Which of the following is a recommended practice for creating strong passwords?

Cyber Security Training Part 2 & 3

Quiz
•
Computers
•
Professional Development
•
Medium
Paramita Sari
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Using easily guessable information like birthdates
Using the same password across multiple accounts
Including a mix of uppercase, lowercase, numbers, and symbols
Sharing passwords with trusted friends and family
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is two-factor authentication (2FA) used for in account security?
To complicate the login process
To provide an additional layer of security beyond a password
To reset forgotten passwords
To monitor user activity
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
In RBAC, what is the role of an "administrator" typically associated with?
Limited access to system resources
Managing user accounts and permissions
Creating complex passwords
Conducting phishing awareness training
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Baiting in social engineering?
Use a fabricated story to gain victim’s trust. Pretexting attack can be done online, in person, or over the phone.
Offering something enticing, such as free software, a USB drive or money.
Sending fake emails, messages, or websites that appear legitimate.
Offering something enticing, such as free software, a USB drive or money.
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
In RBAC, what is the purpose of the principle of least privilege?
To grant users the maximum level of access by default
To provide unlimited privileges to all users
To randomly assign access privileges
To restrict users' access rights to the minimum necessary for their roles
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is a red flag of a potential phishing email?
Urgent language and threats of account closure
Personalized greetings
Requests for regular password changes
Clearly identified sender information
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the purpose of data classification?
Deleting unnecessary data
Categorizing data based on its sensitivity and importance
Sharing all data with all users
Ignoring data security measures
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
IT ENGLISH: Research Project Topics - Digital ID

Quiz
•
Professional Development
10 questions
IT General Control

Quiz
•
Professional Development
11 questions
Cloud Computing

Quiz
•
KG - Professional Dev...
13 questions
CyberSecurity

Quiz
•
Professional Development
8 questions
Sec + CH.2 Pre-Assessment

Quiz
•
Professional Development
10 questions
Operation Reliability

Quiz
•
Professional Development
15 questions
Sec+ Quiz - 2

Quiz
•
Professional Development
15 questions
Sec+ CH.2 Review Test

Quiz
•
Professional Development
Popular Resources on Wayground
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade