Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Bad actors
1 The explorer
Motivacion – Notoriedad
Curioso
Poner en aprietos
Inteligente dañino
Phishing
2 The hacktivist
Motivado por política, social o indignidad moral (political, social or moral outrage)
-Botnet
-malware
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also
known as:
Select one:
First-day exploits
Phishing
Zero-day exploits
Secret sauce
Question 2
Correct
1.00 points out of 1.00
Flag question
Question text
Question 3
Correct
1.00 points out of 1.00
Flag question
Question text
Question 4
Correct
1.00 points out of 1.00
Flag question
Question text
Phishing
Baselining
Trolling
Question 5
Correct
1.00 points out of 1.00
Flag question
Question text
Question 6
Correct
1.00 points out of 1.00
Flag question
Question text
Notoriety
Ideology
Food
Money
Question 7
Correct
1.00 points out of 1.00
Flag question
Question text
Ideology
Fortune
Compassion
Question 8
Correct
1.00 points out of 1.00
Flag question
Question text
What is the motive of the “Cyber Criminal”?
Select one:
Fame
Ideology
Intimidation
Money
Question 9
Correct
1.00 points out of 1.00
Flag question
Question text
What is the name of the malware that takes over a computer system and holds hostage the
disk drives or other data?
Select one:
Ransomware
Phishingware
Kidnapware
Scareware
Question 10
Correct
1.00 points out of 1.00
Flag question
Question text