Here are 25 multiple-choice questions (MCQs) on Basics of Recognizing and avoiding online threats,Passwords and authentication.These questions cover various aspects of recognizing and avoiding online threats, password security, and authentication, along with their respective Answers and explanations.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. What is a common method used by attackers to crack passwords?

  • Guessing passwords randomly
  • Using brute force attacks
  • Asking for passwords politely
  • Creating strong passwords

2. What is the term for a security feature that allows users to access multiple services or applications with a single set of credentials after authenticating once?

  • Password manager
  • Multi-factor authentication (MFA)
  • Single sign-on (SSO)
  • Captcha

3. What is the term for a security vulnerability that allows an attacker to intercept and capture login credentials as they are transmitted over a network?

  • Phishing
  • Brute force attack
  • Man-in-the-middle (MitM) attack
  • Social engineering

4. What is the term for a password policy that requires users to change their passwords at regular intervals, such as every 90 days?

  • Password complexity
  • Password rotation
  • Password hashing
  • Password manager
  • Sharing passwords with colleagues
  • Writing passwords on sticky notes
  • Storing passwords in a secure password manager
  • Using easily guessable passwords

6. What is the term for a security feature that displays distorted characters that are difficult for automated bots to read, used to verify that a user is a human during online interactions?

  • Password manager
  • Multi-factor authentication (MFA)
  • Single sign-on (SSO)
  • Captcha

7. Which of the following is NOT a common authentication factor used in multi-factor authentication (MFA)?

  • Something you know (e.g., password)
  • Something you have (e.g., smartphone)
  • Something you are (e.g., fingerprint)
  • Something you want (e.g., favorite color)

8. What is the term for a security threat that involves an attacker intercepting and eavesdropping on wireless communications between devices and networks?

  • Ransomware
  • Password cracking
  • Man-in-the-middle (MitM) attack
  • Phishing

9. Which of the following is a secure method for storing passwords?

  • Writing passwords on a piece of paper
  • Storing passwords in a plain text document
  • Using a reputable password manager
  • Sharing passwords with friends

10. What is vishing in the context of online threats and authentication?

  • A type of phishing attack that uses voice messages
  • A biometric authentication method
  • A strong and complex password
  • A type of multi-factor authentication

11. What is the term for a method of authentication that uses physical characteristics of an individual, such as fingerprints or facial recognition?

  • Biometric authentication
  • Two-factor authentication (2FA)
  • Password rotation
  • Captcha
  • Using the same password for multiple accounts
  • Changing passwords after a security breach
  • Enabling two-factor authentication (2FA) where available
  • Regularly updating and strengthening passwords

13. What is the term for a security threat that involves an attacker pretending to be a legitimate organization or individual in an attempt to trick users into revealing sensitive information or performing actions they should not?

  • Spear phishing
  • Vishing
  • Impersonation
  • Credential stuffing

14. What is the primary purpose of a strong and unique password?

  • To share with friends and family
  • To make it easier to remember
  • To protect online accounts from unauthorized access
  • To use the same password for multiple accounts

15. Which of the following is NOT a common characteristic of a strong password?

  • Easily guessable, such as "123456"
  • Long and complex
  • Contains a mix of uppercase and lowercase letters, numbers, and symbols
  • Not a dictionary word or common phrase

16. What is the term for a security feature that requires users to provide two or more different forms of authentication to access an account or system?

  • Password manager
  • Multi-factor authentication (MFA)
  • Single sign-on (SSO)
  • Captcha

17. What is the primary purpose of a CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart)?

  • To simplify password management
  • To prevent automated bots from accessing websites or services
  • To create strong passwords
  • To remember passwords for users

18. What is a passphrase in the context of password security?

  • A single word password
  • A long and complex sequence of words
  • A password consisting of only numbers
  • A username

19. What is a password manager in the context of password security?

  • A person who manages passwords for others
  • A software tool that generates, stores, and auto-fills passwords
  • A password policy for organizations
  • A hardware component of a computer

20. What is the term for the practice of reusing the same password for multiple online accounts?

  • Password rotation
  • Password complexity
  • Password sharing
  • Password recycling

21. What is the term for a security measure that restricts the number of login attempts within a certain time frame to prevent unauthorized access due to repeated password guessing?

  • Account lockout
  • Password recovery
  • Password hashing
  • Password strength
  • Using easily guessable passwords
  • Changing passwords regularly
  • Avoiding dictionary words and common phrases
  • Using two-factor authentication (2FA)

23. What is the term for the process of converting a password into an unreadable form using a mathematical algorithm to enhance security?

  • Password rotation
  • Password complexity
  • Password hashing
  • Password sharing

24. What is the term for a technique used by attackers to trick individuals into revealing their passwords or sensitive information by posing as a trustworthy entity in electronic communication?

  • Password management
  • Password cracking
  • Social engineering
  • Authentication

25. Which of the following is an example of a security Question-used for password recovery?

  • What is your favorite color?
  • What is your username?
  • What is your current IP address?
  • What is the capital of France?

Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook