1.4.2 Module 1: The Danger Quiz Answers
1. An attacker sends a piece of malware as an email attachment to employees in a company. What is one probable purpose of the attack?
- probing open ports on the firewall on the border network
- searching and obtaining trade secrets
- cracking the administrator password for a critical server
- denying external access to a web server that is open to the public
2. What is cyberwarfare?
- It is an attack on a major corporation.
- It is an attack designed to disrupt, corrupt, or exploit national interests.
- It is an attack that only involves robots and bots.
- It is an attack only on military targets.
3. What type of malware has the primary objective of spreading across the network?
- Trojan horse
4. What is a potential risk when using a free and open wireless hotspot in a public location?
- The Internet connection can become too slow when many users access the wireless hotspot.
- Purchase of products from vendors might be required in exchange for the Internet access.
- Network traffic might be hijacked and information stolen.
- Too many users trying to connect to the Internet may cause a network traffic jam.
5. At the request of investors, a company is proceeding with cyber attribution with a particular attack that was conducted from an external source. Which security term is used to describe the person or device responsible for the attack?
- threat actor
6. What name is given to an amateur hacker?
- red hat
- script kiddie
- blue team
- black hat
7. What commonly motivates cybercriminals to attack networks as compared to hacktivists or state-sponsored hackers?
- political reasons
- financial gain
- fame seeking
- status among peers
8. What is a botnet?
- a network of infected computers that are controlled as a group
- a network that allows users to bring their own technology
- a group of web servers that provide load balancing and fault tolerance
- an online video game intended for multiple players
9. What is a rogue wireless hotspot?
- It is a hotspot that was set up with outdated devices.
- It is a hotspot that does not implement strong user authentication mechanisms.
- It is a hotspot that does not encrypt network user traffic.
- It is a hotspot that appears to be from a legitimate business but was actually set up by someone without the permission from the business.
10. What is the best definition of personally identifiable information (PII)?
- Data that is collected from servers and websites for anonymous browsing.
- Data that is collected from servers and web browsers using cookies in order to track a consumer.
- Data that is collected by businesses to track the digital behavior of consumers.
- Data that is collected by businesses to distinguish identities of individuals.
11. What was used as a cyberwarfare weapon to attack a uranium enrichment facility in Iran?
- SQL injection
12. A company pays a significant sum of money to hackers in order to regain control of an email and data server. Which type of security attack was used by the hackers?
- Trojan horse