What was a key characteristic of the NotPetya attack?
A Cyber Rethink

Interactive Video
•
Business, Information Technology (IT), Architecture, Other
•
University
•
Hard
Quizizz Content
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It was a phishing attack.
It targeted only financial institutions.
It was a ransomware attack.
It spread without regard for collateral damage.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to the speaker, what is a common rule of thumb for cybersecurity spending?
15-20% of the IT budget
1-2% of the IT budget
Over 20% of the IT budget
6-8% of the IT budget
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What analogy does the speaker use to describe underinvestment in cybersecurity?
A leaking bucket
A credit card bill
A ticking clock
A broken bridge
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the 'Three Lines of Defense' model, who does the first line report to?
The Board of Directors
The CEO
The CFO
The CTO
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a benefit of having a 'Three Lines of Defense' model?
It focuses solely on financial risks.
It provides both embedded and independent perspectives.
It reduces the need for cybersecurity training.
It eliminates the need for external audits.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key metric for measuring cybersecurity success?
Number of software licenses
Amount of data stored
Number of major incidents
Number of employees
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does the speaker suggest viewing users in terms of phishing threats?
As sensors
As security experts
As passive observers
As potential threats
Create a free account and access millions of resources
Similar Resources on Quizizz
11 questions
The Cyber Security Threat

Interactive video
•
University
11 questions
How to Choose a Cybersecurity Vendor

Interactive video
•
University
8 questions
WSJ Pro Cybersecurity Survey Results

Interactive video
•
University
8 questions
Russian Hack Attack Should 'Wake the Nation Up,' Says Former IBM CEO

Interactive video
•
University
6 questions
How the FBI Plans to Fight Cyber Crime in 2015

Interactive video
•
University
6 questions
Risk Management for Cyber Security Managers - Information Security Controls

Interactive video
•
University
6 questions
UK Government to spend more on Cyber security

Interactive video
•
University
6 questions
U.S. Gov't Shutdown Puts National Websites at Risk

Interactive video
•
University
Popular Resources on Quizizz
10 questions
Chains by Laurie Halse Anderson Chapters 1-3 Quiz

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
15 questions
Character Analysis

Quiz
•
4th Grade
12 questions
Multiplying Fractions

Quiz
•
6th Grade
30 questions
Biology Regents Review #1

Quiz
•
9th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
50 questions
Biology Regents Review: Structure & Function

Quiz
•
9th - 12th Grade
Discover more resources for Business
10 questions
Identifying equations

Quiz
•
KG - University
16 questions
Chapter 8 - Getting Along with your Supervisor

Quiz
•
3rd Grade - Professio...
6 questions
Railroad Operations and Classifications Quiz

Quiz
•
University
71 questions
Logos

Quiz
•
3rd Grade - University
8 questions
Mali - Geography

Quiz
•
University