You are on page 1of 5

Started on Saturday, 26 October 2019, 12:44 PM

State Finished
Completed on Saturday, 26 October 2019, 12:52 PM
Time taken 8 mins 16 secs
Marks 8.00/10.00
Grade 80.00 out of 100.00
Feedback Congratulations, you have passed.
Question 1
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also


known as:

Select one:
Secret sauce
First-day exploits
Zero-day exploits
Phishing

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What are the primary motivations of the “Hacktivist”?

Select one:
The appreciation of their country’s leaders
Food, wine, and gambling
The cost of commercial software and support
Political, social, or moral disagreements

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What central component is necessary to form a botnet?

Select one:
Transformer
Ethernet switch
Command & Control (C&C) Server
DNS server

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is it called when a fraudulent email masquerades as a legitimate communication in an


attempt to get a user to reveal sensitive information?

Select one:
Harpooning
Baselining
Trolling
Phishing
Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the goal of the “Cyber Terrorist”?

Select one:
Intimidation through disruption and damage
Stable world markets
Peace through understanding
Adoption of Bitcoin as a primary national currency

Question 6
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

What is the motivation of the bad actor known as the “Explorer”?

Select one:
Food
Money
Notoriety
Ideology

Question 7
Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the motivation of the “Cyber Terrorist”?

Select one:
Fame
Fortune
Compassion
Ideology

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text

What is the motive of the “Cyber Criminal”?

Select one:
Ideology
Fame
Money
Intimidation

Question 9
Correct
Mark 1.00 out of 1.00

Flag question
Question text

What is the name of the malware that takes over a computer system and holds hostage the
disk drives or other data?

Select one:
Ransomware
Scareware
Kidnapware
Phishingware

Question 10
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

What is the primary motivation of the “Cyber Warrior”?

Select one:
The political interest of their country’s government
Fame
Money
The adoption of Bitcoin as a national currency

You might also like