Eliminate compromised and weak passwords

Interactive Video
•
Architecture, Information Technology (IT), Social Studies
•
University
•
Hard
Wayground Content
FREE Resource
Read more
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the primary method used by attackers to access the Colonial Pipeline network?
Phishing emails
Social engineering
Compromised password from an old VPN account
Malware installation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool can be used to identify accounts that haven't logged in for a certain period?
Network scanner
Antivirus software
Firewall
PowerShell
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended action to take for accounts that haven't logged in recently?
Share their credentials
Ignore them
Review and possibly disable them
Delete them immediately
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should be considered when setting a password policy?
Frequency of password changes
All of the above
Length of the password
Complexity requirements
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can Azure help in managing risky user accounts?
By offering unlimited cloud storage
Through risk policies and conditional access rules
By automatically changing passwords
By providing free antivirus software
Similar Resources on Wayground
6 questions
AZ-204 Developing for Microsoft Azure Exam Prep - Multi-factor Authentication

Interactive video
•
University
2 questions
Best Windows network hardening advice from MITRE D3FEND

Interactive video
•
University
8 questions
Active Directory with Windows Server 2016 - Configuring MSA Service Accounts

Interactive video
•
University
6 questions
Linux Administration Bootcamp: Go from Beginner to Advanced - Reusing the Last Item from the Previous Command

Interactive video
•
University
3 questions
Hed: Cybersecurity Unicorn Wiz Reaches $6 Billion Valuation

Interactive video
•
University
2 questions
Bash Shell Scripting - Assignment - passwd

Interactive video
•
University
2 questions
Active Directory with Windows Server 2016 - Using PowerShell

Interactive video
•
University
4 questions
The Beginners 2022 Cyber Security Awareness Training Course - What Else Can You Do to Protect Yourself Part II

Interactive video
•
University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Architecture
21 questions
Spanish-Speaking Countries

Quiz
•
6th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
7 questions
Common and Proper Nouns

Interactive video
•
4th Grade - University
12 questions
Los numeros en español.

Lesson
•
6th Grade - University
7 questions
PC: Unit 1 Quiz Review

Quiz
•
11th Grade - University
7 questions
Supporting the Main Idea –Informational

Interactive video
•
4th Grade - University
12 questions
Hurricane or Tornado

Quiz
•
3rd Grade - University
7 questions
Enzymes (Updated)

Interactive video
•
11th Grade - University