The Beginners 2022 Cyber Security Awareness Training Course - 2-Factor Authentication Part II

The Beginners 2022 Cyber Security Awareness Training Course - 2-Factor Authentication Part II

Assessment

Interactive Video

Information Technology (IT), Architecture, Other

University

Hard

Created by

Quizizz Content

FREE Resource

The video discusses various methods of two-factor authentication, emphasizing the importance of using security keys like Yubikey and Google's Titan for enhanced security. It highlights a Google report showing zero account takeovers among employees using security keys. The video also explores the future of authentication, suggesting a move towards passwordless systems. A case study of John Podesta's email hack underscores the necessity of two-factor authentication.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key advantage of using authentication apps over SMS for two-factor authentication?

They are easier to set up.

They provide a more secure form of 2FA.

They do not require internet access.

They are cheaper to use.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do security keys like Yubikey and Titan enhance online security?

By creating encrypted tunnels to prevent phishing.

By storing passwords securely.

By automatically logging users into websites.

By generating passwords every minute.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What feature of security keys makes them resistant to phishing attacks?

They store passwords locally.

They create an encrypted tunnel to the website.

They generate a new password every hour.

They require a fingerprint scan.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to Google's report, how many of their employees experienced account takeovers after using security keys?

10,000

500

85,000

0

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential future trend in online security mentioned in the video?

Increased use of SMS for 2FA.

Elimination of passwords altogether.

More complex password requirements.

Mandatory fingerprint authentication.