NSE1

April 5, 2019 | Author: JonathanAlvarezColoma | Category: Seguridad y privacidad en línea, Cyberwarfare, Denial Of Service Attack, Phishing, Computer Security
Share Embed Donate


Short Description

NSE1 Fort...

Description

NSE1 Bad actors 1 The explorer

Motivacion – Notoriedad Curioso Poner en aprietos Inteligente dañino Phishing 2 The hacktivist Motivado por política, social o indignidad moral (political, social or moral outrage) -distribuited denial of service (DDos) -Botnet -Comand and control server (C&C server) -malware

Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as: Select one: First-day exploits Phishing Zero-day exploits Secret sauce Question 2 Correct 1.00 points out of 1.00

Flag question

Question text

What are the primary motivations of the “Hacktivist”?

Select one: Political, social, or moral disagreements Food, wine, and gambling The cost of commercial software and support The appreciation of their country’s leaders Question 3 Correct 1.00 points out of 1.00

Flag question

Question text

What central component is necessary to form a botnet? Select one: DNS server Ethernet switch Transformer

Command & Control (C&C) Server Question 4 Correct 1.00 points out of 1.00

Flag question

Question text

What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information? Select one: Harpooning Phishing Baselining Trolling Question 5 Correct 1.00 points out of 1.00

Flag question

Question text

What is the goal of the “Cyber Terrorist”?

Select one: Stable world markets Adoption of Bitcoin as a primary national currency Peace through understanding Intimidation through disruption and damage Question 6 Correct 1.00 points out of 1.00

Flag question

Question text

What is the motivation of the bad actor known as the “Explorer”?

Select one: Notoriety Ideology Food Money Question 7 Correct 1.00 points out of 1.00

Flag question

Question text

What is the motivation of the “Cyber Terrorist”?

Select one: Fame Ideology Fortune Compassion Question 8 Correct 1.00 points out of 1.00

Flag question

Question text

What is the motive of the “Cyber Criminal”?

Select one: Fame Ideology Intimidation Money Question 9 Correct 1.00 points out of 1.00

Flag question

Question text

What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data? Select one: Ransomware Phishingware Kidnapware Scareware Question 10 Correct 1.00 points out of 1.00

Flag question

Question text

What is the primary motivation of the “Cyber Warrior”?

Select one: The adoption of Bitcoin as a national currency The political interest of their country’s government Fame

Money

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF