Search Header Logo

Ransomware Quiz - Part 2

Authored by Nara E

Professional Development

Professional Development

Used 1+ times

Ransomware Quiz - Part 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can the bank ensure systems are protected against vulnerabilities exploited by ransomware?

Implement an automated patch management system to regularly update all systems.

Perform manual patching of critical systems every six months.

Apply patches only when a vulnerability has been identified in the bank's environment.

Disable automatic updates to avoid potential disruptions to banking services.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way to ensure the bank is prepared to handle future ransomware attacks?

Conduct regular ransomware tabletop exercises to test and improve the incident response plan.

Review the incident response plan annually and update it based on recent threats.

Assign a dedicated response team to handle all cybersecurity incidents without additional testing.

Focus on preventing ransomware entirely to avoid the need for response testing.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most effective way to minimize the risk of unauthorized access to critical systems?

Implement multi-factor authentication (MFA) for all critical systems.

Require employees to change their passwords every 90 days.

Restrict access to critical systems based on seniority.

Assign shared accounts for teams working on sensitive systems.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can the bank ensure timely and effective reporting of future cybersecurity incidents?

Establish clear escalation protocols and designate a single point of contact for incident reporting.

Require all employees to report suspicious activities directly to the CEO.

Wait until the full scope of an incident is understood before escalating it.

Report incidents only after containment is complete to avoid unnecessary alarm.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can the bank minimize risks associated with third-party vendors?

Perform regular security audits and assessments of all third-party vendors.

Require vendors to self-certify compliance with cybersecurity policies.

Limit vendor access to the network only during business hours.

Avoid working with vendors who require access to sensitive systems.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can the bank proactively use threat intelligence to prevent future ransomware attacks?

Subscribe to a threat intelligence service to receive updates on emerging ransomware threats and Indicators of Compromise (IoCs).

Rely on publicly available cybersecurity alerts to monitor potential ransomware threats.

Regularly scan news websites for information about recent ransomware trends.

Avoid external threat intelligence services and rely solely on internal monitoring.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key principle of the zero-trust security model that the bank should adopt?

Verify all users and devices, regardless of their location, before granting access to resources.

Automatically trust employees using corporate devices on the internal network.

Grant network access to trusted partners and vendors without additional authentication.

Use static rules to control access based on IP addresses and geographic locations.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?