Security Questions: Best Practices, Examples, and Ideas (2024)

Security questions are a common method of identity authentication—one you’ve probably encountered before. When creating an account or signing up for a service online, users will confidentially share the answers to secret questions with a provider.

Typically, these security questions and answers are used for self-service password recovery—inputting the correct answer verifies the user and allows them to reset their password—though you can also implement security questions as an additional authentication factor for logins.

However, we don’t advise relying on security questions alone for either of these use cases. While they’re simple to set up, security answers are hackable, guessable, and vulnerable to theft in much the same way that passwords are. That said, if you’re still interested in protecting your organization with security questions, this blog post will help you understand what constitutes a good security question and answer, and the best practices for using them effectively.

Types of security questions

There are two main types of security questions:

  • User-defined questions let users choose a question from a set list that they would like to provide an answer to. While it’s easy for developers to implement these questions as part of the account creation process, they’re only effective if the user chooses a strong answer that’s hard to discover.
  • System-defined questions are based on information that the service provider already knows about the user (e.g., address or date of birth). These questions rely on the system holding sufficient information about the user—and on the answer being difficult for a threat actor to find out.

We’ll explore the viability of both question types throughout the rest of this post—but first, let’s examine what makes some security questions better than others.

What makes a good security question?

Security questions must have the following characteristics if they’re to positively contribute to secure authentication:

  • Confidentiality: No one else should be able to guess, research, or otherwise obtain the answer. This is the most important trait for an answer to have—if the answer is easy to find out, then it sabotages an account’s security. If a piece of information is known to anyone around the user or can be found online, it isn’t confidential.
  • Memorability: Users need to remember the answer, potentially for a long time after creating an account. Ideally, the user can immediately recall the answer; they shouldn’t have to write it down or look it up.
  • Consistency: The answer to the question can’t change over time. It’s best to avoid answers that are only guaranteed in the moment, like favorites and opinions—instead, think about historical facts or permanent pieces of information.
  • Simplicity: The answer should be precise, clear to the user, and easy to give. Questions with ambiguous answers, or answers that require case sensitivity or particular formatting can be difficult to keep track of.
  • Multiplicity: There should be multiple possible answers to the question. The more possible answers, the better the security—it’ll be less likely that someone manages to guess or brute force the answer. Many service providers will even lock users out of an account after a number of failed attempts.

List of security questions

Keeping the above principles in mind, we’ve created a list of common security questions. Read on to find out what makes some more secure than others.

Examples of bad security questions

These security questions are considered bad because they are impractical or open to exploitation:

Ineffective Security Question

Rationale

What is your date of birth?

Easy for others to guess—it’s not confidential.

What was your favorite school teacher’s name?

Childhood topics may be too distant for people to remember.

What’s your favorite movie?

This is likely to change over time.

What was your first car?

It’s ambiguous what level of detail the answer should have.

What is your astrological sign?

There’s a narrow range of potential answers, and it’s something that others could guess or discover.

Examples of good security questions

The above questions all fall short on security or usability for one reason or another. Below, we’ve revised the list of security questions, making them more practical or protective:

Effective Security Question

Rationale

What city were you born in?

Generally speaking, this fact is less commonly known, making it difficult for others to guess.

What is your oldest sibling’s middle name?

Typically, this is something intimately known between siblings and difficult for others to research.

What was the first concert you attended?

The answer isn’t prone to change.

What was the make and model of your first car?

The question asks for precise and specific details.

In what city or town did your parents meet?

This is a personal detail. And since there are many potential answers, it’s harder for people to guess.

Are security questions good to use?

Security questions are easy for organizations to implement—plus, they’re familiar and effortless for users. But the benefits end there.

In an ever-sophisticated threat landscape, security questions have had their day. They offer low assurance protection, and even the sample security questions we provided above are open for others to exploit through guesswork, social media, and online research. In addition, both user- and system-defined security answers are as vulnerable to being stolen in a data breach or phishing scam as passwords are—a significant reason why security experts advocate for their disuse.

In kind, we can’t recommend security questions as your main method of account protection. As part of a broader security strategy, we think good security questions can work as an additional method of authentication, but with a few stipulations in place.

Security question best practices

While security questions are not the most effective method of securing accounts, there are some things that organizations, employees, and customers can all do to make them stronger.

