Soru 1: Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Secret sauce
Zero-day exploits
Phishing
First-day exploits
Soru 2: What are the primary motivations of the “Hacktivist”?
Political, social, or moral disagreements
The cost of commercial software and support
The appreciation of their country’s leaders
Food, wine, and gambling
Soru 3: What central component is necessary to form a botnet?
Transformer
DNS server
Command & Control (C&C) Server
Ethernet switch
Soru 4: What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?
Trolling
Harpooning
Baselining
Phishing
Soru 5: What is the goal of the “Cyber Terrorist”?
Stable world markets
Intimidation through disruption and damage
Peace through understanding
Adoption of Bitcoin as a primary national currency
Soru 6: What is the motivation of the bad actor known as the “Explorer”?
Money
Ideology
Notoriety
Food
Soru 7: What is the motivation of the “Cyber Terrorist”?
Fame
Compassion
Fortune
Ideology
Soru 8: What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?
Scareware
Ransomware
Phishingware
Kidnapware
Soru 9: What is the primary motivation of the “Cyber Warrior”?
Money
Fame
The political interest of their country’s government
The adoption of Bitcoin as a national currency
Soru 10: What is the motive of the “Cyber Criminal”?
Ideology
Intimidation
Fame
Money