0% found this document useful (0 votes)
5K views6 pages

NSE1

1. The document discusses different types of bad actors in cybersecurity: the Explorer, motivated by notoriety; the Hacktivist, motivated by political, social or moral outrage; and the Cyber Terrorist, motivated by ideology and seeking to cause intimidation through disruption and damage. 2. It also mentions tools and techniques used by bad actors, such as distributed denial of service (DDoS) attacks, botnets using command and control (C&C) servers, and exploiting unknown vulnerabilities (zero-day exploits). 3. Phishing and ransomware (malware that encrypts systems and demands ransom) are called out as methods used for negative purposes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5K views6 pages

NSE1

1. The document discusses different types of bad actors in cybersecurity: the Explorer, motivated by notoriety; the Hacktivist, motivated by political, social or moral outrage; and the Cyber Terrorist, motivated by ideology and seeking to cause intimidation through disruption and damage. 2. It also mentions tools and techniques used by bad actors, such as distributed denial of service (DDoS) attacks, botnets using command and control (C&C) servers, and exploiting unknown vulnerabilities (zero-day exploits). 3. Phishing and ransomware (malware that encrypts systems and demands ransom) are called out as methods used for negative purposes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

NSE1

Bad actors

1 The explorer

Motivacion – Notoriedad

Curioso

Poner en aprietos

Inteligente dañino

Phishing

2 The hacktivist

Motivado por política, social o indignidad moral (political, social or moral outrage)

-distribuited denial of service (DDos)

-Botnet

-Comand and control server (C&C server)

-malware
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also
known as:
Select one:
First-day exploits
Phishing

Zero-day exploits
Secret sauce

Question 2
Correct
1.00 points out of 1.00

Flag question

Question text

What are the primary motivations of the “Hacktivist”?


Select one:

Political, social, or moral disagreements


Food, wine, and gambling
The cost of commercial software and support
The appreciation of their country’s leaders

Question 3
Correct
1.00 points out of 1.00

Flag question

Question text

What central component is necessary to form a botnet?


Select one:
DNS server
Ethernet switch
Transformer
Command & Control (C&C) Server

Question 4
Correct
1.00 points out of 1.00

Flag question

Question text

What is it called when a fraudulent email masquerades as a legitimate communication in an


attempt to get a user to reveal sensitive information?
Select one:
Harpooning

Phishing
Baselining
Trolling

Question 5
Correct
1.00 points out of 1.00

Flag question

Question text

What is the goal of the “Cyber Terrorist”?


Select one:
Stable world markets
Adoption of Bitcoin as a primary national currency
Peace through understanding

Intimidation through disruption and damage

Question 6
Correct
1.00 points out of 1.00
Flag question

Question text

What is the motivation of the bad actor known as the “Explorer”?


Select one:

Notoriety
Ideology
Food
Money

Question 7
Correct
1.00 points out of 1.00

Flag question

Question text

What is the motivation of the “Cyber Terrorist”?


Select one:
Fame

Ideology
Fortune
Compassion

Question 8
Correct
1.00 points out of 1.00

Flag question

Question text
What is the motive of the “Cyber Criminal”?
Select one:
Fame
Ideology
Intimidation

Money

Question 9
Correct
1.00 points out of 1.00

Flag question

Question text

What is the name of the malware that takes over a computer system and holds hostage the
disk drives or other data?
Select one:

Ransomware
Phishingware
Kidnapware
Scareware

Question 10
Correct
1.00 points out of 1.00

Flag question

Question text

What is the primary motivation of the “Cyber Warrior”?


Select one:
The adoption of Bitcoin as a national currency

The political interest of their country’s government


Fame
Money

You might also like