Correctly
Threat actors focused on financial gain often attack which of the following main target
categories?
a.Individual users
b.REST services
c.Product lists
d.Social media assets
a.Individual users
What is a variation of a common social engineering attack targeting a specific user?
a.Spam
b.Watering holes
c.Redirection
d.Spear phishing
d.Spear phishing
Which of the following computing platforms is highly vulnerable to attacks?
a.On-premises
b.Hybrid
c.Legacy
d.Cloud
c.Legacy
Which of the following is a social engineering method that attempts to influence the
subject before the event occurs?
a.Watering hole
b.Spear phishing
c.Redirection
d.Prepending
d.Prepending
Which of the following is the most common method for delivering malware?
a.Email
b.Identity theft
c.Removable media
d.Social media
a.Email
Which threat actors violate computer security for personal gain?
a.Red hat hackers
b.Gray hat hackers
c.White hat hackers
d.Black hat hackers
d.Black hat hackers
Which of the following is a primary difference between a red team and a white team?
a.The red team uses an automated vulnerability scanning tool to find vulnerabilities,
whereas the white team decides which tool to use in automated vulnerability scanning.
b.The red team provides real-time feedback to enhance the threat detection capability,