1.
Which group is the number one source of IT security attacks according to the Symantec research shared in the Security Solutions 2.0 course?
2.
Which global trade is determined by the United States Federal Bureau of Investigation (FBI) to be smaller than the global market for illegally-obtained information, according to the Security Solutions 2.0 course.?
3.
An employee has become disgruntled with their employer, a payroll software manufacturer, and one of the employees friends works for a competitor. The employee copies some highly-confidential source code to a USB drive and gives the USB drive to their friend after work. Which source(s) of a breach are involved in this scenario?
4.
What is the cybercriminal hoping to accomplish during the incursion phase?
5.
Malware that contains a backdoor is placed on a system that will later be used by the cybercriminal to gain access to the system. Which phase of the breach does this represent?

 
6.
A cybercriminal wants to maintain future access to a compromised system. Which tool would the cybercriminal use to accomplish this?
7.
A cybercriminal wants to break into an organization using a SQL injection attack. What will the cybercriminal do to start the attack?
8.
What is the most common method bots may use to extract data?
9.
What is the leading root cause for successful malicious attacks?
10.
A cybercriminal is trying to get a foothold into an organization by exploiting a weakness in their web servers. What is the most common website vulnerability that cybercriminals can use?