Fortinet NSE 1 Lesson1-Bad Actors Quiz

Q1. Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:

Select one:
Zero-day exploits
Secret sauce
Phishing
First-day exploits

Q2. What are the primary motivations of the “Hacktivist”?

Select one:
The appreciation of their country’s leaders
Political, social, or moral disagreements
The cost of commercial software and support
Food, wine, and gambling

Q3. What central component is necessary to form a botnet?

Select one:
Command & Control (C&C) Server
DNS server
Transformer
Ethernet switch

Q4. What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?

Select one:
Phishing
Harpooning
Baselining
Trolling

Q5. What is the goal of the “Cyber Terrorist”?

Select one:
Stable world markets
Intimidation through disruption and damage
Peace through understanding
Adoption of Bitcoin as a primary national currency

Q6. What is the motivation of the bad actor known as the “Explorer”?

Select one:
Food
Notoriety
Ideology
Money

Q7. What is the motivation of the “Cyber Terrorist”?

Select one:
Fortune
Fame
Ideology
Compassion

Q8. What is the motive of the “Cyber Criminal”?

Select one:
Intimidation
Fame
Ideology
Money

Q9. What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?

Select one:
Phishingware
Kidnapware
Ransomware
Scareware

Q10. What is the primary motivation of the “Cyber Warrior”?

Select one:
The adoption of Bitcoin as a national currency
Money
The political interest of their country’s government
Fame