{"id":675,"date":"2023-12-06T14:23:41","date_gmt":"2023-12-06T14:23:41","guid":{"rendered":"https:\/\/quiz.keysec360.be\/?page_id=675"},"modified":"2023-12-06T14:23:41","modified_gmt":"2023-12-06T14:23:41","slug":"1-threat-3-remedies","status":"publish","type":"page","link":"https:\/\/quiz.keysec360.be\/en\/1-threat-3-remedies\/","title":{"rendered":"1 threat &#8230; 3 remedies"},"content":{"rendered":"<h2 style=\"text-align: center;\">Match the right remedies for each threat<\/h2>\n<p style=\"text-align: center;\"><script>\n                            if (window.qmn_quiz_data === undefined) {\n                                    window.qmn_quiz_data = new Object();\n                            }\n                    <\/script><script>window.qmn_quiz_data[\"21\"] = {\"quiz_id\":\"21\",\"quiz_name\":\"1 threat ... 3 remedies\",\"disable_answer\":0,\"ajax_show_correct\":0,\"progress_bar\":\"0\",\"contact_info_location\":\"0\",\"qpages\":{\"1\":{\"id\":\"1\",\"quizID\":\"21\",\"pagekey\":\"WP1xOj4x\",\"hide_prevbtn\":\"0\"}},\"skip_validation_time_expire\":0,\"timer_limit_val\":\"0\",\"disable_scroll_next_previous_click\":0,\"disable_first_page\":\"0\",\"enable_result_after_timer_end\":0,\"enable_quick_result_mc\":0,\"end_quiz_if_wrong\":0,\"form_disable_autofill\":0,\"disable_mathjax\":0,\"enable_quick_correct_answer_info\":0,\"quick_result_correct_answer_text\":\"Correct! You have selected correct answer.\",\"quick_result_wrong_answer_text\":\"Wrong! You have selected wrong answer.\",\"quiz_processing_message\":\"\",\"quiz_limit_choice\":\"La limite de choix est atteinte.\",\"not_allow_after_expired_time\":0,\"scheduled_time_end\":false,\"error_messages\":{\"email_error_text\":\"Not a valid e-mail address!\",\"number_error_text\":\"This field must be a number!\",\"incorrect_error_text\":\"The entered text is not correct!\",\"empty_error_text\":\"Please complete all required fields!\",\"url_error_text\":\"The entered URL is not valid!\",\"minlength_error_text\":\"Required atleast %minlength% characters.\",\"maxlength_error_text\":\"Maximum %maxlength% characters allowed.\",\"empty_grid_radio_checkbox_text\":\"Please complete all rows required fields!\"},\"first_page\":false}\n                    <\/script><div class='qsm-quiz-container qsm-quiz-container-21 qmn_quiz_container mlw_qmn_quiz  quiz_theme_default  '>\n\t\t\t\t\t<form name=\"quizForm21\" id=\"quizForm21\" action=\"\/en\/wp-json\/wp\/v2\/pages\/675\" method=\"POST\" class=\"qsm-quiz-form qmn_quiz_form mlw_quiz_form\" novalidate enctype=\"multipart\/form-data\">\n\t\t\t\t<input type=\"hidden\" name=\"qsm_hidden_questions\" id=\"qsm_hidden_questions\" value=\"\">\n\t\t\t\t<input type=\"hidden\" name=\"qsm_nonce\" id=\"qsm_nonce_21\" value=\"ecc10e114e\">\n\t\t\t\t<input type=\"hidden\" name=\"qsm_unique_key\" id=\"qsm_unique_key_21\" value=\"69d66df9a329a\">\n\t\t\t\t<div id=\"mlw_error_message\" class=\"qsm-error-message qmn_error_message_section\"><\/div>\n\t\t\t\t<span id=\"mlw_top_of_quiz\"><\/span>\n\t\t\t\t\t\t\t<section class=\"qsm-page \">\n\t\t\t\t\t\t\t\t<div class=\"quiz_section quiz_begin\">\n\t\t\t\t\t\t<div class='qsm-before-message mlw_qmn_message_before'>\n\t\t\t\t<p>Please fill your personal data below.<\/p>\n<p>These data are only used when you register for training to ensure a custom follow-up.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"qsm_contact_div qsm-contact-type-text\">\n\t\t\t\t\t\t\t\t\t\t<span class='mlw_qmn_question qsm_question'>Fullname (Firstname + Lastname)<\/span>\n\t\t\t\t<input type='text' class='mlwRequiredText qsm_required_text'  name='contact_field_0' id='contact_field_0'  value=''  placeholder='Fullname (Firstname + Lastname)'  \/>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm_contact_div qsm-contact-type-email\">\n\t\t\t\t\t\t\t\t\t\t<span class='mlw_qmn_question qsm_question'>Email<\/span>\n\t\t\t\t<input type='email' class='mlwEmail mlwRequiredText qsm_required_text'  name='contact_field_1' id='contact_field_1'  value=''  placeholder='Email'  \/>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"qsm_contact_div qsm-contact-type-text\">\n\t\t\t\t\t\t\t\t\t\t<span class='mlw_qmn_question qsm_question'>Company<\/span>\n\t\t\t\t<input type='text' class='mlwRequiredText qsm_required_text'  name='contact_field_2' id='contact_field_2'  value=''  placeholder='Company'  \/>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"quiz_section