CyberSecurity Training

CyberSecurity Training

1st - 7th Grade

10 Qs

Similar activities

Digital Citizenship

Digital Citizenship

6th - 8th Grade

10 Qs

Know your Library

Know your Library

4th - 6th Grade

10 Qs

Pop Quiz: Week 2

Pop Quiz: Week 2

3rd Grade

15 Qs

Quiz 2- Safe Passwords and Multitasking

Quiz 2- Safe Passwords and Multitasking

3rd - 6th Grade

14 Qs

Chapter 12 Review

Chapter 12 Review

6th - 8th Grade

15 Qs

Privacy and Password

Privacy and Password

1st - 6th Grade

10 Qs

Discord quiz 2021

Discord quiz 2021

3rd Grade - Professional Development

10 Qs

Cyber Safety And Ethics

Cyber Safety And Ethics

KG - Professional Development

8 Qs

CyberSecurity Training

CyberSecurity Training

Assessment

Quiz

Created by

Nduka Osaebu

Other

1st - 7th Grade

10 plays

Medium

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Situation update 1: An attacker was able to compromise an outlook account of an executive due to the use of weak passwords and lack of Second Factor Authentication on the executive’s account. The malicious actor gained access to this account over 3 months ago, remained covert and was able to monitor all the executive’s mails and thereby understanding the technological processes in the Bank. Key words such as password, account, finance, amount etc. were searched on the mailbox and the credentials to a secure database and VPN to connect to the internal network were retrieved.

 

How will you classify the risk level?

Critical

High

Medium

Low

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Who determines the impact the incident will have on core business operations and services?

Executive Management

The Chief Information Security Officer

Head, IT Division

The Data Protection Officer

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Who is to be held responsible for the coordination of the different units of the team to work towards one unified incidence response plan?

The Chief Information Security Officer

Head, Human Resource

Chief Internal Auditor

Head, IT Department

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What bad cybersecurity practices was/were observed in the Bank that led to the breach?

The use of weak credentials

The lack of a second factor authentication alongside the use of a password

Password rotation was not observed by the Bank.

All of the above

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Situation update 2: The SOC team detected that one of the Bank’s  core database was accessed via a different IP and sensitive data of customers, CAC certificates, bonds, loan accounts and other PIIs were downloaded/copied out.  An investigation was launched by the security team to narrow down which user account was used in accessing the database. The investigation reports showed that the CIO accounts was used in accessing the database at 0200hrs on the day of the Incident.

The security team proceeded to carry out a forensic investigation on the CIO’s account and it was discovered that some certain sensitive mails were forwarded to a Gmail account and deleted from the sent folder in the CIO account. The IT team then sends a mail to the CIO to change his password, that conforms to the new password policy.

 

Would you say data privacy & protection was breached?

Yes

No

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who is responsible for reviewing the performance and effectiveness of Information security policies within the Bank

The Executive Management

The Chief Information Security Officer

The Head of Departments

The Chief Risk Officer

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Situation update 3: Three days later, a panicked customer called to ask why details of his loan transactions and his asset he used as collateral were posted and trending on twitter. Shortly after, another customer called to complain that the portal he frequently uses to track and view the status of his transaction is down.

 

Which team should oversee the customer’s request?

Corporate Communications Team

Customer Care Team

Operational Risk Team

Legal Division

8.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What should be done to ensure that the Bank doesn’t fall victim of the same attack again?

Do nothing. Updates from the technology vendor will stop the attack next time

A "lessons learned" meeting should be done after the incident to identify improvement opportunities and implement the required recommendations

Buy more technologies to address the issue

Perform a password change for all staff

9.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Should the regulators be informed?

Yes

No

10.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the most important way to protect yourself from cyber attacks?

Install security software (antivirus, antispam etc.) and latest operating system on your mobile device and computer from a reputable provider.

Lock your computer and smartphones when not in use.

Use encryption for your most sensitive files such financial records, make regular back-ups of all your important data, and store it in another location.

All of the above.

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?