Вы находитесь на странице: 1из 5

The Threat Landscape

Skip <span id="mod_quiz_navblock_title">Quiz navigation</span>


Started on Monday, 11 November 2019, 3:24 AM
State Finished
Completed on Monday, 11 November 2019, 3:33 AM
Time taken 8 mins 59 secs
Marks 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you have passed.

Question 1

Correct
Mark 1.00 out of 1.00

Flag question

Question text

Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known
as:
Select one:
First-day exploits
Phishing
Secret sauce
Zero-day exploits

Question 2

Correct
Mark 1.00 out of 1.00

Flag question

Question text
What are the primary motivations of the “Hacktivist”?
Select one:
The appreciation of their country’s leaders
The cost of commercial software and support
Political, social, or moral disagreements
Food, wine, and gambling

Question 3

Correct
Mark 1.00 out of 1.00

Flag question

Question text

What central component is necessary to form a botnet?


Select one:
DNS server
Command & Control (C&C) Server
Ethernet switch
Transformer

Question 4

Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is it called when a fraudulent email masquerades as a legitimate communication in an


attempt to get a user to reveal sensitive information?
Select one:
Trolling
Baselining
Phishing
Harpooning

Question 5

Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the goal of the “Cyber Terrorist”?


Select one:
Peace through understanding
Intimidation through disruption and damage
Stable world markets
Adoption of Bitcoin as a primary national currency

Question 6

Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the motivation of the bad actor known as the “Explorer”?


Select one:
Notoriety
Food
Ideology
Money
Question 7

Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the motivation of the “Cyber Terrorist”?


Select one:
Fame
Compassion
Ideology
Fortune

Question 8

Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the motive of the “Cyber Criminal”?


Select one:
Money
Fame
Intimidation
Ideology

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the name of the malware that takes over a computer system and holds hostage the disk
drives or other data?
Select one:
Phishingware
Scareware
Ransomware
Kidnapware

Question 10

Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the primary motivation of the “Cyber Warrior”?


Select one:
The adoption of Bitcoin as a national currency
Money
Fame
The political interest of their country’s government

Вам также может понравиться