1.
From the options below, select the two fundamental issues that make solving international cyber conflicts difficult?
Problems with attack attribution due to anonymous nature of Internet
Jurisdictional issues due to Internet transcending national boundaries
Technical difficulties in operating the Internet
All of the above
2.
Identify a recognized type of cyber crime from the following options.
Hacking
Extortion
Identity theft
Cyber bullying
Child soliciting and abuse
All of the above
3.
Which of the following could be an example of "positive deviance"? Select all that apply.
Testing security vulnerabilities of a security system
Stealing and selling intellectual property
Gaining unauthorized access to a computer
Threatening national security
4.
What types of hackers promote their political goals or ideas using non-violent hacking?
Hacktivists
Crackers
Black hat hackers
Cyber-punks
5.
What are the fundamental parameters of motivated behavior?
Intensity
Persistence
Direction
Initiation
6.
It is true to say that motivated behavior is __________.
More like a trait, varying based on personal characteristic
More like a state variable, varying from situation to situation
7.
Which of the hacking motives below is related to the psychological drive of mastery?
Ideology
Recognition
Financial gain
Challenge
Curiosity
None of the above
8.
Which of the outcomes below are driven by both internal/intrinsic and external/extrinsic motivations? Select all that apply.
Pride
Fun
Mastery
Monetary gain
Fame
Status
Self satisfaction
9.
What are some of the motives for hacking? Select all that apply.
Ideology
Greed
Challenge
Status
Curiosity
None of the above
10.
What does IP stand for?
Interest Protocol
Internal Packets
Internet Protocol
Internet Packets
Number 7 isn't correct; I've tried that answer and also Challenge/Curiosity but no luck.
ReplyDeleteChallenge
DeleteAlso question No. 2 is false.
ReplyDeleteHi, I'm still not able to find the correct answers for questions 2 & 7.
ReplyDeleteAnybody has found?
Excellent info! I usually follow all these sites for more info regarding cyber security. I'm also a cyber security enthusiast and I also follow the articles, News and Security Tips from here https://www.cybercrimeswatch.com & https://www.cybercrimeswatch.com/security-tips/ . The Website provide a detailed insight to a subject.
ReplyDeleteanswer to question 7 is challenge . It asks which of them relates to, not leads to.
ReplyDeleteThanks for the valuable information. Cyber security is the backbone of many industries. Hackers are targeting the growing dependence of people on digital resources in today's world. Cyber Security Company in Chennaiprovides the strategy for maintaining information protection for good cyber hygiene, checking sources and keeping official alerts up-to-date.
ReplyDeletePenetration Testing Services in chennai
VAPT Services in Chennai
BCP services in chennai
Soc Service Provider In chennai
Business Continuity management service in chennai
Cyber attack recovery services in chennai
Number 2 is all of the above
ReplyDeleteI really loved reading your blog. It was very well authored and easy to undertand. Unlike additional blogs I have read which are really not tht good. I also found your posts very interesting. In fact after reading, I had to go show it to my friend and he ejoyed it as well!
ReplyDeleteHire a Hacker in Singapore
Very informative post ! There is a lot of information here that can help any business get started with a successful social networking campaign ! أنواع الجرائم الإلكترونية
ReplyDelete.افضل افضل محامي في جدة لمختلف القضايا والاستشارات القانونية والشرعية والاحوال الشخصية وتحصيل الديون في جدة ، يسعى المكتب الى تقديم افضل الخدمات القانونية بالسعودية
ReplyDeleteمنصة افضل محامي في جدة لطلب الاستشارات والقضايا العقارية والمرافعات لدى مختلف المحكام والتركات وتحصيل الديون بجدة ، يسعى المكتب الى تقديم افضل الحلولو الخدمات القضائية بالسعودية
ReplyDeleteQ;2 is wrong
ReplyDelete