0% found this document useful (0 votes)
152 views2 pages

NS1 Module 1

The document details a quiz taken on February 16, 2020, covering various aspects of cybersecurity, including motivations of hackers and types of malware. The participant scored 100% and received feedback for passing. Key topics include zero-day exploits, hacktivism, botnets, phishing, and motivations behind cyber terrorism and crime.

Uploaded by

oviuap
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
152 views2 pages

NS1 Module 1

The document details a quiz taken on February 16, 2020, covering various aspects of cybersecurity, including motivations of hackers and types of malware. The participant scored 100% and received feedback for passing. Key topics include zero-day exploits, hacktivism, botnets, phishing, and motivations behind cyber terrorism and crime.

Uploaded by

oviuap
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

2/16/2020 Quiz

 The Threat Landscape

Started on Sunday, 16 February 2020, 4:46 AM


State Finished
Completed on Sunday, 16 February 2020, 4:51 AM
Time taken 4 mins 33 secs
Marks 10.00/10.00
Grade 100.00 out of 100.00
Feedback Congratulations, you have passed.

Question 1 Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Correct

Mark 1.00 out of Select one:


1.00
Zero-day exploits 

Secret sauce

First-day exploits

Phishing

Question 2 What are the primary motivations of the “Hacktivist”?


Correct

Mark 1.00 out of Select one:


1.00
The appreciation of their country’s leaders

Food, wine, and gambling

The cost of commercial software and support

Political, social, or moral disagreements 

Question 3 What central component is necessary to form a botnet?


Correct

Mark 1.00 out of Select one:


1.00
Ethernet switch

DNS server

Transformer

Command & Control (C&C) Server 

Question 4 What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive
Correct information?
Mark 1.00 out of
1.00 Select one:
Trolling

Phishing 

Harpooning

Baselining

https://training.fortinet.com/mod/quiz/review.php?attempt=2369254&cmid=3848 1/2
2/16/2020 Quiz

Question 5 What is the goal of the “Cyber Terrorist”?


Correct

Mark 1.00 out of Select one:


1.00
Intimidation through disruption and damage 

Adoption of Bitcoin as a primary national currency

Peace through understanding

Stable world markets

Question 6 What is the motivation of the bad actor known as the “Explorer”?
Correct

Mark 1.00 out of Select one:


1.00
Food

Money

Notoriety 

Ideology

Question 7 What is the motivation of the “Cyber Terrorist”?


Correct

Mark 1.00 out of Select one:


1.00
Compassion

Fortune

Fame

Ideology 

Question 8 What is the motive of the “Cyber Criminal”?


Correct

Mark 1.00 out of Select one:


1.00
Money 

Fame

Ideology

Intimidation

Question 9 What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?
Correct

Mark 1.00 out of Select one:


1.00
Kidnapware

Scareware

Phishingware

Ransomware 

Question 10 What is the primary motivation of the “Cyber Warrior”?


Correct

Mark 1.00 out of Select one:


1.00
Fame

The political interest of their country’s government 

The adoption of Bitcoin as a national currency

Money

https://training.fortinet.com/mod/quiz/review.php?attempt=2369254&cmid=3848 2/2

You might also like