passwords Information Security Cyber
100
What is strong password
more than 8 characters, letters numbers, symbols
100
why do we reboot at night
patching
100
What is cyber risk
The increased probability that the very-high impact, internet-based risks and threats we once thought were improbable will harm our networks
200
where is the best place to store a password
keypass or encrypted database
200
What is NPCI
non public customer information
200
What is a DLP system
Data Loss Prevention
300
where are written password likely to be found
post it note under the keyboard
300
What is PII
personally identifiable information
300
What is ransomware
malware that encrypts your data for ransom (bit coin)
400
what is the easiest way to create a strong password
Short sentences
400
What is an example of logical security
passwords
limit access
encryption
segmentation
400
What is is the most common way to get attacked
Phishing
500
why do passwords expire
can be figured out easier over time
500
What is a regulation pertaining to Information Security
GLBA
Privacy ACT
500
why is phishing so popular
large targets
easy to set up
don't need high percentage to click






IT and Security

Press F11 for full screen mode



Limited time offer: Membership 25% off


Clone | Edit | Download / Play Offline