Question 1 / 9
How do you choose your password?
We assume that it's perfectly safe to use personal information such as our favorite movies, sports teams, pet names, etc. as passwords, since attackers don't know us. But in reality, hackers play the guessing game, which involves an algorithm. So your favorite song or movie will eventually be guessed, whether the hacker knows they're your favorites or not.
Befriend a password generator!
Is it safe to use a password manager?
A password manager encrypts all your passwords and can be accessed upon providing a master password. As long as your master password is strong, you don't have to worry about your prankster friend or malicious actors breaching your accounts.
Who is considered the father of the computer password?
Fernando Corbató helped create the first computer password at the Massachusetts Institute of Technology in the 1960s.
Which one of the following is the strongest password?
Here are some pointers from experts:
- Appending numbers to the end of a character string does not make a password strong.
- Think of a unique passphrase that uses a combination of letters, numbers, and special characters.
How long does it take to crack a 12-character password that includes a combination of uppercase and lowercase letters, numbers, and special characters versus one with just six lowercase letters?
In a recent article in Scientific American, French computer scientist Jean-Paul Delahaye wrote that a computer running through all the possibilities for a 12-character password one by one would take 62 trillion times longer than a password consisting only of six lowercase letters.
How many hours a year do employees spend resetting passwords?
In a study conducted by the National Institute of Standards and Technology (NIST), it was found that U.S. Department of Commerce employees, who are required to reset passwords every 60 days, spend as much as 18.6 hours a year on average resetting their passwords.
It is high time you look into ManageEngine ADSelfService Plus to help reset passwords quickly and safely.
You are trying to log in to your friend's account by keying in the person's nickname, DOB, favorite song, mobile number, and crush's name. What attack does this refer to?
A brute-force attack is a trial and error method of guessing passwords. Approximately 80% of all cyberattacks are brute-force attacks. In a simple brute-force attack, the threat actor manually tries out the most commonly used password combinations.
Which of the following techniques uses machine learning and real-time context to make access control decisions for a seamless user experience without compromising security?
Adaptive MFA, otherwise known as risk-based MFA, provides users with authentication factors that adapt each time a user logs in depending on the calculated risk level of the user based on contextual information. Some examples of contextual information include the physical location (geolocation) of the user requesting access, the type of device, the day of the week, the time of the day, the IP address, etc.
Try ManageEngine's identity security solution, ADSelfService Plus, to enable MFA for all your devices and for VPN access, application access, and OWA access. It also allows you to configure password policies, enable single sign-on, secure remote work, and more.
Can MFA work without internet connection?
Offline MFA is definitely possible! Tools like ManageEngine's identity security solution, ADSelfService Plus, allows you to configure offline MFA, which helps secure user devices even without internet.
Try ManageEngine's identity security solution for self-service password management, enterprise SSO, adaptive MFA and other security requirements. Schedule a personalized demo right way!
Go passwordless this World Password Day!
Attend our live webinar and and stand a chance to
win Amazon gift card worth USD 20!