Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Question 1 Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Correct
First-day exploits
Phishing
Zero-day exploits
DNS server
Transformer
Question 4 What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive
Correct information?
1.00 points out
of 1.00 Select one:
Harpooning
Baselining
Trolling
Phishing
https://training.fortinet.com/mod/quiz/review.php?attempt=2807767&cmid=3848 1/2
4/9/2020 Quiz
Question 6 What is the motivation of the bad actor known as the “Explorer”?
Correct
Food
Ideology
Money
Compassion
Fortune
Ideology
Money
Fame
Intimidation
Question 9 What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?
Correct
Phishingware
Kidnapware
Ransomware
Fame
https://training.fortinet.com/mod/quiz/review.php?attempt=2807767&cmid=3848 2/2