
Ransomware Quiz - Part 2
Authored by Nara E
Professional Development
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can the bank ensure systems are protected against vulnerabilities exploited by ransomware?
Implement an automated patch management system to regularly update all systems.
Perform manual patching of critical systems every six months.
Apply patches only when a vulnerability has been identified in the bank's environment.
Disable automatic updates to avoid potential disruptions to banking services.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best way to ensure the bank is prepared to handle future ransomware attacks?
Conduct regular ransomware tabletop exercises to test and improve the incident response plan.
Review the incident response plan annually and update it based on recent threats.
Assign a dedicated response team to handle all cybersecurity incidents without additional testing.
Focus on preventing ransomware entirely to avoid the need for response testing.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the most effective way to minimize the risk of unauthorized access to critical systems?
Implement multi-factor authentication (MFA) for all critical systems.
Require employees to change their passwords every 90 days.
Restrict access to critical systems based on seniority.
Assign shared accounts for teams working on sensitive systems.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can the bank ensure timely and effective reporting of future cybersecurity incidents?
Establish clear escalation protocols and designate a single point of contact for incident reporting.
Require all employees to report suspicious activities directly to the CEO.
Wait until the full scope of an incident is understood before escalating it.
Report incidents only after containment is complete to avoid unnecessary alarm.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can the bank minimize risks associated with third-party vendors?
Perform regular security audits and assessments of all third-party vendors.
Require vendors to self-certify compliance with cybersecurity policies.
Limit vendor access to the network only during business hours.
Avoid working with vendors who require access to sensitive systems.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can the bank proactively use threat intelligence to prevent future ransomware attacks?
Subscribe to a threat intelligence service to receive updates on emerging ransomware threats and Indicators of Compromise (IoCs).
Rely on publicly available cybersecurity alerts to monitor potential ransomware threats.
Regularly scan news websites for information about recent ransomware trends.
Avoid external threat intelligence services and rely solely on internal monitoring.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key principle of the zero-trust security model that the bank should adopt?
Verify all users and devices, regardless of their location, before granting access to resources.
Automatically trust employees using corporate devices on the internal network.
Grant network access to trusted partners and vendors without additional authentication.
Use static rules to control access based on IP addresses and geographic locations.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?