Section 2.1 Demonstrate your acquired knowledge about the importance of comparing and contrasting common threat actors and motivations.. This will demonstrate your proficiency for section 2.1 of the Security+ SY0-701 objectives. 1 / 25 An activist group leaks information to protest corruption. Their motive is: Revenge Philosophical beliefs Espionage Blackmail 2 / 25 A nation-state disabling communications before an attack is motivated by: Blackmail Espionage War Profit 3 / 25 Which actor most commonly abuses their role or privilege internally? Insider threat Hacktivist Organized crime Shadow IT 4 / 25 A team of attackers demanding crypto payment is likely motivated by: Chaos Beliefs Espionage Financial gain 5 / 25 What attribute distinguishes a nation-state from other actors? Access to social media Small team size Advanced resources and tools Limited political ties 6 / 25 Which threat actor might include foreign intelligence operatives? Insider threat Hacktivist Nation-state Unskilled attacker 7 / 25 A group attacking without clear demands or targets is likely seeking: Financial gain Disruption/chaos Espionage Political change 8 / 25 What’s a likely motivation for a vengeful former employee deleting data? Profit Political ideology Chaos Revenge 9 / 25 Which actor type is external, ideological, and potentially destructive? Insider threat Hacktivist Unskilled attacker Shadow IT 10 / 25 A cybercriminal threatening to release data unless paid is committing: Espionage Revenge Blackmail Sabotage 11 / 25 What type of actor may operate independently without malicious intent? Hacktivist Nation-state Insider threat Shadow IT 12 / 25 What is a core motivation for a hacktivist group leaking emails? Revenge Espionage Political beliefs Financial gain 13 / 25 Which actor relies most on physical access and trusted credentials? Hacktivist Organized crime Insider threat Nation-state 14 / 25 A cyberattack aiming to embarrass a rival nation is driven by: Financial gain Political beliefs Ethical hacking War 15 / 25 Which actor type typically has the lowest technical skills? Unskilled attacker Nation-state Insider threat Organized crime 16 / 25 Which motivation best explains an attack targeting sensitive communications? Profit Espionage Revenge Anarchy 17 / 25 A user installing unauthorized apps to be more productive is using: Shadow IT Hacktivist tools Legal malware Ethical access 18 / 25 What is a common goal for organized cybercriminal groups? Revenge Chaos Ethics Financial gain 19 / 25 A threat actor aiming to steal IP and spy on governments is typically: Organized crime Insider threat Nation-state Unskilled attacker 20 / 25 Which actor is external, organized, and financially motivated? Hacktivist Organized crime Insider threat Shadow IT 21 / 25 Which actor would most likely operate without IT approval but inside an organization? Insider threat Shadow IT Nation-state Hacktivist 22 / 25 A politically motivated attacker leaking sensitive data is most likely a: Insider threat Nation-state Hacktivist Organized crime 23 / 25 Which group typically uses pre-built tools with little technical knowledge? Nation-state Insider threat Unskilled attacker Hacktivist 24 / 25 An employee misusing legitimate access for sabotage is an example of: Hacktivist Shadow IT Insider threat Organized crime 25 / 25 Which threat actor is most likely to be well-funded and target infrastructure? Hacktivist Nation-state Insider threat Unskilled attacker Your score isThe average score is 0% 0% Restart quiz Return to CompTia N+ 10-009 Objectives