You are on page 1of 4

What name is given to hackers who hack for a political or social cause?

 White hat
 Hacker
 Hacktivist
 Blue hat

Which statement best describes a motivation of hacktivists?


 They are part of a protest group behind a political cause.
 They are curious and learning hacking skills.
 They are trying to show off their hacking skills.
 They are interested in discovering new exploits.

Users report that a database file on the main server cannot be accessed. A
database administrator verifies the issue and notices that the database file is now
encrypted. The organization receives a threatening email demanding payment for
the decryption of the database file. What type of attack has the organization
experienced?
 man-in-the-middle attack
 DoS attack
 ransomware
 Trojan horse

What name is given to an amateur hacker?


 red hat
 script kiddie
 black hat
 blue team

A computer is presenting a user with a screen requesting payment before the user
data is allowed to be accessed by the same user. What type of malware is this?
 A type of virus
 A type of logic bomb
 A type of ransomware
 A type of worm

Which type of person poses the most threat to an organization’s security?


 A. Black-hat hacker
 B. Disgruntled employee
 C. Script kiddie
 D. Gray-hat hacker

Hacking for a cause is called .


 A. Active hacking
 B. Hacktivism
 C. Activism
 D. Black-hat hacking

 Noteriety
 Money
 Political, social or moral
 explorer
disagreement
 Cyber criminal
 Ideology
 Hacktivist
 The political interest of their
 Cyber terrorist
country’s government
 Cyber warrior
 wine and gambling
 Fame
 Intimidation through
disruption and damage
 Peace through
understanding

Which best describe a type of attack that targets specific individuals or


organizations typically through malicious emails
 Phisphing
 Harpooning
 Social engineering
 Spear phisphing

Which describes a software vulnerability that exploits a security hole before a


protective patch is available
 Zero day attack

 Buffer overflow

 Mystification d'adresse MAC


 Bluesnarfing

Which type of cyber attack targeting a smartphone, tablet or other computing


device using a charging port
Vishing

Juice hacking

Juice jacking

Whaling

phisphing

What is a malicious code


A program that flaws in it

Untested code that a vendor releases to public

Code that does not behave in the manner intended by its author

An unwanted file or program that can cause harm to, or compromise data on a computer

Which practice strengthens the physical security of your work environment?


 Ensure that your software is up-to-date and that the latest patches are applied.
 Recycle all paper, CDs, DVDs, hard drives etc. into their appropriate bins.
 Pile all confidential documents neatly to one corner of your desk.
 Shred and destroy all documents that contain sensitive personal or organizational information
rather than tossing them into the waste bin.

Identify two best practices for physical security awareness. (Choose two.)
 Always be considerate, such as holding the door open for people, even if you don’t know them.
 Keep your desk free of any proprietary or confidential information.
 Lock your computer screen and mobile devices every time you step away.
 Follow your organization’s security policies unless they hinder efficiency.

What is the root cause of almost every data breach?


 Zero-day attack
 Human error
 no security policy
 poor physical security

Which precaution should you take if you receive an email that involves the movement of money, such as
the payment of an invoice, even if it is from someone you know?
 Pay it immediately to avoid late fees.
 Look for spelling mistakes in the email. If you find any, delete the email. It’s obviously a scam.
 Reply to the email and ask them to provide proof of their identity.
 Use another form of trusted communication to verify that the message is legitimate.

Which statement describes the difference between spearphishing, whaling, and vishing
 involve hackers hanging out at internet forums who then collect information about individuals to target,
while the others are aimed at a wide audience.
 are directed against smaller players—small fish you might say, while the others use social media sites.
 are aimed at a wide audience, while the others are directed toward individuals or specific
organizations.
 use social media and social engineering techniques to lure their victims, while the others primary use
email.

You might also like