A Cyber Rethink

Interactive Video
•
Business, Information Technology (IT), Architecture, Other
•
University
•
Hard
Wayground Content
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was a key characteristic of the NotPetya attack?
It was a phishing attack.
It targeted only financial institutions.
It was a ransomware attack.
It spread without regard for collateral damage.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to the speaker, what is a common rule of thumb for cybersecurity spending?
15-20% of the IT budget
1-2% of the IT budget
Over 20% of the IT budget
6-8% of the IT budget
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What analogy does the speaker use to describe underinvestment in cybersecurity?
A leaking bucket
A credit card bill
A ticking clock
A broken bridge
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the 'Three Lines of Defense' model, who does the first line report to?
The Board of Directors
The CEO
The CFO
The CTO
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a benefit of having a 'Three Lines of Defense' model?
It focuses solely on financial risks.
It provides both embedded and independent perspectives.
It reduces the need for cybersecurity training.
It eliminates the need for external audits.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key metric for measuring cybersecurity success?
Number of software licenses
Amount of data stored
Number of major incidents
Number of employees
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does the speaker suggest viewing users in terms of phishing threats?
As sensors
As security experts
As passive observers
As potential threats
Create a free account and access millions of resources
Similar Resources on Wayground
8 questions
Cyber Is a Tool in Russia's War Playbook: Inglis

Interactive video
•
University
6 questions
We Are Still Not Sure of the Global Hack Damage: BitSight Co-Founder

Interactive video
•
University
2 questions
A Cyber Rethink

Interactive video
•
University
11 questions
How Multinational Companies Run Global Cybersecurity Programs

Interactive video
•
University
6 questions
Cybersecurity Tips for the Holiday Shopping Season

Interactive video
•
University
6 questions
Gatwick Airport Reopens to Backlog, Watching for a Return of Drones

Interactive video
•
University
11 questions
A Cyber Rethink

Interactive video
•
University
8 questions
U.S. to Tap $60 Billion War Chest in Boon for Huawei, ZTE Rivals

Interactive video
•
University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade