Está en la página 1de 6

NSE1

Bad actors

1 The explorer

Motivacion – Notoriedad

Curioso

Poner en aprietos

Inteligente dañino

Phishing

2 The hacktivist

Motivado por política, social o indignidad moral (political, social or moral outrage)

-distribuited denial of service (DDos)

-Botnet

-Comand and control server (C&C server)

-malware
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also
known as:
Select one:
First-day exploits
Phishing

Zero-day exploits
Secret sauce

Question 2
Correct
1.00 points out of 1.00

Flag question

Question text

What are the primary motivations of the “Hacktivist”?


Select one:

Political, social, or moral disagreements


Food, wine, and gambling
The cost of commercial software and support
The appreciation of their country’s leaders

Question 3
Correct
1.00 points out of 1.00

Flag question

Question text

What central component is necessary to form a botnet?


Select one:
DNS server
Ethernet switch
Transformer
Command & Control (C&C) Server

Question 4
Correct
1.00 points out of 1.00

Flag question

Question text

What is it called when a fraudulent email masquerades as a legitimate communication in an


attempt to get a user to reveal sensitive information?
Select one:
Harpooning

Phishing
Baselining
Trolling

Question 5
Correct
1.00 points out of 1.00

Flag question

Question text

What is the goal of the “Cyber Terrorist”?


Select one:
Stable world markets
Adoption of Bitcoin as a primary national currency
Peace through understanding

Intimidation through disruption and damage

Question 6
Correct
1.00 points out of 1.00
Flag question

Question text

What is the motivation of the bad actor known as the “Explorer”?


Select one:

Notoriety
Ideology
Food
Money

Question 7
Correct
1.00 points out of 1.00

Flag question

Question text

What is the motivation of the “Cyber Terrorist”?


Select one:
Fame

Ideology
Fortune
Compassion

Question 8
Correct
1.00 points out of 1.00

Flag question

Question text
What is the motive of the “Cyber Criminal”?
Select one:
Fame
Ideology
Intimidation

Money

Question 9
Correct
1.00 points out of 1.00

Flag question

Question text

What is the name of the malware that takes over a computer system and holds hostage the
disk drives or other data?
Select one:

Ransomware
Phishingware
Kidnapware
Scareware

Question 10
Correct
1.00 points out of 1.00

Flag question

Question text

What is the primary motivation of the “Cyber Warrior”?


Select one:
The adoption of Bitcoin as a national currency

The political interest of their country’s government


Fame
Money