Search Header Logo
The Beginners 2022 Cyber Security Awareness Training Course - 2-Factor Authentication Part II

The Beginners 2022 Cyber Security Awareness Training Course - 2-Factor Authentication Part II

Assessment

Interactive Video

Information Technology (IT), Architecture, Other

University

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

The video discusses various methods of two-factor authentication, emphasizing the importance of using security keys like Yubikey and Google's Titan for enhanced security. It highlights a Google report showing zero account takeovers among employees using security keys. The video also explores the future of authentication, suggesting a move towards passwordless systems. A case study of John Podesta's email hack underscores the necessity of two-factor authentication.

Read more

5 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What are the benefits of using two-factor authentication compared to just a username and password?

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

How does a security key like Yubikey enhance online security?

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

What is the process of setting up an authentication app with a security key?

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 1 pt

What was the outcome for Google employees who used security keys in terms of account hacks?

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Why is it important to have two-factor authentication for private email accounts?

Evaluate responses using AI:

OFF

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?