Cyber Security Assessment for Bank Officials

Cyber Security Assessment for Bank Officials

Professional Development

100 Qs

quiz-placeholder

Similar activities

Xbox Games!

Xbox Games!

KG - Professional Development

100 Qs

Dental Abbreviations

Dental Abbreviations

Professional Development

98 Qs

CONTOH SOAL P3K 2024

CONTOH SOAL P3K 2024

Professional Development

95 Qs

0004: Mental and Emotional Health

0004: Mental and Emotional Health

Professional Development

98 Qs

Orenda E-Sports CSGO Callouts

Orenda E-Sports CSGO Callouts

KG - Professional Development

100 Qs

Arrest, Search, and Seizure Exam

Arrest, Search, and Seizure Exam

University - Professional Development

100 Qs

KISI-KISI US EKONOMI KELAS XII IPS 1,2,3

KISI-KISI US EKONOMI KELAS XII IPS 1,2,3

Professional Development

100 Qs

Analytical and Critical Thinking Quiz - MEGATHIL

Analytical and Critical Thinking Quiz - MEGATHIL

Professional Development

101 Qs

Cyber Security Assessment for Bank Officials

Cyber Security Assessment for Bank Officials

Assessment

Quiz

Other

Professional Development

Easy

Created by

Pradipta Roy

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

100 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the current version of Dutch-Bangla Bank ICT Operation and Security Policy?

Seventh Revision: April 2022

Eighth Revision: June 2022

First Version: November 2021

Tenth Revision: September 2022

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks requires a carrier file to self-replicate?

Trojan

Virus

Worm

Spam

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone who is posing as an IT tech requests information about your computer configuration. What kind of attack is this?

Insider threat

Phishing

Social engineering

Whaling

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are allowed to share or print full card number, PIN, password, expiry date with everyone. True or False?

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes monitoring software installed without your consent?

Malware

Adware

Spyware

Ransomware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cyber criminals only target large companies. True or False?

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following should you do to restrict access to business application?

Update your software once a year.

Share passwords only with colleagues you trust.

Have your staff members access information via an open Wi-Fi network.

Use multi-factor authentication.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?