Contents
- 1 NSE 1 Information Security Awareness Fortinet – Bad Actors Quiz Answers
- 2 1. What is the motivation of the bad actor known as the “Explorer”?
- 3 2. What is the motive of the “Cyber Criminal”?
- 4 3. What are the primary motivations of the “Hacktivist”?
- 5 4. Attacking systems by exploiting unknown and unpatched vulnerabilities is also known as:
- 6 5. What is the goal of the “Cyber Terrorist”?
- 7 6. What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?
- 8 7. What central component is necessary to form a botnet?
- 9 8. What is the motivation of the “Cyber Terrorist”?
- 10 9. What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?
- 11 10. What is the primary motivation of the “Cyber Warrior”?
NSE 1 Information Security Awareness Fortinet – Bad Actors Quiz Answers
The quiz answers for the Bad Actors Quiz are available for the NSE 1 Information Security Awareness Fortinet Certification. The certification includes five lessons, and the answers for the first lesson are included in this post. The application link is also provided below.
1. What is the motivation of the bad actor known as the “Explorer”?
- Food
- Money
- Ideology
- Notoriety
2. What is the motive of the “Cyber Criminal”?
- Money
- Fame
- Ideology
- Intimidation
3. What are the primary motivations of the “Hacktivist”?
- The appreciation of their country’s leaders
- Food, wine, and gambling
- Political, social, or moral disagreements
- The cost of commercial software and support
4. Attacking systems by exploiting unknown and unpatched vulnerabilities is also known as:
- First-day exploits
- Phishing
- Secret sauce
- Zero-day exploits
5. What is the goal of the “Cyber Terrorist”?
- Stable world markets
- Intimidation through disruption and damage
- Peace through understanding
- Adoption of Bitcoin as a primary national currency
6. What is it called when a fraudulent email masquerades as a legitimate communication in an attempt to get a user to reveal sensitive information?
- Trolling
- Harpooning
- Phishing
- Baselining
7. What central component is necessary to form a botnet?
- DNS server
- Ethernet switch
- Command & Control (C&C) Server
- Transformer
8. What is the motivation of the “Cyber Terrorist”?
- Compassion
- Ideology
- Fortune
- Fame
9. What is the name of the malware that takes over a computer system and holds hostage the disk drives or other data?
- Ransomware
- Phishingware
- Scareware
- Kidnapware
10. What is the primary motivation of the “Cyber Warrior”?
- The adoption of Bitcoin as a national currency
- Money
- Fame
- The political interest of their country’s government










