NSE1
Bad actors
1 The explorer
Motivacion – Notoriedad
Curioso
Poner en aprietos
Inteligente dañino
Phishing
2 The hacktivist
Motivado por política, social o indignidad moral (political, social or moral outrage)
-distribuited denial of service (DDos)
-Botnet
-Comand and control server (C&C server)
-malware
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also
known as:
Select one:
First-day exploits
Phishing
Zero-day exploits
Secret sauce
Question 2
Correct
1.00 points out of 1.00
Flag question
Question text
What are the primary motivations of the “Hacktivist”?
Select one:
Political, social, or moral disagreements
Food, wine, and gambling
The cost of commercial software and support
The appreciation of their country’s leaders
Question 3
Correct
1.00 points out of 1.00
Flag question
Question text
What central component is necessary to form a botnet?
Select one:
DNS server
Ethernet switch
Transformer
Command & Control (C&C) Server
Question 4
Correct
1.00 points out of 1.00
Flag question
Question text
What is it called when a fraudulent email masquerades as a legitimate communication in an
attempt to get a user to reveal sensitive information?
Select one:
Harpooning
Phishing
Baselining
Trolling
Question 5
Correct
1.00 points out of 1.00
Flag question
Question text
What is the goal of the “Cyber Terrorist”?
Select one:
Stable world markets
Adoption of Bitcoin as a primary national currency
Peace through understanding
Intimidation through disruption and damage
Question 6
Correct
1.00 points out of 1.00
Flag question
Question text
What is the motivation of the bad actor known as the “Explorer”?
Select one:
Notoriety
Ideology
Food
Money
Question 7
Correct
1.00 points out of 1.00
Flag question
Question text
What is the motivation of the “Cyber Terrorist”?
Select one:
Fame
Ideology
Fortune
Compassion
Question 8
Correct
1.00 points out of 1.00
Flag question
Question text
What is the motive of the “Cyber Criminal”?
Select one:
Fame
Ideology
Intimidation
Money
Question 9
Correct
1.00 points out of 1.00
Flag question
Question text
What is the name of the malware that takes over a computer system and holds hostage the
disk drives or other data?
Select one:
Ransomware
Phishingware
Kidnapware
Scareware
Question 10
Correct
1.00 points out of 1.00
Flag question
Question text
What is the primary motivation of the “Cyber Warrior”?
Select one:
The adoption of Bitcoin as a national currency
The political interest of their country’s government
Fame
Money