Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
174 views6 pages

NSE1

The document discusses different types of bad actors in cybersecurity: 1. The "Explorer" is motivated by notoriety and enjoys putting systems in difficult situations through their intelligence and harmfulness. 2. The "Hacktivist" is motivated by political, social, or moral outrage and attacks systems through distributed denial of service attacks, botnets, and command and control servers. 3. The "Cyber Terrorist" seeks to intimidate through disruption and damage.

Uploaded by

Cark86
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
174 views6 pages

NSE1

The document discusses different types of bad actors in cybersecurity: 1. The "Explorer" is motivated by notoriety and enjoys putting systems in difficult situations through their intelligence and harmfulness. 2. The "Hacktivist" is motivated by political, social, or moral outrage and attacks systems through distributed denial of service attacks, botnets, and command and control servers. 3. The "Cyber Terrorist" seeks to intimidate through disruption and damage.

Uploaded by

Cark86
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

NSE1

Bad actors

1 The explorer

Motivacion – Notoriedad

Curioso
Poner en aprietos

Inteligente dañino

Phishing

2 The hacktivist

Motivado por política, social o indignidad moral (political, social or moral outrage)

-distribuited denial of service (DDos)

-Botnet

-Comand and control server (C&C server)

-malware
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also
known as:
Select one:
First-day exploits
Phishing

Zero-day exploits
Secret sauce

Question 2
Correct
1.00 points out of 1.00

Flag question

Question text

What are the primary motivations of the “Hacktivist”?

Select one:

Political, social, or moral disagreements


Food, wine, and gambling
The cost of commercial software and support
The appreciation of their country’s leaders

Question 3
Correct
1.00 points out of 1.00

Flag question

Question text

What central component is necessary to form a botnet?

Select one:
DNS server
Ethernet switch
Transformer
Command & Control (C&C) Server

Question 4
Correct
1.00 points out of 1.00

Flag question

Question text

What is it called when a fraudulent email masquerades as a legitimate communication in an


attempt to get a user to reveal sensitive information?
Select one:
Harpooning

Phishing
Baselining
Trolling

Question 5
Correct
1.00 points out of 1.00

Flag question

Question text

What is the goal of the “Cyber Terrorist”?

Select one:
Stable world markets
Adoption of Bitcoin as a primary national currency
Peace through understanding

Intimidation through disruption and damage

Question 6
Correct
1.00 points out of 1.00
Flag question

Question text

What is the motivation of the bad actor known as the “Explorer”?


Select one:

Notoriety
Ideology
Food
Money

Question 7
Correct
1.00 points out of 1.00

Flag question

Question text

What is the motivation of the “Cyber Terrorist”?

Select one:
Fame

Ideology
Fortune
Compassion

Question 8
Correct
1.00 points out of 1.00

Flag question

Question text
What is the motive of the “Cyber Criminal”?

Select one:
Fame
Ideology
Intimidation

Money

Question 9
Correct
1.00 points out of 1.00

Flag question

Question text

What is the name of the malware that takes over a computer system and holds hostage the
disk drives or other data?
Select one:

Ransomware
Phishingware
Kidnapware
Scareware

Question 10
Correct
1.00 points out of 1.00

Flag question

Question text

What is the primary motivation of the “Cyber Warrior”?

Select one:
The adoption of Bitcoin as a national currency

The political interest of their country’s government


Fame
Money

You might also like