CyberSecurity Training

CyberSecurity Training

1st - 7th Grade

10 Qs

quiz-placeholder

Similar activities

Cartoon Network-LSM

Cartoon Network-LSM

2nd - 7th Grade

10 Qs

The First Five Presidents

The First Five Presidents

KG - Professional Development

10 Qs

Myself

Myself

4th Grade

13 Qs

Rock Cycle

Rock Cycle

6th Grade

10 Qs

Tiktok 2020 Quizzo

Tiktok 2020 Quizzo

6th - 12th Grade

12 Qs

Penultimate Peril

Penultimate Peril

1st Grade

11 Qs

bluey

bluey

4th Grade

15 Qs

Was/were/wasn’t/Weren’t

Was/were/wasn’t/Weren’t

5th Grade

10 Qs

CyberSecurity Training

CyberSecurity Training

Assessment

Quiz

Other

1st - 7th Grade

Medium

Created by

Nduka Osaebu

Used 10+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Situation update 1: An attacker was able to compromise an outlook account of an executive due to the use of weak passwords and lack of Second Factor Authentication on the executive’s account. The malicious actor gained access to this account over 3 months ago, remained covert and was able to monitor all the executive’s mails and thereby understanding the technological processes in the Bank. Key words such as password, account, finance, amount etc. were searched on the mailbox and the credentials to a secure database and VPN to connect to the internal network were retrieved.

 

How will you classify the risk level?

Critical

High

Medium

Low

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Who determines the impact the incident will have on core business operations and services?

Executive Management

The Chief Information Security Officer

Head, IT Division

The Data Protection Officer

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Who is to be held responsible for the coordination of the different units of the team to work towards one unified incidence response plan?

The Chief Information Security Officer

Head, Human Resource

Chief Internal Auditor

Head, IT Department

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What bad cybersecurity practices was/were observed in the Bank that led to the breach?

The use of weak credentials

The lack of a second factor authentication alongside the use of a password

Password rotation was not observed by the Bank.

All of the above

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Situation update 2: The SOC team detected that one of the Bank’s  core database was accessed via a different IP and sensitive data of customers, CAC certificates, bonds, loan accounts and other PIIs were downloaded/copied out.  An investigation was launched by the security team to narrow down which user account was used in accessing the database. The investigation reports showed that the CIO accounts was used in accessing the database at 0200hrs on the day of the Incident.

The security team proceeded to carry out a forensic investigation on the CIO’s account and it was discovered that some certain sensitive mails were forwarded to a Gmail account and deleted from the sent folder in the CIO account. The IT team then sends a mail to the CIO to change his password, that conforms to the new password policy.

 

Would you say data privacy & protection was breached?

Yes

No

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who is responsible for reviewing the performance and effectiveness of Information security policies within the Bank

The Executive Management

The Chief Information Security Officer

The Head of Departments

The Chief Risk Officer

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Situation update 3: Three days later, a panicked customer called to ask why details of his loan transactions and his asset he used as collateral were posted and trending on twitter. Shortly after, another customer called to complain that the portal he frequently uses to track and view the status of his transaction is down.

 

Which team should oversee the customer’s request?

Corporate Communications Team

Customer Care Team

Operational Risk Team

Legal Division

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?