Wednesday, October 19, 2016

CyberSecurity and X-Factor - Threats - Quiz

Default Creative-30percent April2516-25off-sitewide300X250 April1816-30off-programwide300X250

1. Which of the following best practices for reducing the likelihood of a successful ransomware attack can be accomplished without good user training and awareness?

  • Don't enable macros in document attachments received via e-mail
  • Patch early and often
  • Don't give yourself more login power than you need.
  • Be cautious of unsolicited attachments.

April0416-20off-sitewide300X250 Course-specific creative-Building a Personal Brand by Gary Vaynerchuk Course-specific creative-JavaScript: Understanding the Weird Parts


 2. In order to get actionable threat intelligence it has to be:

  • captured from a variety of sources and analyzed, classified and published close to real time.
  • publicly available and verified as true.
  • learned from experience (either in your organization or someone else's)
  • captured from a variety of sources and historical

Course-specific creative-The Complete iOS 9 Developer Course - Build 18 Apps Course-specific creative-iOS 9 and Swift 2: From Beginner to Paid Professional Course-specific creative-The Complete Ethical Hacking Course: Beginner to Advanced! 

 3.
Which of the following is among the most common weakness in companies affected by ransomware?

  • Organizations quarantine all file attachments
  • ransomware has nothing to do with organizational weaknesses, it is just a risk of doing business
  • lack of user security training
  • Updates/patches are updated too swiftly

Course-specific creative-Data Science A-Z: Real-Life Data Science Exercises Included Course-specific creative-Learn To Code by Making Games - The Complete Unity Developer Course-specific creative-Learn and Understand AngularJS 

 4.
Why should we expect to see a rise in purchases of cyber-insurance?

  • We should not expect to see a rise in cyber-insurance purchases
  • The cost of insurance is coming down
  • Organizations are just learning about it
  • Rise in data breach incidents and impending legislation

Course-specific creative-The Complete Android Developer Course - Build 14 Apps Course-specific creative-Pianoforall - Incredible New Way To Learn Piano & Keyboard

5.
How might organizations use technology to respond to threat intelligence

  • It can be used to deliver intelligence to users to help evolve their behavior
  • It cannot be used, threats to systems have only human solutions
  • It can be used to proactively block perceived threats
  • it can be used to analyze user logs for unusual activity
Course-specific creative-Reiki Level I, II and Master Certification Course-specific creative-The Complete Web Developer Course - Build 14 Websites Course-specific creative- The Complete Java Developer Course

No comments:

Post a Comment