United Bank for Africa - Tabletop Exercise
Quiz
•
Information Technology (IT)
•
2nd Grade
•
Practice Problem
•
Hard
Obianuju Ego-Osuala
Used 1+ times
FREE Resource
Enhance your content in a minute
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Scenario Overview
Several employees report being locked out of their workstations. A ransom note appears on their screens demanding $3 million in Bitcoin within 72 hours.
The attackers claim to have exfiltrated customer data, including financial records and personally identifiable information (PII).
The bank’s online services and mobile app are intermittently unavailable, and ATM transactions begin to fail.
Exercise Phases and Injects
Phase 1 – Detection and Initial Response
Inject 1: IT operations report that over 40% of endpoints are encrypted.
Inject 2: The SOC identifies the ransomware variant as “LockBit 3.0.”
Discussion Points:
1. How will you activate the incident response plan?
a) Wait for full confirmation from IT before acting
b) Immediately convene the incident response team and activate the incident response plan
c) Notify all staff to shut down their systems immediately without coordination
d) Escalate only to the CIO and await further direction
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
2. Who makes the call to shut down affected systems or the network?
2. Who makes the call to shut down affected systems or the network?
a) The Board of Directors
b) The Chief Information Security Officer (CISO) in consultation with the board of directors and senior executives
c) Any IT staff member noticing the issue
d) The external managed service provider
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
3. How do you verify the extent of data exfiltration?
3. How do you verify the extent of data exfiltration?
a) Assume all data is stolen
b) Wait for attackers to release data proof
c) Engage the forensics team to analyze network traffic and logs for data exfiltration evidence
d) Contact the regulator to confirm data loss
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Phase 2 – Communication and Escalation
Inject 3: A journalist emails the communications team claiming they received a leaked sample of customer data from the attackers.
Inject 4: The regulator (e.g., CBN or FDIC) requests an urgent report on the incident.
Discussion Points:
4. What is your communication strategy (internal/external)?
a) Silence until the attack is fully resolved
b) Publicly deny the incident immediately
c) Allow employees to post clarifications on social media
d) Coordinate internal updates and prepare approved external communication guided by legal and compliance teams
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
5. What message do you give to customers and the media?
5. What message do you give to customers and the media?
a) Acknowledge the incident, assure investigation and customer protection steps
b) Downplay the incident to avoid panic
c) Share all technical details publicly
d) Redirect media to IT for responses
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
6. How do you handle disclosure to regulators and law enforcement?
6. How do you handle disclosure to regulators and law enforcement?
a) Delay reporting until the ransom deadline
b) Promptly report the incident in line with legal and regulatory requirements
c) Report only after customer data is confirmed leaked
d) Only disclose if compelled by the regulator
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Phase 3 – Business Impact
Inject 5: Online banking remains unavailable for over 8 hours.
Inject 6: The attackers release 10,000 customer records on the dark web as proof.
Discussion Points:
7. What is your stance on ransom payment?
a) Immediately pay to restore operations
b) Evaluate payment only after consulting law enforcement, legal counsel, and considering regulatory and ethical implications
c) Refuse payment under all circumstances
d) Let IT decide based on system downtime
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
How Computer works
Quiz
•
2nd Grade
17 questions
Quiz Instance Store dan Amazon Elastic Block Store (Amazon EBS)
Quiz
•
1st Grade - University
15 questions
Organisational Tools for Students
Quiz
•
2nd Grade
13 questions
iSkyTech AlNas
Quiz
•
1st - 5th Grade
10 questions
Mengenal Live Streaming dan Konten Menarik
Quiz
•
2nd Grade
10 questions
Recuperação - Bancos de Dados - DDL
Quiz
•
2nd Grade
12 questions
TKA KWU
Quiz
•
2nd Grade
15 questions
Recuperação - Ciência da Computação - Redes de Computadores
Quiz
•
2nd Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Information Technology (IT)
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
15 questions
Fun Christmas Trivia for Kids
Quiz
•
2nd Grade
26 questions
Christmas Songs
Quiz
•
2nd - 3rd Grade
10 questions
Christmas/Winter
Quiz
•
KG - 2nd Grade
20 questions
Christmas Movies
Quiz
•
1st - 12th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
2nd Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
1st - 3rd Grade
