ITE 152 - Chapter 6 Newest Actual Exam
Complete Questions Ans Detailed
Answers Graded A+ 2025/2026.
Attackers (threat actors)
An individual who launches attacks against other users and their
computers, also known as a threat actor.
Script Kiddie
An individual who wants to attack computers, but lacks the knowledge of
computers and networks needed to do so. Script kiddies download freely
available automated attack software (scripts) from websites and use it to
perform malicious acts.
Hacktivists
Attackers who are strongly motivated by principles or beliefs.
Cyberterrorists
An individual who attacks a nation's computer networks, like the electrical
power grid, to cause disruption and panic among citizens.
Nation State Actors
Government-sponsored attacker that launches computer attacks against
their enemies.
Insiders
The security threat to a company that comes from its own employees,
contractors, and business partners.
Data Mining
The process of sifting through big data to find the important questions
that will yield fruitful results.
e-waste
Electronic waste from discarded digital devices. It often contains toxic
metals such as lead and mercury. According to the Environmental
Protection Agency (EPA), Americans generate over 9.4 million tons of e-
waste each year.
Complete Questions Ans Detailed
Answers Graded A+ 2025/2026.
Attackers (threat actors)
An individual who launches attacks against other users and their
computers, also known as a threat actor.
Script Kiddie
An individual who wants to attack computers, but lacks the knowledge of
computers and networks needed to do so. Script kiddies download freely
available automated attack software (scripts) from websites and use it to
perform malicious acts.
Hacktivists
Attackers who are strongly motivated by principles or beliefs.
Cyberterrorists
An individual who attacks a nation's computer networks, like the electrical
power grid, to cause disruption and panic among citizens.
Nation State Actors
Government-sponsored attacker that launches computer attacks against
their enemies.
Insiders
The security threat to a company that comes from its own employees,
contractors, and business partners.
Data Mining
The process of sifting through big data to find the important questions
that will yield fruitful results.
e-waste
Electronic waste from discarded digital devices. It often contains toxic
metals such as lead and mercury. According to the Environmental
Protection Agency (EPA), Americans generate over 9.4 million tons of e-
waste each year.