1.What is cyberwarfare?

This item is based on information contained in the presentation. Cyberwarfare is a subset of information warfare (IW). Its objective is to disrupt (availability), corrupt (integrity) or exploit (confidentiality or privacy). It can be directed against military forces, critical infrastructures, or other national interests, such as economic targets. It involves several teams that work together. Botnet might be one of several tools to be used for launching the attack.

2. What type of malware has the primary objective of spreading across the network?

The main purpose of a worm is to self-replicate and propagate across the network.  A virus is a type of malicious software that needs a user to spread.  A trojan horse is not self-replicating and disguises itself as a legitimate application when it is not.  A botnet is a series of zombie computers working together to wage a network attack. ​

3. What is a botnet?

One method of executing a DDoS attack involves using a botnet. A botnet builds or purchases a botnet of zombie hosts, which is a group of infected devices. The zombies continue to create more zombies which carry out the DDoS attack.

4. A company pays a significant sum of money to hackers in order to regain control of an email and data server. Which type of security attack was used by the hackers?

Ransomware involves the hackers preventing user access to the infected and controlled system until the user pays a specified amount.

5. What name is given to an amateur hacker?

Script kiddies is a term used to describe inexperienced hackers.

6. What commonly motivates cybercriminals to attack networks as compared to hactivists or state-sponsored hackers?

Cybercriminals are commonly motivated by money. Hackers are known to hack for status. Cyberterrorists are motivated to commit cybercrimes for religious or political reasons.  

7. What is the best definition of personally identifiable information (PII)?

Personally identifiable information (PII) is data that could be used to distinguish the identity of an individual, such as mother’s maiden name, social security number, and/or date of birth.

8.What is a rogue wireless hotspot?

A rogue wireless hotspot is a wireless access point running in a business or an organization without the official permission from the business or organization.

9. What are two purposes of launching a reconnaissance attack on a network? (Choose two.)

Gathering information about a network and scanning for access is a reconnaissance attack. Preventing other users from accessing a system is a denial of service attack. Attempting to retrieve and modify data, and attempting to escalate access privileges are types of access attacks.

10. At the request of investors, a company is proceeding with cyber attribution with a particular attack that was conducted from an external source. Which security term is used to describe the person or device responsible for the attack?

Some people may use the common word of “hacker” to describe a threat actor. A threat actor is an entity that is involved with an incident that impacts or has the potential to impact an organization in such a way that it is considered a security risk or threat.