When a password is limited strictly to numeric characters, the secret is often referred to as a PIN. What does that acronym stand for?
What is Personal Identification Number
ciestryu
What is security?
AI
What is artificial intelligence?
Who is required to take our company's annual security awareness training?
The most common authentication method that uses a username paired with THIS in order to gain access to their account
What is Password-based authentication / Password
What professional social networking site announced a theft of 6.5 million usernames and passwords in 2012, and an even bigger hack of 117 million passwords in 2016?
What is LinkedIn
tdaa recbha
What is a Data Breach
MSP
What is Managed Service Provider?
This type of cybersecurity threat in which attackers create QR codes to redirect victims into visiting or downloading malicious content.
What is Quishing?
THIS requires users provide at least one additional authentication factor beyond a password
What is Two-Factor/multifactor Authentication or 2FA
A cyberattack in which the attacker intercepts and alters data as it is transmitted between two parties is known as an MitM attack - what do the letters MitM stand for?
What is Man-in-the-middle
lbeuntvlraiiy
What is a vulnerability?
VPN
What is Virtual Private Network?
Amazon Alexa, Fitbit, and Google Home are all examples of this.
What is an IoT device.
This type of authentication uses something that the user IS.
What is Biometric authentication
What term is given to a software application that automatically downloads or displays marketing banners or pop-ups when a user is online?
What is Adware
saciol enrgenenigi
What is Social Engineering?
IAM
What is Identity and Access Management?
What is the difference between authentication and authorization?
Authentication verifies an identity
Authorization is the process of identifying what resources a user can access.
This enables an employee to use a single set of credentials to access multiple applications or websites.
What is Single sign-on / SSO
Which term is used to describe the “cargo” that malware brings with it when it infects a device?
What is a Payload
ineetntr of itsghn
What is Internet of Things?
GDPR
What is General Data Protection Regulation
What are some ways to prevent Man in the Middle attacks?
- Secure connections
- Avoid phishing emails
- VPN encryption
- Endpoint Security
This type of authentication enables users to log in to accounts using a physical device, such as a smartphone, security key or smart card.
What is Token-based authentication.