7 dumb ways to be a ransomware victim, and how to avoid the embarrassment

7 dumb ways to be a ransomware victim, and how to avoid the embarrassment

Assessment

Interactive Video

Created by

Quizizz Content

Architecture, Information Technology (IT)

University

Hard

The video discusses ransomware threats, focusing on phishing tactics and vulnerabilities like stored passwords and open RDP. It emphasizes the importance of strong passwords, multi-factor authentication, and patching vulnerabilities like Netlogon and SMB V1. Email hygiene and security measures are also highlighted to prevent phishing attacks.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What method do attackers use to disguise phishing emails?

As online shopping receipts

As social media notifications

As meeting invites or invoices

As weather alerts

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool can expose saved group policy preference passwords?

Microsoft Word

PowerShell command get GPO password PS1

Adobe Acrobat

Google Docs

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common vulnerability associated with Remote Desktop Protocol (RDP)?

It is always encrypted

It is only accessible on weekends

It is often left open to the web

It requires no authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key strategy to prevent attackers from logging in with stolen passwords?

Enabling multi-factor authentication

Disabling all user accounts

Changing passwords monthly

Using a single-factor authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the netlogon vulnerability also known as?

Zero login

Zero trust

Zero hour

Zero day

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be implemented to improve email security against phishing?

Email hygiene programs

Weekly email newsletters

Email forwarding

Email archiving

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended tool to manage and secure passwords?

A password manager program

A text document

A sticky note

A spreadsheet