How Much do you know about Cyber Security Quiz

8/10 as scored but question 4 is weird and doesn't really let you answer correctly so it should have been 9/10.

...and the VPN question? That's not why I use VPN......
 
Last edited:
9 / 10 - I missed the password one. First, I spent some time thinking about the choice "not sure" as one of the passwords - :rolleyes: Then, I valued length over character type, so chose the wrong one. Still not sure I'm wrong - haha. I secretly hoped "Correct horse battery staple" would have been in there. :)


Edit: I think I'll change my wifi password to "not sure what it is" just for kicks
 
Interesting. Doesn't work for me. I click on the link, slowly loads the page and when I click on the take quiz button nothing happens.
 
Interesting. Doesn't work for me. I click on the link, slowly loads the page and when I click on the take quiz button nothing happens.

just checked the Link above, it working but on Firefox on a mac it load very slow but I still able to take test. try different browser of turn of adblocker

Tested on Safari 11, Firefox 58 with uBlock Origin, Chrome 64 all running on El Captan 10.11.6
 
9/10

But I disagree with the Phishing question:




Which of the following is an example of a “phishing” attack?

You answered Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
The correct answer is All of the above Correctly: 73%
Incorrectly: 7%
Not Sure: 20% Phishing attacks attempt to get a user to click on a malicious link or file by impersonating a trusted source the user is familiar with. All three of the choices listed are examples of a phishing attack.



Answers I disagree with:

Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows.

Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person won a contest.


My Reasoning:

The answers I disagree with do not clearly seek or phish for information or passwords. They appear to merely be spiteful or vengeful acts of maliciousness nothing more.
 
9/10

But I disagree with the Phishing question:




Which of the following is an example of a “phishing” attack?

You answered Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
The correct answer is All of the above Correctly: 73%
Incorrectly: 7%
Not Sure: 20% Phishing attacks attempt to get a user to click on a malicious link or file by impersonating a trusted source the user is familiar with. All three of the choices listed are examples of a phishing attack.



Answers I disagree with:

Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows.

Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person won a contest.


My Reasoning:

The answers I disagree with do not clearly seek or phish for information or passwords. They appear to merely be spiteful or vengeful acts of maliciousness nothing more.
Same question I got "wrong" for the same reason.
 
9/10

But I disagree with the Phishing question:




Which of the following is an example of a “phishing” attack?

You answered Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
The correct answer is All of the above Correctly: 73%
Incorrectly: 7%
Not Sure: 20% Phishing attacks attempt to get a user to click on a malicious link or file by impersonating a trusted source the user is familiar with. All three of the choices listed are examples of a phishing attack.



Answers I disagree with:

Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows.

Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person won a contest.


My Reasoning:

The answers I disagree with do not clearly seek or phish for information or passwords. They appear to merely be spiteful or vengeful acts of maliciousness nothing more.

I scored 9/10 and got the same question wrong. Completing agree with you, sending a link is not phishing, it could be a link to a virus/malisios site or just an attempt to drive traffic. Phishing is the art of obtaining information and passwords by cloning legitimate sites etc
 
just checked the Link above, it working but on Firefox on a mac it load very slow but I still able to take test. try different browser of turn of adblocker

Tested on Safari 11, Firefox 58 with uBlock Origin, Chrome 64 all running on El Captan 10.11.6

I tried it on my Air, 10.13, and my MBP, 10.12, all browsers. Same symptom. I was at home at the time. I'm somewhere else and it loads just fine now, this has happened a couple of times in the past.

9/10 as well. As far as Phishing is concerned in my book. It's any activity that gets PII from an EU so all three meet that criteria. I got the 2 factor wrong.
 
Yeah VPN question does not seem OK. And I got some issue with 2-step auth vs. 2-factor auth, which looks somewhat loosely defined.
 
9/10

But I disagree with the Phishing question:




Which of the following is an example of a “phishing” attack?

You answered Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
The correct answer is All of the above Correctly: 73%
Incorrectly: 7%
Not Sure: 20% Phishing attacks attempt to get a user to click on a malicious link or file by impersonating a trusted source the user is familiar with. All three of the choices listed are examples of a phishing attack.



Answers I disagree with:

Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows.

Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person won a contest.


My Reasoning:

The answers I disagree with do not clearly seek or phish for information or passwords. They appear to merely be spiteful or vengeful acts of maliciousness nothing more.

Agreed. I apparently got this one 'wrong' too. A phishing attack is one which phishes for security/login information. While the other two may be part of a phishing attack they are not, per se, phishing attacks.

I would argue that the answer to the password question is wrong too ..... or at least not entirely correct ...

In many cases a password such as into*48 is more secure than (or at least 'as secure as') a password such as WTh!5Z.

Just because the second password contains one or more uppercase characters does not necessarily make it more secure. It's a common misconception that a complex password is more secure than a long password. Personally I'd use a much longer password than either of those (usually 16 characters or more).

In this example, the first password would likely take longer to crack than the second password, by simple brute force methods at least, because it contains an extra character. Assuming the attacker has no prior information about the password to go on, in a brute force attack, he must try every combination of letters (uppercase and lowercase), numbers and characters, regardless of which of those were/weren't used. Arguably the first password may be slightly faster to crack if the attacker gets lucky with a dictionary-based brute force attack but for attacks that cycle through each and every possible combination of characters, every extra character increases the number of combinations by a factor of more than 100 (if you include every possible character, number and uppercase/lowercase letter).
 
Last edited:
Agreed. I apparently got this one 'wrong' too. A phishing attack is one which phishes for security/login information. While the other two may be part of a phishing attack they are not, per se, phishing attacks.

I would argue that the answer to the password question is wrong too ..... or at least not entirely correct ...

In many cases a password such as into*48 is more secure than (or at least 'as secure as') a password such as WTh!5Z.

Just because the second password contains one or more uppercase characters does not necessarily make it more secure. It's a common misconception that a complex password is more secure than a long password. Personally I'd use a much longer password than either of those (usually 16 characters or more).

In this example, the first password would likely take longer to crack than the second password, by simple brute force methods at least, because it contains an extra character. Assuming the attacker has no prior information about the password to go on, in a brute force attack, he must try every combination of letters (uppercase and lowercase), numbers and characters, regardless of which of those were/weren't used. Arguably the first password may be slightly faster to crack if the attacker gets lucky with a dictionary-based brute force attack but for attacks that cycle through each and every possible combination of characters, every extra character increases the number of combinations by a factor of more than 100 (if you include every possible character, number and uppercase/lowercase letter).
I would agree...into*49 takes about 22 seconds for a computer to crack, whereas WTh!5z would take 5 seconds to crack.

I got a 9/10.
 
Back
Top