
How an attacker can target phishing attacks
Interactive Video
•
Architecture, Information Technology (IT)
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one of the primary ways attackers gather information about email addresses and usernames?
Using public records
By hacking into servers
Via social media platforms
Through encrypted databases
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool is mentioned as being used to scrape information from LinkedIn?
Data Miner
LinkedIn Pro
Linked INT
Info Scraper
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do attackers use Office 365 user enumeration?
To encrypt user data
To validate usernames
To delete user accounts
To create fake profiles
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key recommendation to protect against password spraying attacks?
Share passwords among users
Implement multifactor authentication
Disable all user accounts
Use short passwords
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the US CERT organization recommend for password policies?
Use passwords shorter than 8 characters
Allow easy-to-guess passwords
Ensure passwords are passphrases
Avoid changing passwords regularly
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
3 questions
Biometric Handbag: Protecting Your Valuables with Fingerprint Technology
Interactive video
•
KG - University
3 questions
Risk Management for Cyber Security Managers - Section Preview-1
Interactive video
•
University
3 questions
Here's Why Fans Are Not Happy About Zac Efron's Dreadlocks | THR News
Interactive video
•
University
3 questions
Design Microservices Architecture with Patterns and Principles - Tinder System Design Example of Database Sharding Patte
Interactive video
•
University
6 questions
How to use the dmesg command: 2-Minute Linux Tips
Interactive video
•
University
6 questions
Python 3.10's new features: Parameter specification variables
Interactive video
•
University
2 questions
US Officials Considering Changes to Currency Design to Combat Counterfeiting
Interactive video
•
KG - University
2 questions
Airport Shops Criticised For Failing To Pass VAT Discounts Onto Customers
Interactive video
•
University
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Architecture
20 questions
Disney Trivia
Quiz
•
University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
10 questions
DNA Structure and Replication: Crash Course Biology
Interactive video
•
11th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
14 questions
Ch.3_TEACHER-led
Quiz
•
University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University