gani
Administrator
Q1. What is the primary motivation of the “Cyber Warrior”?
Select one:
Money
Fame
The adoption of Bitcoin as a national currency
The political interest of their country’s government *
Q2. What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?
Select one:
Baselining
Harpooning
Phishing *
Trolling
Q3. What is the motivation of the “Cyber Terrorist”?
Select one:
Fortune
Fame
Compassion
Ideology*
Q4. What is a common technique used by bad actors to steal credentials or to compromise computers?
Select one:
Phishing *
Goading
Bypassing firewalls that have been misconfigured or poorly implemented
Telephone scams
Q5. Attacking systems by exploiting unknown and unpatched vulnerabilities is also known as:
Select one:
Zero-day exploits *
Secret sauce
First-day exploits
Phishing
Select one:
Money
Fame
The adoption of Bitcoin as a national currency
The political interest of their country’s government *
Q2. What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?
Select one:
Baselining
Harpooning
Phishing *
Trolling
Q3. What is the motivation of the “Cyber Terrorist”?
Select one:
Fortune
Fame
Compassion
Ideology*
Q4. What is a common technique used by bad actors to steal credentials or to compromise computers?
Select one:
Phishing *
Goading
Bypassing firewalls that have been misconfigured or poorly implemented
Telephone scams
Q5. Attacking systems by exploiting unknown and unpatched vulnerabilities is also known as:
Select one:
Zero-day exploits *
Secret sauce
First-day exploits
Phishing
Bài viết liên quan
Bài viết mới