69.5k views
5 votes
1)Which type of hacker attempts to probe a system with an organization's permission for weaknesses and then privately report back to that organization?

a. Gray hat hackers
b. Black hat hackers
c. White hat hackers
d. Green hat hackers
2)What is the name for malware that is sold by attackers to other attackers and can be customized?
a. Custom malware
b. Proprietary malware
c. Commodity malware
d. ATTACK malware
3)Parvin is conducting research on hactivists. Which of the following would she NOT find about hactivists?
a. The name is a combination of the words "hack" and "activism."
b. Hactivists proudly wear the name "hactivist."
c. Hactivists have defaced websites in order to make a political statement.
d. Disinformation campaigns are a favorite tactic of hacktivists.
4)Which is not a category of threats based on the Johari window of cybersecurity threats?
a. Known knowns
b. Unknown unknowns
c. Unknown knowns
d. Knowns
5)Which of the following is NOT correct about an Advanced Persistent Threat (APT)?
a. APTs are most commonly associated with nation-state actors.
b. APTs use innovative attack tools.
c. Once a system is infected by an ATP, it silently extracts data over an extended period of time.
d. APTs require the use of SQL injection attacks.

User Dany Y
by
7.8k points

2 Answers

3 votes

Final answer:

White hat hackers probe systems with an organization's permission to identify weaknesses, custom malware is sold to other attackers and can be customized, hactivists don't necessarily identify themselves as 'hactivists', unknown knowns is not a valid category of cybersecurity threats, and APTs don't require SQL injection attacks. Hackers use various tactics, steal sensitive information, and their success varies. Strong cybersecurity measures, regular updates, user education, and incident response plans help reduce hacking.

Step-by-step explanation:

The type of hacker that attempts to probe a system with an organization's permission for weaknesses and privately reports back to that organization is a white hat hacker. White hat hackers are ethical hackers who use their skills to improve security by identifying vulnerabilities in systems and helping organizations fix them.

Custom malware is the name for malware that is sold by attackers to other attackers and can be customized. This allows the attackers to tailor the malware to specific targets or purposes.

In regard to hacktivists, Parvin would NOT find that hactivists proudly wear the name 'hactivist'. This statement is not accurate as hactivists do not necessarily identify themselves by that term.

One of the categories of threats based on the Johari window of cybersecurity threats that is NOT valid is unknown knowns.

An advanced persistent threat (APT) does NOT require the use of SQL injection attacks. APTs are most commonly associated with nation-state actors, use innovative attack tools, and once a system is infected, silently extract data over an extended period of time.

Hackers use various tactics including phishing, social engineering, malware attacks, and exploiting vulnerabilities in systems. They steal sensitive information such as personal data, financial information, and company trade secrets. They may sell or use the stolen information for financial gain, identity theft, or other malicious activities. The success of hacking attempts varies depending on factors such as the skill of the hacker, the security measures in place, and the awareness of the target. To reduce hacking, it is important to have strong cybersecurity measures in place, regularly update software and systems, educate users about potential risks, and have incident response plans in place to quickly mitigate and respond to security breaches.

User Gamlor
by
8.8k points
1 vote

The answers to the questions are:

  • 1) c. White hat hackers
  • 2) c. Commodity malware
  • 3) d. Disinformation campaigns are a favorite tactic of hacktivists.
  • 4) d. Knowns
  • 5) d. APTs require the use of SQL injection attacks.

What is the commodity malware

Commodity malware refers to malicious software that is sold by cyber attackers to other malicious actors on the dark web or through underground forums.

This type of malware is not unique to a specific target and can be easily customized or modified based on the buyer's requirements.

It is often designed to exploit common vulnerabilities and is sold as a commodity, available for purchase and use by various cybercriminals for their malicious activities.

User Silverio
by
8.3k points