Tips for using security questions

If you’d still like to use security questions as a supporting security method for your employees or customers, we suggest the following best practices to mitigate vulnerabilities:

  • Restrict answers: Check answers against a deny list for common responses, like the username or email address, the user’s current password, and guessable character strings like “123” and “password.” Enforcing a minimum length for answers can also help to avoid such answers.
  • Renew questions:Periodically prompt the user to review their security questions and confirm that they still know the answers. This should give them the opportunity to update any answers that might have changed, and makes it more likely that the user will remember their most recent answer should they need it to recover their account.
  • No self-written questions:Allowing users to write their own questions introduces risk. It could result in strong, unique questions that are difficult for hackers to answer—but it could also result in weak and easily-exploitable questions. Self-written questions rely on the user’s own security behavior, so inviting users with less security awareness to set their own questions can really increase the risk of account takeover.
  • Set multiple security questions: Asking users multiple questions at the same time can improve the assurance level of security questions, especially if the answers are varied and require an attacker to obtain more obscure information. Mixing user- and system-defined questions is a potential approach to this.Either way, when a user is asked a question out of a selection, don’t allow them to choose another question until they’ve answered it correctly. This minimizes the chance of attackers being able to guess or obtain the answers they need to access accounts.
  • Use encrypted storage: Answers may contain personal information about users and may be reused across different accounts. Consider using secure hashing algorithms to prevent hackers from obtaining security answers from your system.

Tips for setting security answers

Implementing security questions is only effective if users know best practices. Here’s some advice you can provide to employees and customers to strengthen their security answers:

  • Use fake answers: Instead of responding with meaningful information that others can find out, use a false answer that others can’t verify, ideally with a random string of characters. In that sense, treat security answers like passwords—the more obscure, the better.
  • Use a password manager: Remembering randomized text strings is much more difficult than truthful, personal details. That’s why it’s worth using a password manager to store your security answers, so you don’t lose track of them.

What are some better alternatives to security questions?

If you’d prefer to move on from security questions altogether, there are a breadth of other measures available, each with varying levels of assurance:

Security Questions: Best Practices, Examples, and Ideas (1)

Before selecting one to secure your workforce and customers, it’s important to know the risks and benefits of each—and which ones offer the highest level of security. Those that rely on something the user knows (e.g., security questions and passwords) are the least secure, while those that rely on something the user has or one of their attributes offer the highest level of assurance.

Biometric authentication, for example, is more threat-resistant than others because it relies on identifiers that are unique to each user, like voice, fingerprints, DNA, and facial recognition. Users don’t have to remember or store biometric traits like they do security answers, making them harder to compromise.

Multi-factor authentication (MFA), on the other hand, is a context-aware approach to authentication. You can implement a mix of authentication factors to suit the needs of your organization, and analyze risk signals from user login attempts to determine which authentication methods are the most appropriate. With this setup, you have the flexibility to use security questions and passwords as one of many authentication options, deploying them for additional assurance in low-risk contexts or forgoing them altogether.

Security questions are vulnerable to exploitation because they rely on knowledge—if an attacker guesses, researches, or phishes a security answer, for instance, the account is compromised. Not even the best security questions are immune to these attacks. To start moving beyond security questions and to learn more about Okta’s Adaptive MFA solution, check out our datasheet.

Security Questions: Best Practices, Examples, and Ideas (2024)

FAQs

Security Questions: Best Practices, Examples, and Ideas? ›

Good security questions should have answers that are easy for the user to remember but difficult for someone else to guess. For example, questions about personal preferences or experiences can be effective, such as “What is your favorite movie?” or “What was the name of your first pet?”

What are the best examples of security questions? ›

Here are examples of some common security questions:
  • In what city were you born?
  • What is the name of your favorite pet?
  • What is your mother's maiden name?
  • What high school did you attend?
  • What was the name of your elementary school?
  • What was the make of your first car?
  • What was your favorite food as a child?
Jul 26, 2022

What kind of answers should you use for additional security questions? ›

The security question should be factual and not change over time. For example, your preferred musical genre, favorite song, or work address might change, but the city you were born in won't. Unpredictable. Don't make the answer something others can easily guess or research.

What is a good security answer? ›

What makes a good security question? The best security questions and answers are safe, memorable, consistent, specific and unpredictable. 1. Safe: Ensure that the answer to your security question is confidential and cannot be easily guessed by others.

What is the security question and security answer? ›

A security question is just another form of a password mechanism. Therefore, a security question should not be shared with anyone else, or include any information readily available on social media websites, while remaining simple, memorable, difficult to guess, and constant over time.

How do I create a strong security question? ›

Good security questions should have answers that are easy for the user to remember but difficult for someone else to guess. For example, questions about personal preferences or experiences can be effective, such as “What is your favorite movie?” or “What was the name of your first pet?”

What are some examples of memorable questions? ›

Sample Questions

Where was my mother born? What is my father's middle name? What was the name of my imaginary friend when I was a child? In what month was I married?

Are security questions a good idea? ›

There are several reasons why leaning on security questions to protect you is a bad idea. It comes down to a pair of unfortunate realities: Potential attackers are more clever than you might think, and there's more personal information online than you realize.

