5th Level Topic 1 Question / Which password is stronger? / Px6&fJ90 / or / D0g / Which password is stronger? / Px6&fJ90 / or / D0g......
5th Level Topic 1 Answer / D0g is stronger because it has 9 characters versus 8 in Px6&fJ90. / Password length is the most important factor in determining strength and padding is a simple technique to lengthen passwords. / D0g is stronger because it has 9 characters versus 8 in Px6&fJ90. / Password length is the most important factor in determining strength and padding is a simple technique to lengthen passwords. Return
5th Level Topic 2 Question / Phishing and other forms of social engineering are on the rise and one of the most significant threats to data security. True of false?
5th Level Topic 2 Answer / True. Social engineering has risen to #3 on the Verizon 2014 top 20 threats. Return
4th Level Topic 3 Question / We use a well known vendor so internal s are safe. True or false?
4th Level Topic 3 Answer / This is actually true. Almost all vendors employ SSL encryption which protects to and from the server. Internal s do not travel unprotected over the internet. Return
4th Level Topic 4 Question / What is a minimalist philosophy toward technology?
4th Level Topic 4 Answer / A minimalist philosophy is one where the technology is managed to have as little hardware and software onsite as possible. A minimalists will make liberal use of outsourced (ASP) solutions. Return
3rd Level Topic 5 Question / In a small firm the doomsday scenario is the IT Director going “postal.” What can you do to protect against this risk?
3rd Level Topic 5 Answer / No question an IT Director with mal- intent can do tremendous damage. It is critical to protect your data with an independent backup. This is a good example of redundancy. Return
3rd Level Topic 6 Question / Which mobile operating system has the strongest inherent security? / iOS / Android / Which mobile operating system has the strongest inherent security? / iOS / Android
3rd Level Topic 6 Answer / iOS but Android is closing the gap. A primary advantage is iOS apps are only available from iTunes which is screened by Apple for malware.
2nd Level Topic 7 Question / All documents containing non-public information should be password protected when sent over the internet. True or false?
2nd Level Topic 7 Answer / False. Somewhat of a trick question. Password protection differs from encryption. The best method of delivery is via secure portal which is encrypted. Return
2nd Level Topic 8 Question / Sharing passwords is a violation of SEC Reg S-P. True or false?
2nd Level Topic 8 Answer / No, but it should be. / Don’t share passwords! / No, but it should be. / Don’t share passwords! Return
1st Level Topic 9 Question / Due to heightened awareness and superior technology, the number of data breaches is steadily declining. True or false?
1st Level Topic 9 Answer / False. According to the Verizon 2014 Report, the number of breaches dipped in 2012 but rose to highs near the 2011 level in The only category of breaches that is in decline is physical attacks. Return
1st Level Topic 10 Question / Is the most commonly hacked password / / or / Password? / Is the most commonly hacked password / / or / Password?
1st Level Topic 10 Answer / is the most commonly hacked password Return
Million Dollar Question Topic 11 Firewalls
1,000,000 Question / Is a firewall hardware, software or can it be either?
1,000,000 Answer / A firewall can be either hardware or software and there are few advantages of one over the other. Return