Question 1: What is the motivation of the bad actor known as the “Explorer”?
·
Notoriety
·
Money
·
Ideology
·
Food
Question 2: What is the
motive of the “Cyber Criminal”?
·
Fame
·
Money
·
Ideology
·
Intimidation
Question 3: What are the primary motivations of
the “Hacktivist”?
·
Food,
wine, and gambling
·
The
appreciation of their country’s leaders
·
Political, social, or moral
disagreements
·
The
cost of commercial software and support
Question 4: Attacking systems by exploiting
unknown and unpatched vulnerabilities is also known as:
·
Phishing
·
Secret
Sauce
·
First
day exploits
·
Zero day exploits
Question 5: What is the goal of the “Cyber
Terrorist”?
·
Stable
world markets
·
Peace
through understanding
·
Intimidation through disruption and
damage
·
Adoption
of bitcoin as a primary national currency
Question 6: What is it called when a fraudulent
email masquerades as a legitimate communication in an attempt to get a user to
reveal sensitive information?
·
Trolling
·
Harpooning
·
Phishing
·
Baselining
Question 7: What central component is necessary
to form a botnet?
·
DNS
Server
·
Ethernet
Switch
·
Command & Control (C&C) Server
·
Transformer
Question 8: What is the motivation of the “Cyber
Terrorist”?
·
Compassion
·
Ideology
·
Fortune
·
Fame
Question 9: What is the name of the malware that
takes over a computer system and holds hostage the disk drives or other data?
·
Phishingware
·
Ransomware
·
Scareware
· Kindnapware
No comments:
Post a Comment