Which of the following is a recommended practice for creating strong passwords?

Cyber Security Training Part 2 & 3

Quiz
•
Computers
•
Professional Development
•
Medium
Paramita Sari
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Using easily guessable information like birthdates
Using the same password across multiple accounts
Including a mix of uppercase, lowercase, numbers, and symbols
Sharing passwords with trusted friends and family
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is two-factor authentication (2FA) used for in account security?
To complicate the login process
To provide an additional layer of security beyond a password
To reset forgotten passwords
To monitor user activity
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
In RBAC, what is the role of an "administrator" typically associated with?
Limited access to system resources
Managing user accounts and permissions
Creating complex passwords
Conducting phishing awareness training
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Baiting in social engineering?
Use a fabricated story to gain victim’s trust. Pretexting attack can be done online, in person, or over the phone.
Offering something enticing, such as free software, a USB drive or money.
Sending fake emails, messages, or websites that appear legitimate.
Offering something enticing, such as free software, a USB drive or money.
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
In RBAC, what is the purpose of the principle of least privilege?
To grant users the maximum level of access by default
To provide unlimited privileges to all users
To randomly assign access privileges
To restrict users' access rights to the minimum necessary for their roles
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is a red flag of a potential phishing email?
Urgent language and threats of account closure
Personalized greetings
Requests for regular password changes
Clearly identified sender information
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the purpose of data classification?
Deleting unnecessary data
Categorizing data based on its sensitivity and importance
Sharing all data with all users
Ignoring data security measures
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
Encryption

Quiz
•
Professional Development
15 questions
SEC+ Ch.10 Review Test

Quiz
•
Professional Development
11 questions
ICTDBS506- HASHES, SALTS, PEPPERS Quiz

Quiz
•
Professional Development
15 questions
Teachers and Cybersecurity

Quiz
•
Professional Development
10 questions
System Ethical Hacking

Quiz
•
Professional Development
15 questions
Sec+ CH.2 Review Test

Quiz
•
Professional Development
15 questions
CAMBRIDGE - A Level - IT - Network Security

Quiz
•
12th Grade - Professi...
10 questions
ITF - Quiz 14.5 - Password Security and Management

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade