Test your incident-handling instincts for ransomware events, from the first alert to final reporting. You’ll work through containment choices, recovery trade-offs, and communication steps that reduce ...
Pick a difficulty and question count to begin.
Ransomware response is a sequence of high-stakes decisions, and this quiz helps you rehearse them without the pressure of a live incident. You’ll practice identifying the right next step for contain, recover, and report across mixed-difficulty scenarios.
Each question uses 4 options and there’s no timer, so you can slow down and think through evidence, dependencies, and risk.
Many responders lose time by focusing on eradication before containment, or by restoring systems before validating backups and access paths. Another frequent mistake is inconsistent communication: unclear status updates, missing legal/privacy considerations, or premature attribution.
Difficulty is balanced as “Mixed,” blending foundational concepts (like isolation and triage) with tougher judgment calls (like restore sequencing and stakeholder reporting). Choose your preferred question count and difficulty before you start to tailor the session to a quick refresher or a full drill.
What is the first step in responding to a ransomware attack?
Which of the following is a key action to take after containing a ransomware threat?
What should you do before reporting a ransomware incident to law enforcement?
This quiz has 110 questions covering containment, recovery, and reporting decisions in ransomware incidents.
No. The quiz has no timer, so you can take your time on each scenario.
Every question is multiple-choice with 4 options.
Yes. You can select your preferred question count and difficulty before starting to match your practice goals.
You’ll also face recovery planning, backup validation, restore sequencing, communications, and incident reporting basics.

Spot the red flags that separate real messages from scams across email, SMS, and phone calls. This mixed-difficulty quiz helps you practice quick, practical decisions using realistic scenarios. Build confidence in verifying senders, links, and requests before you click, reply, or share information.

Test your knowledge of vulnerability management—from CVE basics and CVSS scoring to patching workflows and risk-based prioritization. Questions mix practical scenarios with key concepts so you can spot what matters most in real environments. Choose your preferred question count and difficulty, then learn from each explanation as you go.
Identify common cyber threats and the best defensive practices used to reduce risk. Covers phishing, malware, passwords, MFA, encryption basics, and safe browsing habits.
Test your knowledge of common programming syntax across popular languages. Questions focus on variables, loops, functions, and basic data structures without requiring deep computer science theory.
Check your understanding of how cloud services are delivered and used. Covers IaaS, PaaS, SaaS, containers vs VMs, regions/availability zones, and shared responsibility basics.
Match key PC components to what they do and how they affect performance. Covers CPU, GPU, RAM, storage types, motherboards, power supplies, and ports.