
Eliminate compromised and weak passwords
Interactive Video
•
Architecture, Information Technology (IT), Social Studies
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the primary method used by attackers to access the Colonial Pipeline network?
Phishing emails
Social engineering
Compromised password from an old VPN account
Malware installation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool can be used to identify accounts that haven't logged in for a certain period?
Network scanner
Antivirus software
Firewall
PowerShell
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended action to take for accounts that haven't logged in recently?
Share their credentials
Ignore them
Review and possibly disable them
Delete them immediately
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should be considered when setting a password policy?
Frequency of password changes
All of the above
Length of the password
Complexity requirements
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can Azure help in managing risky user accounts?
By offering unlimited cloud storage
Through risk policies and conditional access rules
By automatically changing passwords
By providing free antivirus software
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?