2.1.1 Threat Actors Quiz

2.1.1 Threat Actors Quiz

12th Grade

9 Qs

quiz-placeholder

Similar activities

Module 10-LAN Security

Module 10-LAN Security

9th Grade - University

9 Qs

Cybersecurity Fundamentals Week 1 Quiz

Cybersecurity Fundamentals Week 1 Quiz

KG - University

10 Qs

CompTIA Practice Questions

CompTIA Practice Questions

12th Grade

10 Qs

Women in Tech by Sisters of Code

Women in Tech by Sisters of Code

9th - 12th Grade

10 Qs

Unit 1 Quiz Prep

Unit 1 Quiz Prep

9th - 12th Grade

13 Qs

Hackers

Hackers

9th - 12th Grade

5 Qs

emtech

emtech

12th Grade

10 Qs

How safe is your information?

How safe is your information?

5th - 12th Grade

10 Qs

2.1.1 Threat Actors Quiz

2.1.1 Threat Actors Quiz

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Robert Walsh

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which group of threat actors is characterized by novice computer professionals with little expertise or knowledge?

Hacktivists

Organized Crime

Script Kiddies

Insider Threats

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacktivists are primarily driven by:

Financial gain

Political, commercial, or economic messages

Challenging the status quo

State-sponsored activities

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which group of threat actors is fueled by money and the desire to gain power to continue their influence?

Hacktivists

Shadow IT

Nation States and APT

Competition

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do Insider Threats primarily exploit to cause damage within an organization?

Exploits and attacks for a cause

Advanced government or military organizations

Shadow IT infrastructure

Weak points known within the organization

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of hackers intend to cause damage and harm to their targets?

White hat hackers

Grey hat hackers

Black hat hackers

Authorized hackers

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Shadow IT operates:

As part of larger organizations, following IT department rules strictly

Within larger organizations but not following IT department rules

Independently, without any connection to larger organizations

Solely for financial gain without regard to organizational rules

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of threat actor come from inside of an organization and has trusted access to information?

Hacktivist

Shadow IT

External threat actor

Internal threat actor

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which motivation involves disrupting the normal operation of systems, networks, or services for various reasons?

Data exfiltration

Espionage

Service disruptions

Blackmail

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The primary motivation for hacktivist groups is:

political or social activism

financial gain

personal fame

corporate competition