This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Choose the best response for each of the questions below.
What are the three types of authentication?
Something you know, something you have, and something you are.
Something you own, something you know, something you learn.
Something you find, something you are, something you know.
What is credential stuffing?
An attacker attempts to gain access using millions of username and password combinations.
You use the same username and password at many sites. There's a security breach at one site, and attackers use your compromised usernames and passwords at many other sites.
A dictionary of commonly used words is used for the brute force attack.
What are the three principles of Zero Trust?
Verify explicitly, assume breach, and use least privileged access.
Spear-fishing, pretexting, and baiting.
Credential stuffing, key logging, spear-fishing.
You must answer all questions before checking your work.
Was this page helpful?