How attackers exploit the COVID crisis to compromise your network

How attackers exploit the COVID crisis to compromise your network

Assessment

Interactive Video

Created by

Quizizz Content

Architecture, Information Technology (IT)

University

Hard

The video discusses the ongoing cyber threats related to COVID-19, highlighting phishing attacks, malicious domains, and malware. Anomaly and Microsoft provide insights into the evolving nature of these threats, with specific examples of targeted attacks. Recommendations for protection include using Microsoft Defender ATP, blocking legacy authentication, and employing filtering services. The video also emphasizes the importance of community resources like the COVID-19 Cyber Threat Coalition for staying informed and protected.

Read more

7 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What types of phishing attacks related to COVID-19 have been identified?

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

How did the style of attacks change from January to March during the pandemic?

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

What are some of the tactics used by attackers to impersonate official organizations?

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 1 pt

What measures did Microsoft take to protect healthcare organizations during the pandemic?

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

What recommendations are given for protecting endpoints in a remote work environment?

Evaluate responses using AI:

OFF

6.

OPEN ENDED QUESTION

3 mins • 1 pt

What is the significance of blocking legacy authentication according to the text?

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 1 pt

How can organizations stay informed about COVID-19 related cyber threats?

Evaluate responses using AI:

OFF