Signs credentials in your network are being compromised Quiz
1. What is a potential indicator of compromised credentials according to Scenario 1?
A. Consistent work-hour routine
B. Sudden change in office hours
C. Working on weekends
2. What does Scenario 2 describe as a sign of compromised credentials?
A. Accessing databases from multiple devices
B. Accessing internal databases from two different continents in a short time
C. Accessing databases during non-working hours
3. Why is remote access from the office considered suspicious in Scenario 3?
A. It indicates multitasking
B. It suggests an unnecessary use of remote protocols
C. It shows efficiency in work
4. What unusual behavior is highlighted in Scenario 4?
A. Using common organizational tools
B. Using department-dedicated resources unusually
C. Sharing files with colleagues
5. How can attackers exploit password reset protocols according to Scenario 5?
A. By resetting their own passwords regularly
B. By forcing a password change on an unused account
C. By using weak passwords
Submit Answers