Q1. What is the root cause of almost every data breach?
Select one:
Poorly crafted password
Unpatched device
Zero-day attack
Human error*
Q2.Why are insider threats one of the most challenging attack vectors?
Select one:
Employees are trusted users who have legitimate access to an...
Q1. Which precaution should you take if you receive an email that involves the movement of money, such as the payment of an invoice, even if it is from someone you know?
Select one:
Look for spelling mistakes in the email. If you find any, delete the email. It’s obviously a scam.
Use another...
Q1. Identify two good password practices. (Choose two.)
Select one or more:
Replace the password at least twice a year.*
The password should be easy to guess.
The password should be difficult to remember.
The password should be unique from your other passwords.*
Q2 .Which two characteristics...
Q1. In the context of cybersecurity, which definition best describes social engineering?
Select one:
An exploitation of a relationship or interaction to trick a person into divulging sensitive or personal information *
A cooperative method used to develop and improve code
A movement by which...
Q1. What is the primary motivation of the “Cyber Warrior”?
Select one:
Money
Fame
The adoption of Bitcoin as a national currency
The political interest of their country’s government *
Q2. What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.