CompTIA Security+ 2.1 Threats, Attacks and Vulnerabilities – Threat Actors

Posted by:

|

On:

|

Threat Actors

1 / 25

Which of the following threat actors poses the greatest risk of data exfiltration due to their authorized access to systems?

2 / 25

Which of the following threat actors is MOST likely to target critical infrastructure for the purpose of causing widespread disruption?

3 / 25

Which of the following is a characteristic of an Advanced Persistent Threat (APT)?

4 / 25

Which of the following best describes the primary risk posed by insider threats?

5 / 25

Which of the following best describes the typical skill level of a script kiddie?

6 / 25

Which of the following threat actors is MOST likely to exploit zero-day vulnerabilities in targeted attacks?

7 / 25

Which of the following threat actors is MOST likely to conduct a website defacement as a form of protest?

8 / 25

Which of the following threat actors is MOST likely to conduct long-term, stealthy operations aimed at maintaining persistent access to a target network?

9 / 25

Which of the following best describes the primary goal of a nation state actor in conducting cyber espionage?

10 / 25

Which of the following threat actors is MOST likely to have state-sponsored resources and focus on long-term strategic goals?

11 / 25

Which of the following threat actors is MOST likely to engage in cyber attacks primarily for the thrill or challenge?

12 / 25

Which threat actor type is MOST likely to engage in cyber espionage against foreign governments and businesses?

13 / 25

Which of the following threat actors is MOST likely to be motivated by ideology or social causes?

14 / 25

Which of the following best describes the primary risk associated with script kiddies?

15 / 25

Which of the following threat actors is MOST likely to use ransomware attacks for financial gain?

16 / 25

Which threat actor type is characterized by limited technical skills and reliance on pre-written exploit tools?

17 / 25

Which of the following best describes the primary goal of an insider threat in conducting a cyber attack?

18 / 25

Which of the following best describes the primary motivation of a competitor engaging in cyber attacks?

19 / 25

Which of the following threat actors is MOST likely to use social engineering tactics to gain unauthorized access to systems?

20 / 25

Which of the following best describes the motivation of a hacktivist group?

21 / 25

Which threat actor type is MOST likely to target a company’s competitors to steal trade secrets or disrupt operations?

22 / 25

Which of the following best describes the typical motivation of a script kiddie?

23 / 25

Which of the following threat actors is MOST likely to have detailed knowledge of an organization’s internal systems and processes?

24 / 25

Which of the following best describes the typical target selection process of a hacktivist group?

25 / 25

Which of the following best describes the primary motivation of organized crime groups in cyber attacks?

Your score is

Exit