
How an attacker can target phishing attacks
Interactive Video
•
Architecture, Information Technology (IT)
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one of the primary ways attackers gather information about email addresses and usernames?
Using public records
By hacking into servers
Via social media platforms
Through encrypted databases
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool is mentioned as being used to scrape information from LinkedIn?
Data Miner
LinkedIn Pro
Linked INT
Info Scraper
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do attackers use Office 365 user enumeration?
To encrypt user data
To validate usernames
To delete user accounts
To create fake profiles
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key recommendation to protect against password spraying attacks?
Share passwords among users
Implement multifactor authentication
Disable all user accounts
Use short passwords
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the US CERT organization recommend for password policies?
Use passwords shorter than 8 characters
Allow easy-to-guess passwords
Ensure passwords are passphrases
Avoid changing passwords regularly
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?