Udemy – Shielding Your Website: A Multi-Layered Approach to Security – 5911960

  1. How can we make the passwords complex?

  2. How much characters must be there in our password?

  3. What is meant by uniqueness of the password?

  4. When should we change our password?

  5. How can we generate strong password?

  6. What is the benefit of Password Manager?

  7. What is meant by Hosting provider?

  8. What are the various features which we should look for while selecting a web hosting provider?

  9. What is meant by website encryption?

  10. What is the full form of SSL and TLS certificates?

  11. Our website should start ideally with http or https. Comment.

  12. If we are building a new website or renewing security certificate, we should opt for SSL or TLS certificate. Comment.

  13. What is the purpose of vulnerability scanning?

  14. What is meant by website monitoring?

  15. What is the purpose of security plugins?

  16. Why anti malware is necessary for website?

  17. What are some important points which should be kept in mind while purchasing anti malware for our website?

  18. What is the benefit of regularly updating the plugins, themes and website software?

  19. Why should we regularly backup our website data?

  20. What is meant by two factor authentication?

  21. What is meant by Multi factor authentication?

  22. What is the benefit of having multi factor authentication on the website?

  23. What is the the full form of CDN?

  24. What is meant by Content Delivery Network?

  25. How CDNs contribute to website security?

  26. What are those conditions when we should go in for a CDN?

  27. We may not opt for a CDN in certain conditions. What are those conditions?

  28. How regulating user roles and permissions strengthen website security?

  29. What is meant by Least Privilege Principle?

  30. Why the website should make use of secure payment gateways?

  31. Why should we avoid storing confidential data on website?

  32. If it is absolutely necessary to store some confidential data offline, what precautions should be taken?

  33. What is meant by social engineering attacks?

  34. Whether one can open any email attachment or click on any link which may be there in the email or SMS message?

  35. If we find a USB device lying on the road, should we use it?

  36. If someone unknown is providing us free software online, should be install it?

  37. How can we stay updated on cyber threats?