Search Header Logo
How attackers exploit the COVID crisis to compromise your network

How attackers exploit the COVID crisis to compromise your network

Assessment

Interactive Video

Architecture, Information Technology (IT)

University

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

The video discusses the ongoing cyber threats related to COVID-19, highlighting phishing attacks, malicious domains, and malware. Anomaly and Microsoft provide insights into the evolving nature of these threats, with specific examples of targeted attacks. Recommendations for protection include using Microsoft Defender ATP, blocking legacy authentication, and employing filtering services. The video also emphasizes the importance of community resources like the COVID-19 Cyber Threat Coalition for staying informed and protected.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the main threats related to COVID-19 discussed in the video?

Physical theft

Hardware malfunctions

Natural disasters

Phishing attacks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How did attack techniques change in February according to the video?

Focus on physical security

Shift to remote access Trojans

Increased use of social media

Reduction in cyber attacks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which countries were most targeted by COVID-19 themed attacks?

India, Brazil, and Germany

South Africa, Mexico, and Italy

China, United States, and Russia

Australia, Canada, and Japan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What service did Microsoft offer for free to healthcare providers?

Web hosting services

Account guard threat notification service

Free antivirus software

Cloud storage solutions

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is recommended to block in order to prevent easy access by attackers?

Legacy authentication

Public Wi-Fi networks

Social media accounts

Personal email accounts

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of the COVID-19 Cyber Threat Coalition?

To share information on cyber threats

To offer financial aid

To provide medical supplies

To organize community events

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key method to protect against email-based attacks?

Implementing email filtering services

Switching to paper communication

Disabling all email accounts

Using a VPN

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?