This , don't let scary cyberattacks get the better of you.

See where you stand when it comes to IAM and IT security concepts. Amazon gift cards await those who answer the most questions correctly.

Take the quiz

Exciting Amazon gift cards
await the top 3 winners

Rules:

  • You have to enter your business email address to take the quiz.
  • You can take the quiz only once.
  • Submit your answers and wait for us to announce the winners
  • Top 3 lucky winners will get an Amazon gift card worth $25.
  • Please enter your email.
    Please enter business email only.
  • By clicking 'Start the quiz', you agree to processing of personal data according to the Privacy Policy.
1
Q:1

Cybersecurity ensures networks and devices are protected from:

  • Cyberattacks
  • Damage to hardware or software
  • Unauthorized access
  • All of the above

Way to go, you're absolutely right! Here's a repository of all the trending cybersecurity incidents; this will give you even deeper insights into cybersecurity. 

Sorry, your answer is incorrect. To brush up on your knowledge of cybersecurity incidents, refer to this website. 

2
Q:2

Insider attacks are common in organizations that:

  • Delete accounts of former employees
  • Assign limited access to critical resources
  • Do not deactivate inactive users
  • Assign permissions only when required

Correct! Here's a resource that will help you stay informed about measures you can take to prevent insider attacks. 

Sorry, your answer is incorrect. Use this resource to stay informed about the measures needed to prevent insider attacks. 

3
Q:3

Which of the following is not a privilege abuse attack?

  • Privilege escalation attack
  • Privilege creep attacks
  • Account hijacking
  • Whale phishing attacks on privileged users

You're absolutely right! The next step towards a secure organization is to implement various tactics to prevent privilege abuse attacks. Here's a resource on that!

Oh no! Your answer is incorrect. To stay informed about the various types of privilege abuse attacks and measures to prevent them, use this resource. 

4
Q:4

Which of the following methods can help you combat a ransomware attack?

  • Don't block spam, malvertisements, and phishing attacks using email filters.
  • Keep at least three different copies of data on two different storage types, with at least one located off-site.
  • Whitelist every application that employees request.
  • Never separate your networks logically, i.e. on the basis of task or department.

Great job! You're really up-to-date when it comes to preventing ransomware attacks. Here are eight best practices that help prevent a ransomware attack. 

Oops! That answer is incorrect. To prevent ransomware attacks, use these eight best practices. 

5
Q:5

Auditing which of the following activities of a specific user can help you prevent an insider attack?

  • Users' actions in Active Directory (AD)
  • Access rights of users
  • Permission escalations of users
  • All of the above

Great! Your answer is correct! Here's an auditing solution that helps detect insider attacks easily.

Sorry! Your answer is incorrect. Here's an auditing solution that helps detect insider attacks easily.

6
Q:6

Most security breaches take a long time to discover because:

  • Many security solutions spam security professionals with false alerts and insignificant warnings.
  • Advanced SIEM solutions use complex, rule-based mechanisms and user behavior analytics (UBA) to detect threats.
  • All security solutions provide continuous auditing and monitoring of data.
  • All of the above

Good work! Here's an infographic on three challenges IT admins face when it comes to defending against insider threats.

Your answer is incorrect. To learn more about the challenges that security breaches pose, check out this infographic

7
Q:7

Which of the following is not a part of the CIA triad?

  • Confidentiality
  • Auditing
  • Integrity
  • Availability

Yes, you're absolutely right! While auditing does not fall under the CIA triad, it helps ensure that the CIA triad is followed. Better yet, ADAudit Plus—ManageEngine's AD change and auditing solution—ensures uncompromised auditing.

Sorry, your answer is incorrect. To understand how auditing can help maintain the CIA triad, use ADAudit Plus, ManageEngine's AD change and auditing solution. 

8
Q:8

What should you do if you suspect that Office 365 accounts in your organization have been compromised?

  • Remove the accounts that you suspect are compromised from any security or distribution groups.
  • Do not reset the passwords of suspected accounts.
  • Do not remove mailbox delegates.
  • Never modify suspicious mail forwarding rules.

Yes, your answer is correct! To learn more about the steps you must take if you suspect that your Office 365 accounts have been compromised, refer to this guide

Sorry, your answer is incorrect. To learn the measures that must be taken if you suspect that your Office 365 accounts have been compromised, refer to this guide

9
Q:9

Employ user and entity behavior analytics (UEBA) to:

  • Detect insider threats by analyzing anomalous behavior of employees.
  • Manage assets by analyzing user behavior and identifying which user needs what asset.
  • Manage IT operations by analyzing which operation needs how much of a resource.
  • Assign access to the required users by analyzing their behavior. 

Yes, your answer is correct. Here's how you can enhance IT security by employing UEBA.

