BE-a-CyberSecurity-Hero-Red
BE-a-CyberSecurity-Hero-Red
BE a Cyber Security Hero!

Enter your Name (As you want the name to appear on the Cyber Security certificate).
Which of these is known as the first Ransomware?
AIDS Trojan
Petya
CryptoLocker
What does Ransomware do?
Locks a computer or encrypts its files (converts the files into an unreadable form) and demands money in exchange
Steals banking information
Silently records what you type on your computer keyboard
Which of these is the biggest Ransomware attack in history
WannaCry ransomware
Petya (NotPetya) ransomware
Locky ransomware
Maze ransomware
What are the most common ways used by attackers to spread ransomware
Phishing emails
Malvertisment (malicious advertisements)
RaaS (Ransomware-as-a-Service)
All of the above
Who does ransomware target?
SMBs
Enterprises
Large enterprises
All of the above
Why is ransomware such a deadly threat to your computer?
Files encrypted by a ransomware cannot be decrypted without the private key that the attacker sells for a ransom
Its infection cannot be traced
When you pay the creator of the ransomware that currently infects your computer you are guaranteed to get your data back.
Yes
No
Which of the following should be considered for optimizing the backup strategy against ransomware?
Air gap backups
Multiple copies of backup images distributed to different locations
Restrict use of backup credentials
Evaluate your RPO
Ransomware is a threat to the following operating platforms:
Apple iOS
Microsoft Windows
Android
Linux
How can a customer recover from a Ransomware attack without paying the ransom?
Restoring data from clean backups.
Ask the local law enforcement agency
Unplug Ethernet cables and disable wifi or any other network adapters.
Use Ransomware Decryption Tools.
Which options below are available with Backup Exec for Ransomware Protection?
Ransomware Resilience
Two-factor authentication (2FA)
WORM Support
Support for cloud storage
What does Backup Exec's Ransomware Resiliency do?
Block ransomware threats from entering the firewall
Blocks any non-Veritas process from writing to a backup disk or deduplication storage location.
Notifies administrator of any non-Veritas process trying to write to a backup disk or deduplication storage location.
Blocks 100% of ransomware threats as well as offering 100% effective protection against web threats.
Identified phishing email
Ransomware Resiliency is included in the Backup Exec licence.
Yes
No
{"name":"BE-a-CyberSecurity-Hero-Red BE a Cyber Security Hero!", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What does a Ransomware do?, Which of these is known as the first Ransomware?, Which of these is the biggest Ransomware attack in history","img":"https://cdn.poll-maker.com/58-2370936/screenshot-2020-10-28-at-2-36-16-pm.png?sz=1200-00000002761000005300"}
Powered by: Quiz Maker