1. Which of the following best practices for reducing the likelihood of a successful ransomware attack can be accomplished without good user training and awareness?
- Don't enable macros in document attachments received via e-mail
- Patch early and often
- Don't give yourself more login power than you need.
- Be cautious of unsolicited attachments.
2. In order to get actionable threat intelligence it has to be:
- captured from a variety of sources and analyzed, classified and published close to real time.
- publicly available and verified as true.
- learned from experience (either in your organization or someone else's)
- captured from a variety of sources and historical
3.
Which of the following is among the most common weakness in companies affected by ransomware?
- Organizations quarantine all file attachments
- ransomware has nothing to do with organizational weaknesses, it is just a risk of doing business
- lack of user security training
- Updates/patches are updated too swiftly
4.
Why should we expect to see a rise in purchases of cyber-insurance?
- We should not expect to see a rise in cyber-insurance purchases
- The cost of insurance is coming down
- Organizations are just learning about it
- Rise in data breach incidents and impending legislation
5.
How might organizations use technology to respond to threat intelligence
- It can be used to deliver intelligence to users to help evolve their behavior
- It cannot be used, threats to systems have only human solutions
- It can be used to proactively block perceived threats
- it can be used to analyze user logs for unusual activity
No comments:
Post a Comment