Quiz - The Threat Landscape
Quiz - The Threat Landscape
Quiz - The Threat Landscape
Question 1 Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Correct
Secret sauce
First-day exploits
Phishing
Transformer
DNS server
Ethernet switch
Question 4 What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive
Correct information?
Mark 1.00 out of
1.00 Select one:
Harpooning
Phishing
Baselining
Trolling
Question 5 What is the goal of the “Cyber Terrorist”?
Correct
Question 6 What is the motivation of the bad actor known as the “Explorer”?
Correct
Money
Notoriety
Ideology
Ideology
Fortune
Fame
Money
Intimidation
Fame
Question 9 What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?
Correct
Ransomware
Scareware
Kidnapware
Money