Search Header Logo
The Year in Hacks

The Year in Hacks

Assessment

Interactive Video

•

Business, Information Technology (IT), Architecture

•

University

•

Practice Problem

•

Hard

Created by

Wayground Content

FREE Resource

The video discusses various cybersecurity threats, focusing on ransomware, Bitcoin's role in ransom payments, and the Capital One data breach. It explains credential stuffing, phishing, and the evolving role of the CISO. The use of AI in cybersecurity and business email compromise are also covered.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is considered the technique of the year in cybersecurity?

Phishing

Ransomware

Insider Threats

Credential Stuffing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to have a non-technical plan for ransomware?

To manage business partnerships and communication

To reduce the cost of cybersecurity insurance

To ensure technical systems are updated

To increase the speed of data recovery

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What role does Bitcoin play in ransomware attacks?

It is used to track hackers

It is a tool for data backup

It is used to encrypt files

It is a common payment method for ransoms

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was a key factor in the Capital One hack?

An insider threat

A DDoS attack

A phishing attack

A SQL injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is credential stuffing?

Sending fake emails to steal information

Using stolen credentials from one breach to access other accounts

Encrypting files and demanding a ransom

Overloading a server with traffic

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How did Fortnite encourage users to adopt multifactor authentication?

By sending reminders via email

By offering a discount on in-game purchases

By providing a gift box that must be given to a friend

By automatically enabling it for all users

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common tactic used in phishing attacks?

Sending emails that appear to be from legitimate sources

Using complex algorithms to encrypt data

Stealing physical devices

Overloading servers with traffic

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?