🌐
Okta
okta.com › blog › identity security
Security Questions: Best Practices, Examples, and Ideas | Okta
Security questions are a common method of identity authentication—but are they secure? Learn the best practices, examples of good security questions, and more.
🌐
VeePN
veepn.com › home › best security questions: selection criteria and examples
Best Security Questions: Selection Criteria and Examples | VeePN Blog
May 21, 2025 - Security is considered one of the most significant characteristics of a good security question. It should not jeopardize the protected object. A good question must have an answer that is rather difficult to guess and thus block unauthorized access to your personal account.
People also ask

What are examples of some common security questions?
  • In what city were you born?
  • What is the name of your favorite pet?
  • What is your mother's maiden name?
  • What high school did you attend?
  • What is the name of your first school?
  • What was the make of your first car?
  • What was your favorite food as a child?
  • Where did you meet your spouse?
🌐
beyondtrust.com
beyondtrust.com › home › resources › blog › 10 common security questions--and the tips & tricks to mitigate their threat
How Common Security Questions Can Pose a High Risk | BeyondTrust
Why Are Common Security Questions a Problem?

The problem with these security questions (and with our answers) is that they become a liability when the results are leaked online, such as through a data breach, or become public knowledge. Why? Because many (in fact, thousands) of sites potentially use identical security questions. The variation from site-to-site is low, and questions for each user frequently, and inevitably, overlap across their many accounts. This standardization of security questions creates a substantial, but unnecessary, risk.

🌐
beyondtrust.com
beyondtrust.com › home › resources › blog › 10 common security questions--and the tips & tricks to mitigate their threat
How Common Security Questions Can Pose a High Risk | BeyondTrust
How Do I Make My Security Questions Stronger?

1. As much as is possible, do not select the same security questions across multiple sites. Keep your selections unique when the site allows you to pick your own questions. This will help limit the fallout and compromise of other accounts if the security question/answer is ever leaked. This is especially important for public figures whose history may be a part of public record or biographies posted on websites. For example, we all know the city our favorite musician or actor was born in, right?

2. Do not answer security questions in plain English (or your native language). That is what is expected, but it’s a security misstep. Treat your answers like passwords and introduce complexity in your response and its characters. For example, let’s say I was born in Little Rock, Arkansas. The security question for, “what city where you born in” would require the response, “Little Rock”. Now, add some password complexity. The new entry could therefore be, “L!ttl3 r0ck”. This answer is more difficult to guess or crack through automated tools and provides a simple layer of obfuscation to protect your security question responses. And, if anyone ever asks, you can honestly state that of course your mother’s maiden name does have numbers and symbols in it. Doesn’t yours?

3. In many instances, the best course of action is to provide fictitious information to these questions to keep them unique. You could use a personal password manager to populate the answer fields with password-like responses. Then, store each question and response in your password manager. For example, for an ecommerce site, you could create the entry “ecommercesite.com/question_birthcity” as the account and then enter a random, recommended password as the security response. This provides the secure storage you need in case of a password problem, while keeping your answers to same security question completely random and unique across sites and applications.

