We'll calculate your result, and if you're one of the three highest scorers, then an Amazon gift card will be emailed to you shortly.
Thanks for taking our cybersecurity quiz!
1. Cybersecurity ensures networks and devices are protected from:
Correct Answer: All of the above
Way to go, you're absolutely right! Here's a repository of all the trending cybersecurity incidents; this will give you even deeper insights into cybersecurity.
Sorry, your answer is incorrect. To brush up on your knowledge of cybersecurity incidents, refer to this website.
2. Insider attacks are common in organizations that:
Correct Answer: Do not deactivate inactive users
Correct! Here's a resource that will help you stay informed about measures you can take to prevent insider attacks.
Sorry, your answer is incorrect. Use this resource to stay informed about the measures needed to prevent insider attacks.
3. Which of the following is not a privilege abuse attack?
Correct Answer: Whale phishing attacks on privileged users
You're absolutely right! The next step towards a secure organization is to implement various tactics to prevent privilege abuse attacks. Here's a resource on that!
Oh no! Your answer is incorrect. To stay informed about the various types of privilege abuse attacks and measures to prevent them, use this resource.
4. Which of the following methods can help you combat a ransomware attack?
Correct Answer: Keep at least 3 different versions of data, on 2 different storage types, with at least 1 off-site.
Great job! You're really up-to-date when it comes to preventing ransomware attacks. Here are eight best practices that help prevent a ransomware attack.
Oops! That answer is incorrect. To prevent ransomware attacks, use these eight best practices.
5. Auditing which of the following activities of a specific user can help you prevent an insider attack?
Correct Answer: All of the above
Great! Your answer is correct! Here's an auditing solution that helps detect insider attacks easily.
Sorry! Your answer is incorrect. Here's an auditing solution that helps detect insider attacks easily.
6. Most security breaches take a long time to discover because:
Correct Answer: Many security solutions spam security professionals with false alerts and insignificant warnings
Good work! Here's an infographic on three challenges IT admins face when it comes to defending against insider threats.
Your answer is incorrect. To learn more about the challenges that security breaches pose, check out this infographic.
7. Which of the following is not a part of the CIA triad?
Correct Answer: Auditing
Yes, you're absolutely right! While auditing does not fall under the CIA triad, it helps ensure that the CIA triad is followed. Better yet, ADAudit Plus—ManageEngine's AD change and auditing solution—ensures uncompromised auditing.
Sorry, your answer is incorrect. To understand how auditing can help maintain the CIA triad, use ADAudit Plus, ManageEngine's AD change and auditing solution.
8.What should you do if you suspect that Office 365 accounts in your organization have been compromised?
Correct Answer: Remove the suspected compromised accounts from security and distribution groups.
Yes, your answer is correct! To learn more about the steps you must take if you suspect that your Office 365 accounts have been compromised, refer to this guide.
Sorry, your answer is incorrect. To learn the measures that must be taken if you suspect that your Office 365 accounts have been compromised, refer to this guide.
10. Identity and access management (IAM) deals with:
Correct Answer: Object life cycle and permissions management within a network
Absolutely correct! To simplify user onboarding, offboarding, AD cleanup, user access rights management, and more, give ADManager Plus, ManageEngine's IAM solution, a try.
Sorry, your answer is incorrect. Don't worry: ManageEngine ADManager Plus can help ensure that you never go wrong when it comes to IAM. Give it a try!