#1. Which of the following is NOT a motivation of malicious actors?
#2. Which of the following is NOT considered a type of DDoS attack?
#3. Why is UDP the “protocol of choice” for reflected DDoS attack?
#4. Which of the following is leveraged in social engineering?
#5. Which of the following is NOT a form of social engineering
#6. Which of the following is NOT a valid defense against social engineering?
#7. Which tool provides the most granular information to help in the identification of malware?
#8. NetFlow provides which of the following?
#9. Which of the following is NOT used for identification of malware on the network?
#10. Which type of data is not often attractive to malicious actors?
Previous
Finish