Become cyberaware, and overcome
any cyberattack.
Test your knowledge on the latest IT security concepts. Get all the answers right, and you could win one of these best-selling books!
Test your knowledge on the latest IT security concepts. Get all the answers right, and you could win one of these best-selling books!
Way to go, you're absolutely right! Here's a repository of all the trending cybersecurity incidents; this will give you even deeper insights into cybersecurity.
Sorry, your answer is incorrect. To brush up on your knowledge of cybersecurity incidents, refer to this website.
You're absolutely right! The next step towards a secure organization is to implement various tactics to prevent privilege abuse attacks. Here's a resource on that!
Oh no! Your answer is incorrect. To stay informed about the various types of privilege abuse attacks and measures to prevent them, use this resource.
Great job! You're really up-to-date when it comes to preventing ransomware attacks. Here are eight best practices that help prevent a ransomware attack.
Oops! That answer is incorrect. To prevent ransomware attacks, use these eight best practices.
Great! Your answer is correct! Here's an auditing solution that helps detect insider attacks easily.
Sorry! Your answer is incorrect. Here's an auditing solution that helps detect insider attacks easily.
Good work! Here's an infographic on three challenges IT admins face when it comes to defending against insider threats.
Your answer is incorrect. To learn more about the challenges that security breaches pose, check out this infographic.
Yes, you're absolutely right! While auditing does not fall under the CIA triad, it helps ensure that the CIA triad is followed. Better yet, ADAudit Plus—ManageEngine's AD change and auditing solution—ensures uncompromised auditing.
Sorry, your answer is incorrect. To understand how auditing can help maintain the CIA triad, use ADAudit Plus, ManageEngine's AD change and auditing solution.
Yes, your answer is correct! To learn more about the steps you must take if you suspect that your Microsoft 365 accounts have been compromised, refer to this guide.
Sorry, your answer is incorrect. To learn the measures that must be taken if you suspect that your Microsoft 365 accounts have been compromised, refer to this guide.
Yes, your answer is correct. Here's how you can enhance IT security by employing UEBA.
Sorry, your answer is incorrect. Learn more about how you can strengthen IT security using UEBA.
If you're one of our lucky winners, we'll get in touch with you by November 7, 2020!
Your Answer:
Correct Answer: All of the above
Way to go, you're absolutely right! Here's a repository of all the trending cybersecurity incidents; this will give you even deeper insights into cybersecurity.
Sorry, your answer is incorrect. To brush up on your knowledge of cybersecurity incidents, refer to this website.
Your Answer:
Correct Answer: Do not deactivate inactive users
Correct! Here's a resource that will help you stay informed about measures you can take to prevent insider attacks.
Sorry, your answer is incorrect. Use this resource to stay informed about the measures needed to prevent insider attacks.
Your Answer:
Correct Answer: Whale phishing attacks on privileged users
You're absolutely right! The next step towards a secure organization is to implement various tactics to prevent privilege abuse attacks. Here's a resource on that!
Oh no! Your answer is incorrect. To stay informed about the various types of privilege abuse attacks and measures to prevent them, use this resource.
Your Answer:
Correct Answer: Keep at least 3 different versions of data, on 2 different storage types, with at least 1 off-site.
Great job! You're really up-to-date when it comes to preventing ransomware attacks. Here are eight best practices that help prevent a ransomware attack.
Oops! That answer is incorrect. To prevent ransomware attacks, use these eight best practices.
Your Answer:
Correct Answer: All of the above
Great! Your answer is correct! Here's an auditing solution that helps detect insider attacks easily.
Sorry! Your answer is incorrect. Here's an auditing solution that helps detect insider attacks easily.
Your Answer:
Correct Answer: Many security solutions spam security professionals with false alerts and insignificant warnings
Good work! Here's an infographic on three challenges IT admins face when it comes to defending against insider threats.
Your answer is incorrect. To learn more about the challenges that security breaches pose, check out this infographic.
Your Answer:
Correct Answer: Auditing
Yes, you're absolutely right! While auditing does not fall under the CIA triad, it helps ensure that the CIA triad is followed. Better yet, ADAudit Plus—ManageEngine's AD change and auditing solution—ensures uncompromised auditing.
Sorry, your answer is incorrect. To understand how auditing can help maintain the CIA triad, use ADAudit Plus, ManageEngine's AD change and auditing solution.
Your Answer:
Correct Answer: Remove the suspected compromised accounts from security and distribution groups.
Yes, your answer is correct! To learn more about the steps you must take if you suspect that your Microsoft 365 accounts have been compromised, refer to this guide.
Sorry, your answer is incorrect. To learn the measures that must be taken if you suspect that your Microsoft 365 accounts have been compromised, refer to this guide.
Your Answer:
Correct Answer: Detecting insider threats by analyzing anomalous behavior of employees
Yes, your answer is correct. Here's how you can enhance IT security by employing UEBA.
Sorry, your answer is incorrect. Learn more about how you can strengthen IT security using UEBA.
Your Answer:
Correct Answer: Object life cycle and permissions management within a network
Absolutely correct! To simplify user onboarding, offboarding, AD cleanup, user access rights management, and more, give ADManager Plus, ManageEngine's IAM solution, a try.
Sorry, your answer is incorrect. Don't worry: ManageEngine ADManager Plus can help ensure that you never go wrong when it comes to IAM. Give it a try!