Sie sind auf Seite 1von 2

 The Threat Landscape

Started on Tuesday, 28 January 2020, 4:07 PM


State Finished
Completed on Tuesday, 28 January 2020, 4:10 PM
Time taken 2 mins 5 secs
Marks 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you have passed.

Question 1 Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Correct

Mark 1.00 out of Select one:


1.00
Zero-day exploits 

Secret sauce

First-day exploits

Phishing

Question 2 What are the primary motivations of the “Hacktivist”?


Correct

Mark 1.00 out of Select one:


1.00
Food, wine, and gambling

Political, social, or moral disagreements 

The cost of commercial software and support

The appreciation of their country’s leaders

Question 3 What central component is necessary to form a botnet?


Correct

Mark 1.00 out of Select one:


1.00
Command & Control (C&C) Server 

Transformer

DNS server

Ethernet switch

Question 4 What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive
Correct information?
Mark 1.00 out of
1.00 Select one:
Harpooning

Phishing 

Baselining

Trolling
Question 5 What is the goal of the “Cyber Terrorist”?
Correct

Mark 1.00 out of Select one:


1.00
Peace through understanding

Intimidation through disruption and damage 

Stable world markets

Adoption of Bitcoin as a primary national currency

Question 6 What is the motivation of the bad actor known as the “Explorer”?
Correct

Mark 1.00 out of Select one:


1.00
Food

Money

Notoriety 

Ideology

Question 7 What is the motivation of the “Cyber Terrorist”?


Correct

Mark 1.00 out of Select one:


1.00
Compassion

Ideology 

Fortune

Fame

Question 8 What is the motive of the “Cyber Criminal”?


Correct

Mark 1.00 out of Select one:


1.00
Ideology

Money 

Intimidation

Fame

Question 9 What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?
Correct

Mark 1.00 out of Select one:


1.00
Phishingware

Ransomware 

Scareware

Kidnapware

Question 10 What is the primary motivation of the “Cyber Warrior”?


Correct

Mark 1.00 out of Select one:


1.00
Fame

The adoption of Bitcoin as a national currency

The political interest of their country’s government 

Money

Das könnte Ihnen auch gefallen