Fortinet NSE 1

Lession-1 


 Q. What component is necessary to form a botnet?

A. Command & Control Server (C&C)


Q. What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?

A. Phishing


Q. What is the goal of the Cyber Terrorist?

A. Intimidation through disruption and damage


Q. What is the motivation of the bad actor known as the "Explorer"?

A Notoriety


Q. What is the motivation of the "Cyber Terrorist"?

A. Ideology


Q. What is the motive of the "Cyber Criminal"?

A Money


Q. What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?

A. Ransomware


Q. What is the primary motive of the "Cyber Warrior"?

A. The political interest of their country's government


Q. Zero-day exploits

A. Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities


Q. Primary motivations of the Hacktivist

A. Political, social, or moral disagreements

No comments:

Post a Comment