qsm-question-wrapper question-type-15 question-section-id-159 \" data-qid=\"159\">\n\t\t\t\t\t\t<div class='mlw_qmn_new_question'>Move the remedies in the right column up or down to match them with the corresponding threat in the left column. <\/div>\n\t\t\t<div class='mlw_qmn_question  qsm_remove_bold' >\n\t\t<p><\/p>\n\t<\/div>\n\t<div class=\"qsm-matching-pairs\">\r\n\t\t\t<input type=\"hidden\" name=\"random_key_159\" value=\"qsm_match_pairs_array_key_1922230221\" \/>\r\n\t\t<div class=\"qsm-left-option\">\r\n\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-Data-breach\">\r\n\t\t\t\t\tData breach\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-Data-theft\">\r\n\t\t\t\t\tData theft\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-Brute-force-attack\">\r\n\t\t\t\t\tBrute force attack\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-Sniffing\">\r\n\t\t\t\t\tSniffing\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-Exploit-vulnerability\">\r\n\t\t\t\t\tExploit vulnerability\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-Social-engineering\">\r\n\t\t\t\t\tSocial engineering\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-Trojan-horse\">\r\n\t\t\t\t\tTrojan horse\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-Phishing\">\r\n\t\t\t\t\tPhishing\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-Privacy-invasion\">\r\n\t\t\t\t\tPrivacy invasion\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div><div class=\"qsm-right-option qsm-match-sortable\">\r\n\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-1)-Encrypt-sensitive-data-on-your-computer-and-devices.-2)-Use-network-shares-with-the-most-restrictive-permissions.-3)-Put-a-password-on-files-transferred-through-upload-platforms.\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"dashicons dashicons-move\"><\/span>\r\n\t\t\t\t1) Encrypt sensitive data on your computer and devices. 2) Use network shares with the most restrictive permissions. 3) Put a password on files transferred through upload platforms.\t\t\t\t<input type=\"hidden\" value=\"0\" name=\"question159[]\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-1)-Never-give-confidential-information-on-the-phone-(don&#039;t-hang-on,-hang-up).-2)-Never-trust-strangers.-3)-Double-check-identities-in-case-of-impacting-demands.\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"dashicons dashicons-move\"><\/span>\r\n\t\t\t\t1) Never give confidential information on the phone (don't hang on, hang up). 2) Never trust strangers. 3) Double check identities in case of impacting demands.\t\t\t\t<input type=\"hidden\" value=\"4\" name=\"question159[]\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-1)-Don&#039;t-use-default-usernames-(&quot;admin&quot;,-etc.).-2)-Use-long-passwords.-3)-Limit-the-number-of-login-attempts.\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"dashicons dashicons-move\"><\/span>\r\n\t\t\t\t1) Don't use default usernames (\"admin\", etc.). 2) Use long passwords. 3) Limit the number of login attempts.\t\t\t\t<input type=\"hidden\" value=\"8\" name=\"question159[]\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-1)-Use-unique-passwords.-2)-Use-complex-passwords-without-logic.-3)-Activate-2FA-when-possible.\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"dashicons dashicons-move\"><\/span>\r\n\t\t\t\t1) Use unique passwords. 2) Use complex passwords without logic. 3) Activate 2FA when possible.\t\t\t\t<input type=\"hidden\" value=\"1\" name=\"question159[]\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-1)-Only-download-software-from-the-trusted-publisher&#039;s-website.-2)-Don&#039;t-open-files-from-unknown-senders-and-never-enable-content.-3)-Don&#039;t-click-on-recommended-actions-on-a-webpage.\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"dashicons dashicons-move\"><\/span>\r\n\t\t\t\t1) Only download software from the trusted publisher's website. 2) Don't open files from unknown senders and never enable content. 3) Don't click on recommended actions on a webpage.\t\t\t\t<input type=\"hidden\" value=\"7\" name=\"question159[]\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-1)-Use-the-most-recent-version-of-applications.-2)-Update-your-systems.-3)-Change-the-default-password-on-Internet-connected-devices.