How attackers exploit the COVID crisis to compromise your network

How attackers exploit the COVID crisis to compromise your network

Assessment

Interactive Video

Architecture, Information Technology (IT)

University

Hard

Created by

Wayground Content

FREE Resource

The video discusses the ongoing cyber threats related to COVID-19, highlighting phishing attacks, malicious domains, and malware. Anomaly and Microsoft provide insights into the evolving nature of these threats, with specific examples of targeted attacks. Recommendations for protection include using Microsoft Defender ATP, blocking legacy authentication, and employing filtering services. The video also emphasizes the importance of community resources like the COVID-19 Cyber Threat Coalition for staying informed and protected.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the main threats related to COVID-19 discussed in the video?

Physical theft

Hardware malfunctions

Natural disasters

Phishing attacks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How did attack techniques change in February according to the video?

Focus on physical security

Shift to remote access Trojans

Increased use of social media

Reduction in cyber attacks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which countries were most targeted by COVID-19 themed attacks?

India, Brazil, and Germany

South Africa, Mexico, and Italy

China, United States, and Russia

Australia, Canada, and Japan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What service did Microsoft offer for free to healthcare providers?

Web hosting services

Account guard threat notification service

Free antivirus software

Cloud storage solutions

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is recommended to block in order to prevent easy access by attackers?

Legacy authentication

Public Wi-Fi networks

Social media accounts

Personal email accounts

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of the COVID-19 Cyber Threat Coalition?

To share information on cyber threats

To offer financial aid

To provide medical supplies

To organize community events

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key method to protect against email-based attacks?

Implementing email filtering services

Switching to paper communication

Disabling all email accounts

Using a VPN