Motivacion – Notoriedad Curioso Poner en aprietos Inteligente dañino Phishing 2 The hacktivist Motivado por política, social o indignidad moral (political, social or moral outrage) -distribuited denial of service (DDos) -Botnet -Comand and control server (C&C server) -malware
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as: Select one: First-day exploits Phishing Zero-day exploits Secret sauce Question 2 Correct 1.00 points out of 1.00
Flag question
Question text
What are the primary motivations of the “Hacktivist”?
Select one: Political, social, or moral disagreements Food, wine, and gambling The cost of commercial software and support The appreciation of their country’s leaders Question 3 Correct 1.00 points out of 1.00
Flag question
Question text
What central component is necessary to form a botnet? Select one: DNS server Ethernet switch Transformer
Command & Control (C&C) Server Question 4 Correct 1.00 points out of 1.00
Flag question
Question text
What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information? Select one: Harpooning Phishing Baselining Trolling Question 5 Correct 1.00 points out of 1.00
Flag question
Question text
What is the goal of the “Cyber Terrorist”?
Select one: Stable world markets Adoption of Bitcoin as a primary national currency Peace through understanding Intimidation through disruption and damage Question 6 Correct 1.00 points out of 1.00
Flag question
Question text
What is the motivation of the bad actor known as the “Explorer”?
Select one: Notoriety Ideology Food Money Question 7 Correct 1.00 points out of 1.00
Flag question
Question text
What is the motivation of the “Cyber Terrorist”?
Select one: Fame Ideology Fortune Compassion Question 8 Correct 1.00 points out of 1.00
Flag question
Question text
What is the motive of the “Cyber Criminal”?
Select one: Fame Ideology Intimidation Money Question 9 Correct 1.00 points out of 1.00
Flag question
Question text
What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data? Select one: Ransomware Phishingware Kidnapware Scareware Question 10 Correct 1.00 points out of 1.00
Flag question
Question text
What is the primary motivation of the “Cyber Warrior”?
Select one: The adoption of Bitcoin as a national currency The political interest of their country’s government Fame
Thank you for interesting in our services. We are a non-profit group that run this website to share documents. We need your help to maintenance this website.