What is true of security questions? ›

Answers can be hacked

They can be hacked just like a password, for example. And since businesses tend to offer the same selection of questions – the most well-known security question example is “What is your mother's maiden name?” – people end up reusing the answer.

What is a good e-transfer security question? ›

A good question is one where the answer cannot be easily answered, for example, “what is your mom's middle name?”, or “what is the secret password I gave you?” It's a good idea to agree on a shared secret security question before sending the Interac e-Transfer transaction.

What are the 4 basic of security? ›

The four basic layers of physical security are design, control, detection, and identification. For each of these layers, there are different options that can be utilized for security. Physical security design refers to any structure that can be built or installed to deter, impede, or stop an attack from occurring.

What is the security short answer? ›

Security means safety, as well as the measures taken to be safe or protected.

Which are the three types of authentication questions? ›

What Are The 3 Types Of Multi-Factor Authentication?
  • Something You Know. The first method of authentication is called knowledge-based authentication (KBA), and involves something the user knows. ...
  • Something You Have. The second method of authentication is via something that the user has. ...
  • Something You Are. ...
  • Summary.
Apr 23, 2024

What is an example of a strong security question? ›

Basic Types of Secure Questions

Family (What year was your grandmother born?); Preferences (What is your favorite sport?); First (What month was your first child born?); Personal characteristics (What is your skin color?);

What is a security question hint? ›

Security questions are a common method of identity authentication—one you've probably encountered before. When creating an account or signing up for a service online, users will confidentially share the answers to secret questions with a provider.

What are the questions for security? ›

Top Security Guard Interview Questions
  • What Made You Choose a Security Guard Job?
  • Have You Previously Worked as a Security Guard? ...
  • How Do You Identify Potential Security Breaches or Threats?
  • How Do You Handle Potentially Dangerous Situations?
  • Do You Have Any Experience With Surveillance Equipment?

What are the 5 security questions at airport? ›

8 Airport questions you need to be able to answer in English
  • Do you have an e-ticket or a paper ticket? ...
  • Are you checking in baggage or carrying on? ...
  • Would you like a window or aisle seat? ...
  • May I see your boarding pass? ...
  • Which gate should I board from? ...
  • Is my flight delayed or on-time? ...
  • Do you have anything to declare?

What are the three examples of security? ›

The three main types of security controls—management, operational, and physical—work together to form a strong security program. A good security strategy combines these elements to defend against potential threats effectively. Regular reviews and updates are essential to keep your protection up-to-date.

Top Articles
8 Things Brokers Should Know About Credit Reporting Services
Dividend Yield: Meaning, Formula, Example, and Pros and Cons
Dainty Rascal Io
Enrique Espinosa Melendez Obituary
Lifewitceee
Google Jobs Denver
Naturalization Ceremonies Can I Pick Up Citizenship Certificate Before Ceremony
Minn Kota Paws
Top Golf 3000 Clubs
Pollen Count Los Altos
Guidewheel lands $9M Series A-1 for SaaS that boosts manufacturing and trims carbon emissions | TechCrunch
Samantha Lyne Wikipedia
2016 Hyundai Sonata Refrigerant Capacity
Paychex Pricing And Fees (2024 Guide)
Energy Healing Conference Utah
Swgoh Blind Characters
Drago Funeral Home & Cremation Services Obituaries
ELT Concourse Delta: preparing for Module Two
Blue Rain Lubbock
Popular Chinese Restaurant in Rome Closing After 37 Years
Theater X Orange Heights Florida
Bjerrum difference plots - Big Chemical Encyclopedia
Air Quality Index Endicott Ny
The Listings Project New York
Crossword Help - Find Missing Letters & Solve Clues
Sorrento Gourmet Pizza Goshen Photos
Regina Perrow
Pioneer Library Overdrive
Urbfsdreamgirl
800-695-2780
Giantbodybuilder.com
Mami No 1 Ott
Barbie Showtimes Near Lucas Cinemas Albertville
What are the 7 Types of Communication with Examples
Halsted Bus Tracker
Rubmaps H
Home Auctions - Real Estate Auctions
Half Inning In Which The Home Team Bats Crossword
Nextdoor Myvidster
Iban's staff
Bones And All Showtimes Near Johnstown Movieplex
Craigslist En Brownsville Texas
Puretalkusa.com/Amac
Bob And Jeff's Monticello Fl
ESA Science & Technology - The remarkable Red Rectangle: A stairway to heaven? [heic0408]
R: Getting Help with R
Natasha Tosini Bikini
Craigslist Com St Cloud Mn
Blue Beetle Showtimes Near Regal Evergreen Parkway & Rpx
Quaally.shop
Salem witch trials - Hysteria, Accusations, Executions
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 5542

Rating: 4.9 / 5 (49 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.