\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"dashicons dashicons-move\"><\/span>\r\n\t\t\t\t1) Use the most recent version of applications. 2) Update your systems. 3) Change the default password on Internet connected devices.\t\t\t\t<input type=\"hidden\" value=\"3\" name=\"question159[]\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-1)-Analyze-the-domain-name-on-senders&#039;-e-mail-addresses-and-URL-links.-2)-Don&#039;t-enter-information-on-links-that-redirect-you-to-a-fake-website.-3)-Be-aware-that-a-known-sender&#039;s-e-mail-address-might-have-been-spoofed.\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"dashicons dashicons-move\"><\/span>\r\n\t\t\t\t1) Analyze the domain name on senders' e-mail addresses and URL links. 2) Don't enter information on links that redirect you to a fake website. 3) Be aware that a known sender's e-mail address might have been spoofed.\t\t\t\t<input type=\"hidden\" value=\"2\" name=\"question159[]\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-1)-Use-a-VPN-on-public-WiFi-networks.-2)-Beware-of-fake-access-points.-3)-Only-use-secured-(encrypted)-protocols.\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"dashicons dashicons-move\"><\/span>\r\n\t\t\t\t1) Use a VPN on public WiFi networks. 2) Beware of fake access points. 3) Only use secured (encrypted) protocols.\t\t\t\t<input type=\"hidden\" value=\"6\" name=\"question159[]\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t<div class=\"qsm_mc_answer_wrap\" id=\"question159-1)-Share-less-on-social-media.-2)-Configure-privacy-and-security-settings-on-your-webbrowser-and-web-applications.-3)-Use-an-advertising-blocker.\">\r\n\t\t\t\t\t\t\t\t\t<span class=\"dashicons dashicons-move\"><\/span>\r\n\t\t\t\t1) Share less on social media. 2) Configure privacy and security settings on your webbrowser and web applications. 3) Use an advertising blocker.\t\t\t\t<input type=\"hidden\" value=\"5\" name=\"question159[]\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/section>\n\t\t\t\t\t<input type=\"hidden\" name=\"qmn_question_list\" value=\"159Q\" \/>\n\t\t\t\t\t\t<div id=\"mlw_error_message_bottom\" class=\"qsm-error-message qmn_error_message_section\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"qmn_all_questions_count\" id=\"qmn_all_questions_count\" value=\"1\" \/>\n\t\t\t\t\t<input type=\"hidden\" name=\"total_questions\" id=\"total_questions\" value=\"1\" \/>\n\t\t\t\t\t<input type=\"hidden\" name=\"timer\" id=\"timer\" value=\"0\" \/>\n\t\t\t\t\t<input type=\"hidden\" name=\"timer_ms\" id=\"timer_ms\" value=\"0\"\/>\n\t\t\t\t\t<input type=\"hidden\" class=\"qmn_quiz_id\" name=\"qmn_quiz_id\" id=\"qmn_quiz_id\" value=\"21\" \/>\n\t\t\t\t\t<input type='hidden' name='complete_quiz' value='confirmation' \/>\n\t\t\t\t\t\t\t\t\t<\/form>\n\t\t<\/div>\n\t\t<div style=\"display: none;\" class=\"qsm-popup qsm-popup-slide\" id=\"modal-4\" aria-hidden=\"false\"><div class=\"qsm-popup__overlay\" tabindex=\"-1\" data-micromodal-close=\"\"><div class=\"qsm-popup__container qmn_quiz_container\" role=\"dialog\" aria-modal=\"true\"><div class=\"qsm-popup__content\"><img src=\"https:\/\/quiz.keysec360.be\/wp-content\/plugins\/quiz-master-next\/assets\/clock.png\" alt=\"clock.png\"\/><p class=\"qsm-time-up-text\"> Time's up<\/p><\/div><footer class=\"qsm-popup__footer\"><button class=\"qsm-popup-secondary-button qmn_btn\" data-micromodal-close=\"\" aria-label=\"Close this dialog window\" onclick=\"location.reload();\">Cancel<\/button><\/footer><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Match the right remedies for each threat<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"fullwidth-template.php","meta":[],"_links":{"self":[{"href":"https:\/\/quiz.keysec360.be\/en\/wp-json\/wp\/v2\/pages\/675"}],"collection":[{"href":"https:\/\/quiz.keysec360.be\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/quiz.keysec360.be\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/quiz.keysec360.be\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/quiz.keysec360.be\/en\/wp-json\/wp\/v2\/comments?post=675"}],"version-history":[{"count":1,"href":"https:\/\/quiz.keysec360.be\/en\/wp-json\/wp\/v2\/pages\/675\/revisions"}],"predecessor-version":[{"id":676,"href":"https:\/\/quiz.keysec360.be\/en\/wp-json\/wp\/v2\/pages\/675\/revisions\/676"}],"wp:attachment":[{"href":"https:\/\/quiz.keysec360.be\/en\/wp-json\/wp\/v2\/media?parent=675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}