
The Year Ahead in Cybersecurity
Interactive Video
•
Business, Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What analogy does Amanda Russo use to describe traditional cybersecurity defenses?
A locked door
A castle with walls and a gate
A fortress with a moat
A shield and sword
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary motivation for criminals to use ransomware?
To earn easy money
To disrupt businesses
To test new malware
To gain notoriety
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which global ransomware attack is mentioned as having a significant impact?
WannaCry
Locky
Petya
CryptoLocker
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is EternalBlue, as discussed in the transcript?
A type of ransomware
A sophisticated code developed by the NSA
A social media hacking tool
A third-party service provider
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do attackers often gather information about their targets?
By intercepting phone calls
By probing social media profiles
By hacking into databases
Through email phishing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was the method used to compromise Target's network?
Malware in their payment systems
Compromise through a third-party HVAC company
A phishing attack on employees
Direct hacking of their servers
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a significant challenge in protecting against social media attacks?
The lack of security features on social media platforms
The complexity of social media algorithms
The high cost of social media security tools
The integration of social media into consumer culture
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?