Hi All I came across this and thought some of you would like it
http://www.pewinternet.org/quiz/cybersecurity-knowledge/
http://www.pewinternet.org/quiz/cybersecurity-knowledge/
Interesting. Doesn't work for me. I click on the link, slowly loads the page and when I click on the take quiz button nothing happens.
Same question I got "wrong" for the same reason.9/10
But I disagree with the Phishing question:
Which of the following is an example of a “phishing” attack?
You answered Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
The correct answer is All of the above Correctly: 73%
Incorrectly: 7%
Not Sure: 20% Phishing attacks attempt to get a user to click on a malicious link or file by impersonating a trusted source the user is familiar with. All three of the choices listed are examples of a phishing attack.
Answers I disagree with:
Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows.
Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person won a contest.
My Reasoning:
The answers I disagree with do not clearly seek or phish for information or passwords. They appear to merely be spiteful or vengeful acts of maliciousness nothing more.
9/10
But I disagree with the Phishing question:
Which of the following is an example of a “phishing” attack?
You answered Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
The correct answer is All of the above Correctly: 73%
Incorrectly: 7%
Not Sure: 20% Phishing attacks attempt to get a user to click on a malicious link or file by impersonating a trusted source the user is familiar with. All three of the choices listed are examples of a phishing attack.
Answers I disagree with:
Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows.
Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person won a contest.
My Reasoning:
The answers I disagree with do not clearly seek or phish for information or passwords. They appear to merely be spiteful or vengeful acts of maliciousness nothing more.
just checked the Link above, it working but on Firefox on a mac it load very slow but I still able to take test. try different browser of turn of adblocker
Tested on Safari 11, Firefox 58 with uBlock Origin, Chrome 64 all running on El Captan 10.11.6
Which can be distributed my several means, including an email sending link. So it's a correct answer to include.Phishing is the art of obtaining information and passwords by cloning legitimate sites etc
9/10
But I disagree with the Phishing question:
Which of the following is an example of a “phishing” attack?
You answered Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
The correct answer is All of the above Correctly: 73%
Incorrectly: 7%
Not Sure: 20% Phishing attacks attempt to get a user to click on a malicious link or file by impersonating a trusted source the user is familiar with. All three of the choices listed are examples of a phishing attack.
Answers I disagree with:
Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows.
Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person won a contest.
My Reasoning:
The answers I disagree with do not clearly seek or phish for information or passwords. They appear to merely be spiteful or vengeful acts of maliciousness nothing more.
I would agree...into*49 takes about 22 seconds for a computer to crack, whereas WTh!5z would take 5 seconds to crack.Agreed. I apparently got this one 'wrong' too. A phishing attack is one which phishes for security/login information. While the other two may be part of a phishing attack they are not, per se, phishing attacks.
I would argue that the answer to the password question is wrong too ..... or at least not entirely correct ...
In many cases a password such as into*48 is more secure than (or at least 'as secure as') a password such as WTh!5Z.
Just because the second password contains one or more uppercase characters does not necessarily make it more secure. It's a common misconception that a complex password is more secure than a long password. Personally I'd use a much longer password than either of those (usually 16 characters or more).
In this example, the first password would likely take longer to crack than the second password, by simple brute force methods at least, because it contains an extra character. Assuming the attacker has no prior information about the password to go on, in a brute force attack, he must try every combination of letters (uppercase and lowercase), numbers and characters, regardless of which of those were/weren't used. Arguably the first password may be slightly faster to crack if the attacker gets lucky with a dictionary-based brute force attack but for attacks that cycle through each and every possible combination of characters, every extra character increases the number of combinations by a factor of more than 100 (if you include every possible character, number and uppercase/lowercase letter).