Zero-day exploits Correct Answer: Attacking systems by exploiting otherwise unknown and
unpatched vulnerabilities
Primary motivations of the Hacktivist Correct Answer: Political, social, or moral disagreements
What component is necessary to form a botnet? Correct Answer: Command & Control Server
(C&C)
What is it called when a fraudulent email masquerades as a legitimate communication in an
attempt to get a user to reveal sensitive information? Correct Answer: Phishing
What is the goal of the Cyber Terrorist? Correct Answer: Intimidation through disruption and
damage
What is the motivation of the bad actor known as the "Explorer"? Correct Answer: Notoriety
What is the motivation of the "Cyber Terrorist"? Correct Answer: Ideology
What is the motive of the "Cyber Criminal"? Correct Answer: Money
What is the name of the malware that takes over a computer system and holds hostage the disk
drives or other data? Correct Answer: Ransomware
What is the primary motive of the "Cyber Warrior"? Correct Answer: The political interest of
their country's government
How does implementing multiple security point products from multiple vendors affect managing
an environment? Correct Answer: More complicated and more expensive
Internally to the CIO's company, what is the overall impact when a cyber attack causes extended
downtime, and employees' time is diverted to post-attack activities? Correct Answer:
Productivity is reduced
On average, how can a CIO's tenure be characterized? Correct Answer: CIOs have the shortest
tenures among C-level executives.
Regulatory fines related to serious breaches can be characterized in which way? Correct Answer:
They can be enormous and seriously impact the bottom line.
What is becoming a regular topic between CIOs, the other C-level executives, and the board or
directors? Correct Answer: Implementing cyber security
What is the primary responsibility of a CIO Correct Answer: Controlling the Information
Technology (IT) resources of a company