Fortinet | NSE 1 Network Security Associate
Lesson 01:
01. Attacking systems by exploiting otherwise unknown and
unpatched vulnerabilities is also known as:
Select one:
a. Secret sauce
b. Zero-day exploits
c. First-day exploits
d. Phishing
|
02.
What are the primary motivations of the Hacktivist?
Select
one:
a. The
cost of commercial software and support
b. Food,
wine, and gambling
c. The
appreciation of their countrys leaders
d. Political, social, or moral disagreements
|
03.
What central component is necessary to form a botnet?
Select
one:
a. DNS
server
b. Transformer
c. Command & Control (C&C) Server
d. Ethernet
switch
|
04.
What is it called when a fraudulent email masquerades as a legitimate
communication in an attempt to get a user to reveal sensitive information?
Select
one:
a. Phishing
b. Harpooning
c. Trolling
d. Baselining
|
05. What is the goal of the Cyber Terrorist?
Select one:
a. Intimidation through disruption and damage
b. Peace through understanding
c. Stable world markets
d. Adoption of Bitcoin as a primary national currency
|
06.
What is the motivation of the bad actor known as the Explorer?
Select
one:
a. Notoriety
b. Money
c. Ideology
d. Food
|
07. What is the motivation of the Cyber Terrorist?
Select one:
a. Ideology
b. Compassion
c. Fortune
e. Fame
|
08.
What is the motive of the Cyber Criminal?
Select
one:
a. Ideology
b. Intimidation
c. Money
d. Fame
|
09: What is the name of the malware that takes over a computer
system and holds hostage the disk drives or other data?
Select one:
a. Scareware
b. Phishingware
c. Kidnapware
d. Ransomware
|
10:
What is the primary motivation of the Cyber Warrior?
Select
one:
a. Money
b. The
adoption of Bitcoin as a national currency
d. Fame
e. The political interest of their countrys government
|
No comments:
Post a Comment