Cyber Security Assessment for Bank Officials

Cyber Security Assessment for Bank Officials

Professional Development

100 Qs

quiz-placeholder

Similar activities

CPL Nav Mega Quiz Part 1

CPL Nav Mega Quiz Part 1

Professional Development

96 Qs

ESAS PART 9 - GERALDINO REVIEWER

ESAS PART 9 - GERALDINO REVIEWER

Professional Development

100 Qs

kpop

kpop

KG - Professional Development

100 Qs

Oliver Lehmann #1 - 100

Oliver Lehmann #1 - 100

Professional Development

100 Qs

EMS103 CHAP 21-25

EMS103 CHAP 21-25

Professional Development

100 Qs

EMS103 CHAP 37-41

EMS103 CHAP 37-41

Professional Development

100 Qs

Ao Khele Quiz

Ao Khele Quiz

Professional Development

102 Qs

Accounts Payable Cloud

Accounts Payable Cloud

Professional Development

95 Qs

Cyber Security Assessment for Bank Officials

Cyber Security Assessment for Bank Officials

Assessment

Quiz

Other

Professional Development

Easy

Created by

Pradipta Roy

Used 4+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

100 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the current version of Dutch-Bangla Bank ICT Operation and Security Policy?

Seventh Revision: April 2022

Eighth Revision: June 2022

First Version: November 2021

Tenth Revision: September 2022

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks requires a carrier file to self-replicate?

Trojan

Virus

Worm

Spam

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone who is posing as an IT tech requests information about your computer configuration. What kind of attack is this?

Insider threat

Phishing

Social engineering

Whaling

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are allowed to share or print full card number, PIN, password, expiry date with everyone. True or False?

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes monitoring software installed without your consent?

Malware

Adware

Spyware

Ransomware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cyber criminals only target large companies. True or False?

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following should you do to restrict access to business application?

Update your software once a year.

Share passwords only with colleagues you trust.

Have your staff members access information via an open Wi-Fi network.

Use multi-factor authentication.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?