🌐
beyondtrust.com
beyondtrust.com › home › resources › blog › 10 common security questions--and the tips & tricks to mitigate their threat
How Common Security Questions Can Pose a High Risk | BeyondTrust
🌐
Full Scale
fullscale.io › blog › best-security-questions
Best Security Questions for Robust Protection (Examples)
Discover all the latest in technology, trends, innovation, IT news, hot skills, and culture from Full Scale's official blog.
🌐
OWASP Cheat Sheet Series
cheatsheetseries.owasp.org › cheatsheets › Choosing_and_Using_Security_Questions_Cheat_Sheet.html
Choosing and Using Security Questions - OWASP Cheat Sheet Series
For example, asking for a first name or surname could result in a two letter answer such as "Li", and a colour-based question could be four letters such as "blue". Answers should also be checked against a denylist, including: The username or email address. The user's current password. Common strings such as "123" or "password". If the security questions are not used as part of the main authentication process, then consider periodically (such as when they are changing their passwords after expiration) prompting the user to review their security questions and verify that they still know the answers.
🌐
BeyondTrust
beyondtrust.com › home › resources › blog › 10 common security questions--and the tips & tricks to mitigate their threat
How Common Security Questions Can Pose a High Risk | BeyondTrust
November 20, 2024 - The purpose of these questions is to periodically re-affirm our identity, or to regain access if we forget our password, by providing our personal secret answers. But security questions can pose a high risk when it comes to identity security--especially nowadays, when threat actors are much more likely to log in than hack in. Read on to learn more about why security questions pose such a high risk to identity security, and what we can do to protect our digital identities. Morey J. Haber ... The problem with common security questions (and with our answers) is they become a liability when the results are leaked online, such as through a data breach, or become public knowledge via outlets like social media.
🌐
Heyiris
heyiris.ai › blog › 10-common-security-questions-answers
10 Common Security Questions & Answers: Best Practices | Iris AI
1 week ago - A good security question should have an answer that is secret, memorable to you, and stable over time. Let's walk through ten of the most common questions you'll see and break down why they often fall short of that standard, leaving your accounts more vulnerable than you think.
🌐
NordVPN
nordvpn.com › blog › security-questions
How to choose the best security questions | NordVPN
May 7, 2025 - Good security questions for recovering a user’s current password should meet the following characteristics: Memorable. The answer to the question should immediately pop into your head, even if you’re logging in two years after you first created the account. Don’t make it the song you listened to on repeat 10 years ago, and ...
🌐
Stumble Forward
stumbleforward.com › home › scams & identity theft › the 10 most common password security questions
The 10 Most Common Password Security Questions
February 7, 2024 - When you answer these ten most common security questions one or two at a time, it’s easy to overlook just how simple the answers are: ... Using questions like these, researchers at Microsoft and Carnegie Mellon (pdf) found that people with no knowledge of the person whose account they were hacking could guess the correct answer 15% of the time.
Find elsewhere
🌐
BitGlint
bitglint.com › best-security-questions-all-you-need-to-know
Top 40 Best Security Questions: All You Need to Know - BitGlint
These answers are often simple to find through public records or social media. Hackers can exploit these commonly known details to bypass security measures. Tip: Choose questions with answers that are specific to you but not widely known or shared. Many people use answers tied to information they’ve posted online.
Published   December 13, 2024
🌐
Quora
quora.com › What-are-common-password-security-questions-and-how-might-hackers-obtain-the-answers
What are common password security questions, and how might hackers obtain the answers? - Quora
Answer (1 of 26): Common security questions are used as an extended security feature to trigger out the memory of a person, what is your mother's maiden name? But these questions are affecting differently. In 2008, a 20-year-old college student hacked the Yahoo! email account for then vice-presi...
🌐
Ntiva's Help Center
support.ntiva.com › hc › en-us › articles › 10303992796173-10-Security-Questions-Your-Organization-Should-Be-Asking
10 Security Questions Your Organization Should Be Asking – Ntiva's Help Center
Do you provide periodic anti-fraud and security training to employees? Social engineering is another common way attackers gain access to corporate networks and systems.
🌐
Infosec Institute
infosecinstitute.com › resources › general-security › security-question-and-answer-tips
Security question and answer tips | Infosec
A typical question, for example, asks the user to give their mother’s maiden name. A hacker could easily retrieve that information from any Facebook account, especially those in which people have identified their family members in between friends and/or have an open profile. A lot of attention is focused on choosing the right answers, but in reality, choosing the right security questions is the first step in creating a system that better secures passwords.
🌐
Foyer
usefoyer.com › blog › security-questions-examples
Security Question Best Practices [+31 Security Questions Examples] | Foyer
In this guide, we share modern security questions examples that are both easy to remember and specific enough to keep your accounts secure.
🌐
Staffbase
staffbase.com › home › blog › employee app › 10 security questions to answer for your internal communications app
10 Security Questions To Answer For Your Internal Communications App | Staffbase
August 27, 2025 - Your app/provider should know about them and be able to deal with them. The applications you use should be protected against common risks in Web applications, such as CSRF, SQLi, and XSS. Choose an app that either allows you to do penetration tests or that offers up old penetration tests results. ... 10.
🌐
Communicrossings
communicrossings.com › psw0rdz-security-questions-answers
P@s$w0rdz: Security Questions & Answers | CommuniCrossings
"The 10 Most Common Password Security Questions... What Is your favorite book? What is the name of the road you grew up on? What is your mother’s maiden name? What was the name of your first/current/favorite pet? What was the first company that you worked for?
🌐
LoginRadius
loginradius.com › home
Best Practices for Choosing Good Security Questions
January 31, 2019 - When choosing security question and answers, it’s extremely important that the correct answers cannot be guessed or researched over the internet. Here’s an example of a question that fails to meet these rules: ... This question could be considered unsafe because the information can be found online. Also, this information may be common ...
🌐
Passwordhero
passwordhero.com › blog › good-and-bad-security-questions-to-use-online-with-examples
Good and Bad Security Questions to Use Online (with Examples)
Many people use weak, easy-to-guess security questions for their internet accounts. We share examples of good and bad secuirty questions for improved online security.
🌐
Cloudfresh
cloudfresh.com › cloud blog › how to choose the best security questions for maximum safety
How to Choose Best Security Questions for Maximum Safety - Cloudfresh
December 5, 2024 - This article delves into the best security questions, offering practical insights into their selection and implementation to ensure robust identity security. A security question is a form of user authentication that verifies identity-based on personal knowledge. These questions typically serve as a secondary method of authentication, often used during password recovery or account verification processes. By answering a specific question correctly, users prove their identity, allowing them access to their accounts or the ability to reset their passwords.
🌐
NordPass
nordpass.com › blog › security questions
Are Security Questions Safe? | NordPass
What do your mom's maiden name, first pet, and the year you met your significant other have in common? The last time you had to recall one of these personal details, it was probably in the context of a security question. ... Usually, a security question is asked as a secondary measure to verify your identity when attempting to gain access to a private account. Its purpose is to add an extra layer of security, assuming that an unauthorized user will not answer ...