1.
Malware that contains a backdoor is placed on a system that will later be used by the cybercriminal to gain access to the system. The cybercriminal was successful in which phase of the breach?
2.
According to the Symantec research shared in the Security Solutions 1.0 course, which group is the number one source of IT security attacks?
3.
What is the leading root cause for successful malicious attacks?
4.
What is the goal of a denial of service attack?
5.
Which type of attack does a cybercriminal use to convince individuals to respond with sensitive information?
6.
Which type of attack would be most successful against the password T63k#s23A?
7.
An employee has become disgruntled with their employer, a payroll software manufacturer, and one of the employees friends works for a competitor. The employee copies some highly- confidential source code to a USB drive and gives the USB drive to their friend after work. Which source(s) of a breach are involved in this scenario?
8.
A cybercriminal wants to break into an organization using a SQL injection attack. What will the cybercriminal do to start the attack?
9.
What is the cybercriminal hoping to accomplish during the incursion phase?
10.
What does a cybercriminal insert into a web page to perform a cross-site scripting attack?