Q1. Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Q2. What are the primary motivations of the “Hacktivist”?
The appreciation of their country’s leaders
Political, social, or moral disagreements
The cost of commercial software and support
Food, wine, and gambling
Q3. What central component is necessary to form a botnet?
Command & Control (C&C) Server
Q4. What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?
Q5. What is the goal of the “Cyber Terrorist”?
Stable world markets
Intimidation through disruption and damage
Peace through understanding
Adoption of Bitcoin as a primary national currency
Q6. What is the motivation of the bad actor known as the “Explorer”?
Q7. What is the motivation of the “Cyber Terrorist”?
Q8. What is the motive of the “Cyber Criminal”?
Q9. What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?
Q10. What is the primary motivation of the “Cyber Warrior”?
The adoption of Bitcoin as a national currency
The political interest of their country’s government