Q1. Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Select one:
Zero-day exploits
Secret sauce
Phishing
First-day exploits
Q2. What are the primary motivations of the “Hacktivist”?
Select one:
The appreciation of their country’s leaders
Political, social, or moral disagreements
The cost of commercial software and support
Food, wine, and gambling
Q3. What central component is necessary to form a botnet?
Select one:
Command & Control (C&C) Server
DNS server
Transformer
Ethernet switch
Q4. What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?
Select one:
Phishing
Harpooning
Baselining
Trolling
Q5. What is the goal of the “Cyber Terrorist”?
Select one:
Stable world markets
Intimidation through disruption and damage
Peace through understanding
Adoption of Bitcoin as a primary national currency
Q6. What is the motivation of the bad actor known as the “Explorer”?
Select one:
Food
Notoriety
Ideology
Money
Q7. What is the motivation of the “Cyber Terrorist”?
Select one:
Fortune
Fame
Ideology
Compassion
Q8. What is the motive of the “Cyber Criminal”?
Select one:
Intimidation
Fame
Ideology
Money
Q9. What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?
Select one:
Phishingware
Kidnapware
Ransomware
Scareware
Q10. What is the primary motivation of the “Cyber Warrior”?
Select one:
The adoption of Bitcoin as a national currency
Money
The political interest of their country’s government
Fame