ID IQ Quiz Cyber threats are on the rise! How confident are you in your Identity security knowledge? Take this quiz to find out! Question Title * 1. What is your role at your organization? I am an identity or IAM subject matter expert I am cybersecurity subject matter expert I am not a cybersecurity subject matter expert Question Title * 2. Who or what would you trust with your bank password? (Select all that apply) Your laptop Your partner or closest friend A post-it note or notebook An online password keeper program Your financial advisor Question Title * 3. How can AI help improve identity security? It can detect suspicious access attempts It can identify irregularities in access entitlements It can recognize vulnerabilities on mobile devices All of the above It can't: AI isn't mature enough to improve identity security Question Title * 4. Which of the following is the most frequent cause of a data breach? Misconfigured cloud container Missing Transport Layer Security (TLS) on the database Credential compromise Moving workloads to the cloud Question Title * 5. To move toward zero trust, organizations need which of the following? A -Least privileged access B - Monitor attachments from external emails C - All entities are untrusted by default D - Use of VPN A and C All of the above Question Title * 6. MFA is an important component of a security architecture - but alone it's not enough. Which of the following is NOT an identity target that cybercriminals attack? Passwords SQL injection Orphaned accounts Compromised directory Question Title * 7. Phishing remains one of the top causes of cybersecurity breaches, ways to reduce phishing include: A - Short-term quarantine for every inbound email from external domains B - MFA (Multi-factor Authentication) C - FIDO (Fast Identity Online standards) B and C All of the above Question Title * 8. Which of the following is NOT a way to improve an organization's security posture and defend against identity threats? MFA/ Single Sign-on Security forensics Strong authentication and access controls Governance and administration Identity Threat Detection and Response (ITDR) Question Title * 9. Which of the following is NOT a function that identity fulfills for organizations? Identity drives better internal alignment on key business priorities Identity enables businesses to prevent, detect, and respond to threats Identity helps businesses apply consistent policies that follow the user throughout joiner-mover-leaver stages Identity enables businesses to have visibility and end-to-end auditability Question Title * 10. How often are you or someone you work with prevented from accessing a work system needed for your job? Rarely - once a quarter or less Frequently - several times a month Often - at least once a week All the time - I'm always getting locked out of what I need and should have access to Question Title * 11. What percent of users recycle passwords from one account to another? 0% - 30% 31% - 60% 61% - 90% >90% Question Title * 12. Verizon found that twice as many businesses experienced a mobile-related compromise in 2022 than in 2021. Why do attackers target smartphones and other personal devices? People frequently use personal devices to access professional resources It’s harder to scrutinize an email on a phone than it is on a desktop BYOD devices don’t have the same security capabilities as managed devices Users open more emails on their phones than on their desktops All of the above None of the above Question Title * 13. How much does each password reset cost your organization? I don't know $0-$35 per reset $35-$70 per reset >$70 per reset Question Title * 14. By 2023, analysts predict that more than 50% of cloud security failures will result from which of the following? Poor management of access, entitlement, and identity governance across cloud resources Cloud servers and vendors breached by threat actors Unpatched systems MFA Fatigue Question Title * 15. Which represents four identity standards used globally for enabling secure authentication, access and provisioning? SAML, AES, OAuth and CNA NIST, Auth-2, ODBC and SCIM FIPS, NIST, ODBC and AES SCIM, OAuth, OIDC and SAML See Results