sabotaged company systems and sent proprietary information to third parties
False
True
18
18.In the 2019 Capital One data breach, a former Amazon engineer retrieved more than 100 million customer records. They exploited their inside knowledge Amazon EC2 to circumvent a misconfigured firewall in Capital One’s cloud server.
False
True
19
19.In 2020, a former Instagram executive was sentenced to 18 months in prison for stealing trade secrets from Google’s self-driving-car division and handed them over to Uber, his new employer.
True
False
20
20.How to prevent insider theater from entering your company?
A) Enforce Policies
B) Create a Baseline of Normal User and Device Behavior
C) All solutions mentioned
D) Insider Threat Detection Solutions