How an attacker can target phishing attacks

Interactive Video
•
Architecture, Information Technology (IT)
•
University
•
Hard
Wayground Content
FREE Resource
Read more
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one of the primary ways attackers gather information about email addresses and usernames?
Using public records
By hacking into servers
Via social media platforms
Through encrypted databases
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool is mentioned as being used to scrape information from LinkedIn?
Data Miner
LinkedIn Pro
Linked INT
Info Scraper
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do attackers use Office 365 user enumeration?
To encrypt user data
To validate usernames
To delete user accounts
To create fake profiles
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key recommendation to protect against password spraying attacks?
Share passwords among users
Implement multifactor authentication
Disable all user accounts
Use short passwords
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the US CERT organization recommend for password policies?
Use passwords shorter than 8 characters
Allow easy-to-guess passwords
Ensure passwords are passphrases
Avoid changing passwords regularly
Similar Resources on Wayground
2 questions
How to disable basic or legacy authentication to set up MFA in Office 365

Interactive video
•
University
2 questions
How to Deal with Passwords

Interactive video
•
University
2 questions
A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures

Interactive video
•
University
2 questions
Bug Bounty Program Certification 6.5: Gather Machine User Login Credentials

Interactive video
•
University
2 questions
Securely Storing Passwords: Part II

Interactive video
•
University
6 questions
AZ-204 Developing for Microsoft Azure Exam Prep - Multi-factor Authentication

Interactive video
•
University
2 questions
Best Windows network hardening advice from MITRE D3FEND

Interactive video
•
University
4 questions
How to protect your Windows network login credentials

Interactive video
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Architecture
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University