How Well Do You Know Cyber Security?

Quiz
0%

Try your luck on this Cyber Security quiz.

You may already know more than you think!

1 / 7

Category: Password Security

What does a good password look like, according to IT Security Consultant Kevin Mitnick?

Summary: As the first line of defense against unauthorized users, your passwords work to keep your data private. Password requirements have grown drastically over the years, as hackers have grown more advanced.

2 / 7

Category: Password Security

How many passwords should you have across all your online accounts?

Summary: The more characters you include, the harder a password is to crack. For example, a 12-character password would take approximately 34,000 years for a hacker to decipher!

3 / 7

Category: Software Updates

Many cyber breaches could have been prevented with a simple software update.

Summary: Software updates push improvements or repairs to your devices. These updates fix glitches, improve user experience, fix known security vulnerabilities, and much more.

4 / 7

Category: 2FA

2FA - Two-factor authentication (2FA) is a specific type of multi-factor authentication (MFA) that strengthens access security by requiring two methods (also referred to as authentication factors) to verify your identity.

What is the most effective form of Two-Factor Authentication (2FA)? 2FA - Two-factor authentication (2FA) is a specific type of multi-factor authentication (MFA) that strengthens access security by requiring two methods (also referred to as authentication factors) to verify your identity.

Summary: Two-Factor Authentication (2FA) requires two forms of authentication before allowing a user access to an account or device. This could include your password plus one additional form of identification or verification.

5 / 7

Category: Phishing

What is a common giveaway of phishing email scams?

Summary: Phishing is a form of social engineering, which preys on our propensity for human error. By masquerading as a familiar organization or individual, phishers hope to trick users into taking a specific action.

6 / 7

Category: Secure Websites

What does https:// at the beginning of a URL indicate; as opposed to http:// (without the ‘s’)?

Summary: Have you ever wondered what the different parts of a URL do? You may be surprised to learn that HTTP means something: Hyper Text Transfer Protocol. You may have noticed most websites now say HTTPS (Hyper Text Transfer Protocol Secure). If that sounds important, it’s because it is.

7 / 7

Category: Vishing

Which of the following is an indicator that a phone call from your bank is a scam?

Summary: Just like email phishing, phone vishing attempts to trick individuals and organizations into revealing confidential information.