2/16/2020 Quiz
The Threat Landscape
Started on Sunday, 16 February 2020, 4:46 AM
State Finished
Completed on Sunday, 16 February 2020, 4:51 AM
Time taken 4 mins 33 secs
Marks 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you have passed.
Question 1 Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Correct
Mark 1.00 out of Select one:
1.00
Zero-day exploits
Secret sauce
First-day exploits
Phishing
Question 2 What are the primary motivations of the “Hacktivist”?
Correct
Mark 1.00 out of Select one:
1.00
The appreciation of their country’s leaders
Food, wine, and gambling
The cost of commercial software and support
Political, social, or moral disagreements
Question 3 What central component is necessary to form a botnet?
Correct
Mark 1.00 out of Select one:
1.00
Ethernet switch
DNS server
Transformer
Command & Control (C&C) Server
Question 4 What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive
Correct information?
Mark 1.00 out of
1.00 Select one:
Trolling
Phishing
Harpooning
Baselining
https://training.fortinet.com/mod/quiz/review.php?attempt=2369254&cmid=3848 1/2
2/16/2020 Quiz
Question 5 What is the goal of the “Cyber Terrorist”?
Correct
Mark 1.00 out of Select one:
1.00
Intimidation through disruption and damage
Adoption of Bitcoin as a primary national currency
Peace through understanding
Stable world markets
Question 6 What is the motivation of the bad actor known as the “Explorer”?
Correct
Mark 1.00 out of Select one:
1.00
Food
Money
Notoriety
Ideology
Question 7 What is the motivation of the “Cyber Terrorist”?
Correct
Mark 1.00 out of Select one:
1.00
Compassion
Fortune
Fame
Ideology
Question 8 What is the motive of the “Cyber Criminal”?
Correct
Mark 1.00 out of Select one:
1.00
Money
Fame
Ideology
Intimidation
Question 9 What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?
Correct
Mark 1.00 out of Select one:
1.00
Kidnapware
Scareware
Phishingware
Ransomware
Question 10 What is the primary motivation of the “Cyber Warrior”?
Correct
Mark 1.00 out of Select one:
1.00
Fame
The political interest of their country’s government
The adoption of Bitcoin as a national currency
Money
https://training.fortinet.com/mod/quiz/review.php?attempt=2369254&cmid=3848 2/2