Fortinet

Fortinet | NSE 1 Network Security Associate
Lesson 01:

01. Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:

Select one:
a. Secret sauce
b. Zero-day exploits
c. First-day exploits
d. Phishing
02. What are the primary motivations of the Hacktivist?

Select one:
a. The cost of commercial software and support
b. Food, wine, and gambling
c. The appreciation of their countrys leaders
d. Political, social, or moral disagreements

03. What central component is necessary to form a botnet?

Select one:
a. DNS server
b. Transformer
c. Command & Control (C&C) Server
d. Ethernet switch

04. What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?

Select one:
a. Phishing
b. Harpooning
c. Trolling
d. Baselining

05. What is the goal of the Cyber Terrorist?

Select one:
a. Intimidation through disruption and damage
b. Peace through understanding
c. Stable world markets
d. Adoption of Bitcoin as a primary national currency

06. What is the motivation of the bad actor known as the Explorer?

Select one:
a. Notoriety
b. Money
c. Ideology
d. Food

07. What is the motivation of the Cyber Terrorist?

Select one:
a. Ideology
b. Compassion
c. Fortune
e. Fame

08. What is the motive of the Cyber Criminal?

Select one:
a. Ideology
b. Intimidation
c. Money
d. Fame

09: What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?

Select one:
a. Scareware
b. Phishingware
c. Kidnapware
d. Ransomware

10: What is the primary motivation of the Cyber Warrior?

Select one:
a. Money
b. The adoption of Bitcoin as a national currency
d. Fame
e. The political interest of their countrys government























































































No comments:

Post a Comment