Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

Examine ransomware and extortion-based threats Microsoft Quiz Answers

Get Examine ransomware and extortion-based threats Microsoft Quiz Answers

Ransomware and extortion-based attacks are a high-reward, low-cost business that has escalated from extorting money from individuals to targeting businesses and organizations. The modules in this learning path will provide you with insights and information to help you better understand this threat, including a broad look at ransomware and extortion-based threats, how cybercriminals exploit security weaknesses to gain access to your computers and devices, some of the steps you can take prevent ransomware threats, and finally, how to recover from an attack.

Prerequisites:

None

Enroll on Microsoft

Module 1: Define ransomware and extortion-based security threats

Ransomware attacks are growing at an alarming rate. But what exactly is a ransomware attack? This module will define ransomware, determine the scope of the ransomware problem, describe who ransomware victims are, and will touch on a few notable ransomware “families” that everyone should know.

Learning objectives:

By the end of this module, you’ll be able to:

  • Define ransomware.
  • Identify different attack types.
  • Explain what a ransomware family is.
  • Describe a real-life ransomware attack.

Prerequisites:

  • None

This module is part of these learning paths:

Quiz 1: Knowledge check

Q1. Which is the correct definition of ransomware?

  • Malicious code that steals data and auctions it off to the highest bidder.
  • Malicious code that allows files to be accessed, but important parts are missing until a ransom is paid.
  • Malicious code that blocks access to a computer and/or its files, and demands a ransom for their release.

Q2. If a user opens an email and select a link that turns out to be malicious, what type of attack is this?

  • Phishing attack
  • Smishing attack
  • Vishing attack

Q3. Which explanation best describes a ransomware family?

  • Cybercriminals who use ransomware to disrupt and extort money.
  • Ransomware code that works in a similar way to other ransomware code.
  • Licensed ransomware that cybercriminals can purchase from each other.

Q4. If an attacker managed to gain control of a water supply company’s computer system and changed the level of additives in the drinking water, what type of attack would this be?

  • Commodity ransomware
  • Ransom distributed denial-of-service attack
  • Human-operated ransomware

Module 2: Identify vulnerabilities that ransomware can exploit

How will you know if you are a victim of ransomware? This module will cover the top ransomware families for today’s threat landscape and the vectors they use to enter and infect your organization’s files and systems.

Learning objectives:

By the end of this module, you’ll be able to:

  • Describe the nature of the threat landscape and an attack vector
  • Describe different entry points and how they are used to breach your security
  • Describe the specialization of ransomware

Prerequisites:

  • None

This module is part of these learning paths:

Quiz 1: Knowledge check

Q1. What factors would influence or change the threat landscape faced by you or an organization?

  • The release of new software, upgrades, or updates.
  • A news report of a new malware doing the rounds.
  • Someone leaving your organization.

Q2. What does the term ‘entry point’ mean in a ransomware attack?

  • The entry point is the method used by a cybercriminal to try and gain access to your network or computer.
  • The entry point for any cybercrime is when the cybercriminal decides to attack your security defenses.
  • The entry point for any cyberattack is the point at which an attack breaches your security defenses.

Q3. In what instance would a cybercriminal use an Initial Access Broker?

  • To purchase the right ransomware for the target system.
  • To purchase access credentials for the target system.
  • To facilitate joining a ransomware-as-a-service syndicate.

Module 3: Prevent ransomware and extortion-based attacks

Prevention against ransomware is essential because such an attack can lead to major disruption for you or your business. In this module, you’ll learn about best practices to protect yourself against ransomware and other extortion-based attacks.

Learning objectives:

By the end of this module, you’ll be able to:

  • Describe different defense mechanisms used to prevent ransomware.
  • List the steps to prevent ransomware.
  • Describe how antivirus/antimalware tools work.

Prerequisites:

  • None

This module is part of these learning paths:

Quiz 1: Knowledge check

Q1. How would you safeguard sensitive information that is being delivered via email?

  • Email filtering.
  • Encrypt email messages and attachments.
  • Linking the email to a device or an app.

Q2. What are the key principles of the Zero Trust security framework?

  • To verify identity, limit access, and assume breach.
  • To scan, block, and eliminate malware.
  • To flag malicious links, identify attackers, and assume breach.

Q3. How can you close security gaps within your organization?

  • With the continuous practice of sandboxing.
  • By continuously assessing vulnerabilities.
  • Ignoring security loopholes routinely.

Q4. What is a quarantine process used by malware removal tools?

  • It’s a process where anti-virus tools delete system files that are infected with virus.
  • It’s a process where anti-virus tools backup data and files.
  • It’s a process where anti-virus tools detect, relocate, and isolate files that are infected with virus.

Module 4: Recover from ransomware attacks

Any organization or individual runs the risk of a ransomware attack. As such, the ability to promptly spot and respond to an attack remains essential for successful recovery. In this module, you’ll learn how to detect, and recover from a ransomware attack.

Learning objectives:

By the end of this module, you’ll be able to:

  • Describe the different indicators of a ransomware attack.
  • Describe the different measures used to identify an attack.
  • Describe how to investigate a ransomware attack.
  • Describe how to recover from a ransomware attack.

Prerequisites:

  • None

This module is part of these learning paths:

Quiz 1: Knowledge check

Q1. What should you do to quarantine a compromised device?

  • Delete system files on the device to mitigate the damage.
  • Disconnect the device from the network.
  • Run the latest update on a device.

Q2. You find a file that you don’t recognize in one of your folders. What should you do?

  • Open it to see if you can recognize it.
  • Remove the file to ensure that you don’t accidentally run ransomware.
  • Scan the file with an antimalware program.

Q3. What should you do before you retrieve backups to use for recovery?

  • Delete local backups to prevent the attack from spreading.
  • Create a new backup when the attack happens.
  • Verify the backup files don’t contain malicious code.

Q4. Which of the following best describes an attack trajectory?

  • The path a cybercriminal could take to carry out an attack on administrator accounts.
  • The steps a cybercriminal could take to carry out an attack inside a particular server.
  • The path a cybercriminal could take to carry out an attack across different entities.

Q5. What should an organization use to effectively monitor for suspicious file activity across all its devices in the network?

  • A user monitoring and alerting tool.
  • A file integrity monitoring tool.
  • A network monitoring tool.

Q6. What are factory default settings?

  • The state your device was in when it was first bought.
  • The latest restore point to use for any device.
  • The last known good backup available for the device.
Conclusion:

I hope this Examine ransomware and extortion-based threats Microsoft Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.

This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.

Keep Learning!

More Coding Solutions >>

LeetCode Solutions

Hacker Rank Solutions

CodeChef Solutions

Leave a Reply

Your email address will not be published. Required fields are marked *