Академический Документы
Профессиональный Документы
Культура Документы
Question 1
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known
as:
Select one:
First-day exploits
Phishing
Secret sauce
Zero-day exploits
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What are the primary motivations of the “Hacktivist”?
Select one:
The appreciation of their country’s leaders
The cost of commercial software and support
Political, social, or moral disagreements
Food, wine, and gambling
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Question 8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
What is the name of the malware that takes over a computer system and holds hostage the disk
drives or other data?
Select one:
Phishingware
Scareware
Ransomware
Kidnapware
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text