Contents
- 1 NSE 1 Information Security Awareness Fortinet – Data Security Perspectives Quiz Answers
- 2 2. Which rule is best to follow for securing passwords?
- 3 3. Which two characteristics are examples of poor passwords? (Choose two.)
- 4 4. Identify an example of a password that best follows the password guidelines in this lesson.
- 5 5. Identify two good password practices. (Choose two.)
- 6 6. Which three methods are examples of online multi-factor authentication? (Choose three.)
- 7 7. Which method is recommended to manage passwords?
- 8 Data Security: Protect Your Digital Life
- 9 The different types of data security threats
- 10 How to protect your data from attack?
NSE 1 Information Security Awareness Fortinet – Data Security Perspectives Quiz Answers
The quiz answers for the Password Perspectives are available for the NSE 1 Information Security Awareness Fortinet Certification. The certification includes five lessons, and the answers for the lesson 3 are included in this post. The application link is also provided below.
1. Which practice should you implement for backups?
- Encrypt the backup data for an extra layer of protection.
- Keep a backup device physically connected to the host computer 100% of the time.
- Use multiple backup vendors for redundancy.
- Always back up your data in the cloud.
2. Which rule is best to follow for securing passwords?
- Use a combination of seemingly random upper and lowercase letters, numbers, and special characters that is easy to remember but difficult to guess.
- Never leave your password on a sticky note stuck to your monitor. Instead, hide it under your keyboard.
- Use something that you would never forget, like the name of your family pet.
- Use a predictable pattern of numbers or letters
3. Which two characteristics are examples of poor passwords? (Choose two.)
- A predictable sequence of numbers or words
- A commonly used word or unchanged default password
- A memorable passphrase written as a random sequence of keyboard keys
- A combination of random letters, numbers, and special characters meaningful only to you
4. Identify an example of a password that best follows the password guidelines in this lesson.
- 1234567890
- J&JwutH2f@P0W
- PasswordAndAllThat
- qwerty123
5. Identify two good password practices. (Choose two.)
- Replace the password at least twice a year.
- The password should be difficult to remember.
- The password should be easy to guess.
- The password should be unique from your other passwords.
6. Which three methods are examples of online multi-factor authentication? (Choose three.)
- Full name
- Software token
- Hardware token
- Password
- Passport or other government-issued identification
7. Which method is recommended to manage passwords?
- Write passwords into a Word document.
- Memorize one strong password and reuse it to secure all internet services and devices.
- Repeat your passwords every night to help you remember them.
- Use a password manager.
Data Security: Protect Your Digital Life
In today’s digital world, our personal and professional information is more vulnerable than ever before. Cyberattacks are on the rise, and even the most careful users can fall victim.
That’s why it’s so important to understand data security and how to protect yourself. In this lesson, you’ll learn the basics of data security, including:
What is data security?
Data security is the practice of protecting sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.
The different types of data security threats
There are many different types of data security threats, including:
Malware: Malware is software that is designed to harm a computer system. Malware can be used to steal data, install backdoors, or disrupt operations.
Phishing: Phishing is a type of social engineering attack that is used to trick users into revealing sensitive information, such as passwords or credit card numbers.
Data breaches: A data breach is an incident in which sensitive information is exposed to unauthorized individuals. Data breaches can occur as a result of cyberattacks, human error, or system failures.
How to protect your data from attack?
There are a number of things you can do to protect your data from attack, including:
Use strong passwords: Strong passwords are at least 12 characters long and include a mix of upper and lowercase letters, numbers, and symbols.
Enable two-factor authentication: Two-factor authentication adds an extra layer of security to your accounts by requiring you to enter a code from your phone in addition to your password.
Keep your software up to date: Software updates often include security patches that can help protect your system from vulnerabilities.
Be careful what you click on: Don’t click on links in emails or on websites unless you’re sure they’re legitimate.
Back up your data: Regularly backing up your data will help you recover if it’s lost or stolen.
Conclusion
Data security is an important issue that everyone should be aware of. By following the tips in this lesson, you can help protect your personal and professional information from attack.










