Sie sind auf Seite 1von 2

13/9/2019 Quiz

 The Threat Landscape

Started on Friday, September 13, 2019, 3:06 PM


State Finished
Completed on Friday, September 13, 2019, 3:09 PM
Time taken 3 mins 45 secs
Points 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you have passed.

Question 1 Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Correct

1.00 points out Select one:


of 1.00
First-day exploits

Secret sauce

Phishing

Zero-day exploits 

Question 2 What are the primary motivations of the “Hacktivist”?


Correct

1.00 points out Select one:


of 1.00
The appreciation of their country’s leaders

The cost of commercial software and support

Political, social, or moral disagreements 

Food, wine, and gambling

Question 3 What central component is necessary to form a botnet?


Correct

1.00 points out Select one:


of 1.00
Ethernet switch

Transformer

DNS server

Command & Control (C&C) Server 

Question 4 What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive
Correct information?
1.00 points out
of 1.00 Select one:
Harpooning

Phishing 

Baselining

Trolling

Question 5 What is the goal of the “Cyber Terrorist”?


Correct

1.00 points out Select one:


of 1.00
Stable world markets

Intimidation through disruption and damage 

Peace through understanding


https://training.fortinet.com/mod/quiz/review.php?attempt=1650895&cmid=3848 1/2
13/9/2019 Quiz

Adoption of Bitcoin as a primary national currency

Question 6 What is the motivation of the bad actor known as the “Explorer”?
Correct

1.00 points out Select one:


of 1.00
Notoriety 

Food

Ideology

Money

Question 7 What is the motivation of the “Cyber Terrorist”?


Correct

1.00 points out Select one:


of 1.00
Ideology 

Fortune

Compassion

Fame

Question 8 What is the motive of the “Cyber Criminal”?


Correct

1.00 points out Select one:


of 1.00
Intimidation

Money 

Ideology

Fame

Question 9 What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?
Correct

1.00 points out Select one:


of 1.00
Kidnapware

Ransomware 

Phishingware

Scareware

Question 10 What is the primary motivation of the “Cyber Warrior”?


Correct

1.00 points out Select one:


of 1.00
The political interest of their country’s government 

The adoption of Bitcoin as a national currency

Money

Fame

https://training.fortinet.com/mod/quiz/review.php?attempt=1650895&cmid=3848 2/2

Das könnte Ihnen auch gefallen