Sorry, your answer is incorrect. Learn more about how you can strengthen IT security using UEBA. 

10
Q:10

Identity and access management (IAM) deals with:

  • Object life cycle and permissions management within a network
  • Asset management within a network
  • Access to resources within a network
  • Insider threat detection

Absolutely correct! To simplify user onboarding, offboarding, AD cleanup, user access rights management, and more, give ADManager Plus, ManageEngine's IAM solution, a try. 

Sorry, your answer is incorrect. Don't worry: ManageEngine ADManager Plus can help ensure that you never go wrong when it comes to IAM. Give it a try!

  • Thank You

    We'll calculate your result, and if you're one of the three highest scorers, then an Amazon gift card will be emailed to you shortly. 

    Thanks for taking our cybersecurity quiz!

    Answer key

    ANSWER KEY

    1. Cybersecurity ensures networks and devices are protected from:

    Your Answer:

    Correct Answer: All of the above

    Way to go, you're absolutely right! Here's a repository of all the trending cybersecurity incidents; this will give you even deeper insights into cybersecurity. 

    Sorry, your answer is incorrect. To brush up on your knowledge of cybersecurity incidents, refer to this website. 

    2. Insider attacks are common in organizations that:

    Your Answer:

    Correct Answer: Do not deactivate inactive users

    Correct! Here's a resource that will help you stay informed about measures you can take to prevent insider attacks. 

    Sorry, your answer is incorrect. Use this resource to stay informed about the measures needed to prevent insider attacks. 

    3. Which of the following is not a privilege abuse attack?

    Your Answer:

    Correct Answer: Whale phishing attacks on privileged users

    You're absolutely right! The next step towards a secure organization is to implement various tactics to prevent privilege abuse attacks. Here's a resource on that!

    Oh no! Your answer is incorrect. To stay informed about the various types of privilege abuse attacks and measures to prevent them, use this resource. 

    4. Which of the following methods can help you combat a ransomware attack?

    Your Answer:

    Correct Answer: Keep at least 3 different versions of data, on 2 different storage types, with at least 1 off-site.

    Great job! You're really up-to-date when it comes to preventing ransomware attacks. Here are eight best practices that help prevent a ransomware attack. 

    Oops! That answer is incorrect. To prevent ransomware attacks, use these eight best practices. 

    5. Auditing which of the following activities of a specific user can help you prevent an insider attack?

    Your Answer:

    Correct Answer: All of the above

    Great! Your answer is correct! Here's an auditing solution that helps detect insider attacks easily.

    Sorry! Your answer is incorrect. Here's an auditing solution that helps detect insider attacks easily.

    6. Most security breaches take a long time to discover because:

    Your Answer:

    Correct Answer: Many security solutions spam security professionals with false alerts and insignificant warnings

    Good work! Here's an infographic on three challenges IT admins face when it comes to defending against insider threats.

    Your answer is incorrect. To learn more about the challenges that security breaches pose, check out this infographic

    7. Which of the following is not a part of the CIA triad?

    Your Answer:

    Correct Answer: Auditing

    Yes, you're absolutely right! While auditing does not fall under the CIA triad, it helps ensure that the CIA triad is followed. Better yet, ADAudit Plus—ManageEngine's AD change and auditing solution—ensures uncompromised auditing.

    Sorry, your answer is incorrect. To understand how auditing can help maintain the CIA triad, use ADAudit Plus, ManageEngine's AD change and auditing solution. 

    8.What should you do if you suspect that Office 365 accounts in your organization have been compromised?

    Your Answer:

    Correct Answer: Remove the suspected compromised accounts from security and distribution groups.

    Yes, your answer is correct! To learn more about the steps you must take if you suspect that your Office 365 accounts have been compromised, refer to this guide

    Sorry, your answer is incorrect. To learn the measures that must be taken if you suspect that your Office 365 accounts have been compromised, refer to this guide

    9. Employ user and entity behavior analytics (UEBA) to:

    Your Answer:

    Correct Answer: Detecting insider threats by analyzing anomalous behavior of employees

    Yes, your answer is correct. Here's how you can enhance IT security by employing UEBA.

    Sorry, your answer is incorrect. Learn more about how you can strengthen IT security using UEBA. 

    10. Identity and access management (IAM) deals with:

    Your Answer:

    Correct Answer: Object life cycle and permissions management within a network 

    Absolutely correct! To simplify user onboarding, offboarding, AD cleanup, user access rights management, and more, give ADManager Plus, ManageEngine's IAM solution, a try. 

    Sorry, your answer is incorrect. Don't worry: ManageEngine ADManager Plus can help ensure that you never go wrong when it comes to IAM. Give it a try!