5th Level Topic 1 Question / Which password is stronger? / Px6&fJ90 / or / D0g...... / Which password is stronger? / Px6&fJ90 / or / D0g......
5th Level Topic 1 Answer / D0g...... is stronger because it has 9 characters versus 8 in Px6&fJ90. / Password length is the most important factor in determining strength and padding is a simple technique to lengthen passwords. / D0g...... is stronger because it has 9 characters versus 8 in Px6&fJ90. / Password length is the most important factor in determining strength and padding is a simple technique to lengthen passwords. Return
5th Level Topic 2 Question / Phishing and other forms of social engineering are on the rise and one of the most significant threats to data security. True of false?
5th Level Topic 2 Answer / True. Social engineering has risen to #3 on the Verizon 2014 top 20 threats. Return
4th Level Topic 3 Question / We use a well known email vendor so internal emails are safe. True or false?
4th Level Topic 3 Answer / This is actually true. Almost all email vendors employ SSL encryption which protects email to and from the email server. Internal emails do not travel unprotected over the internet. Return
4th Level Topic 4 Question / What is a minimalist philosophy toward technology?
4th Level Topic 4 Answer / A minimalist philosophy is one where the technology is managed to have as little hardware and software onsite as possible. A minimalists will make liberal use of outsourced (ASP) solutions. Return
3rd Level Topic 5 Question / In a small firm the doomsday scenario is the IT Director going “postal.” What can you do to protect against this risk?
3rd Level Topic 5 Answer / No question an IT Director with mal- intent can do tremendous damage. It is critical to protect your data with an independent backup. This is a good example of redundancy. Return
3rd Level Topic 6 Question / Which mobile operating system has the strongest inherent security? / iOS / Android / Which mobile operating system has the strongest inherent security? / iOS / Android
3rd Level Topic 6 Answer / iOS but Android is closing the gap. A primary advantage is iOS apps are only available from iTunes which is screened by Apple for malware.
2nd Level Topic 7 Question / All documents containing non-public information should be password protected when sent over the internet. True or false?
2nd Level Topic 7 Answer / False. Somewhat of a trick question. Password protection differs from encryption. The best method of email delivery is via secure portal which is encrypted. Return
2nd Level Topic 8 Question / Sharing passwords is a violation of SEC Reg S-P. True or false?
2nd Level Topic 8 Answer / No, but it should be. / Don’t share passwords! / No, but it should be. / Don’t share passwords! Return
1st Level Topic 9 Question / Due to heightened awareness and superior technology, the number of data breaches is steadily declining. True or false?
1st Level Topic 9 Answer / False. According to the Verizon 2014 Report, the number of breaches dipped in 2012 but rose to highs near the 2011 level in 2013. The only category of breaches that is in decline is physical attacks. Return
1st Level Topic 10 Question / Is the most commonly hacked password / 123456 / or / Password? / Is the most commonly hacked password / 123456 / or / Password?
1st Level Topic 10 Answer / 123456 is the most commonly hacked password Return