Quiz Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
What is a common technique used by bad actors to steal credentials or to compromise computers?
CorrectIncorrect -
Question 2 of 10
2. Question
What is the motivation of the “Cyber Terrorist”?
CorrectIncorrect -
Question 3 of 10
3. Question
What is the goal of the “Cyber Terrorist”?
CorrectIncorrect -
Question 4 of 10
4. Question
What is the primary motivation of the “Cyber Warrior”?
CorrectIncorrect -
Question 5 of 10
5. Question
What is the motive of the “Cyber Criminal”?
CorrectIncorrect -
Question 6 of 10
6. Question
What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?
CorrectIncorrect -
Question 7 of 10
7. Question
What are the primary motivations of the “Hacktivist”?
CorrectIncorrect -
Question 8 of 10
8. Question
Attacking systems by exploiting unknown and unpatched vulnerabilities is also known as:
CorrectIncorrect -
Question 9 of 10
9. Question
What central component is necessary to form a botnet?
CorrectIncorrect -
Question 10 of 10
10. Question
What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?
CorrectIncorrect