Cyber Security Assessment for Bank Officials

Cyber Security Assessment for Bank Officials

Professional Development

100 Qs

quiz-placeholder

Similar activities

Product Training Forklift

Product Training Forklift

Professional Development

100 Qs

PFRC 601-700

PFRC 601-700

Professional Development

100 Qs

Chess Quiz - Compilation

Chess Quiz - Compilation

KG - Professional Development

100 Qs

DAY I--ALE JAN 2022

DAY I--ALE JAN 2022

Professional Development

100 Qs

Tebak youtuber Minecraft

Tebak youtuber Minecraft

KG - Professional Development

99 Qs

Hamilton College Family Quiz 2

Hamilton College Family Quiz 2

KG - Professional Development

100 Qs

GOKULAM  (QUIZZ 8)

GOKULAM (QUIZZ 8)

Professional Development

100 Qs

Pretest menuju guru yang profesional

Pretest menuju guru yang profesional

Professional Development

100 Qs

Cyber Security Assessment for Bank Officials

Cyber Security Assessment for Bank Officials

Assessment

Quiz

Other

Professional Development

Easy

Created by

Pradipta Roy

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

100 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the current version of Dutch-Bangla Bank ICT Operation and Security Policy?

Seventh Revision: April 2022

Eighth Revision: June 2022

First Version: November 2021

Tenth Revision: September 2022

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks requires a carrier file to self-replicate?

Trojan

Virus

Worm

Spam

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone who is posing as an IT tech requests information about your computer configuration. What kind of attack is this?

Insider threat

Phishing

Social engineering

Whaling

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are allowed to share or print full card number, PIN, password, expiry date with everyone. True or False?

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes monitoring software installed without your consent?

Malware

Adware

Spyware

Ransomware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cyber criminals only target large companies. True or False?

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following should you do to restrict access to business application?

Update your software once a year.

Share passwords only with colleagues you trust.

Have your staff members access information via an open Wi-Fi network.

Use multi-factor authentication.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?