100% Free Exams (No login or credit card required)

Section 2.1

Demonstrate your acquired knowledge about the importance of comparing and contrasting common threat actors and motivations.. This will demonstrate your proficiency for section 2.1 of the Security+ SY0-701 objectives.

1 / 25

An activist group leaks information to protest corruption. Their motive is:

2 / 25

A nation-state disabling communications before an attack is motivated by:

3 / 25

Which actor most commonly abuses their role or privilege internally?

4 / 25

A team of attackers demanding crypto payment is likely motivated by:

5 / 25

What attribute distinguishes a nation-state from other actors?

6 / 25

Which threat actor might include foreign intelligence operatives?

7 / 25

A group attacking without clear demands or targets is likely seeking:

8 / 25

What’s a likely motivation for a vengeful former employee deleting data?

9 / 25

Which actor type is external, ideological, and potentially destructive?

10 / 25

A cybercriminal threatening to release data unless paid is committing:

11 / 25

What type of actor may operate independently without malicious intent?

12 / 25

What is a core motivation for a hacktivist group leaking emails?

13 / 25

Which actor relies most on physical access and trusted credentials?

14 / 25

A cyberattack aiming to embarrass a rival nation is driven by:

15 / 25

Which actor type typically has the lowest technical skills?

16 / 25

Which motivation best explains an attack targeting sensitive communications?

17 / 25

A user installing unauthorized apps to be more productive is using:

18 / 25

What is a common goal for organized cybercriminal groups?

19 / 25

A threat actor aiming to steal IP and spy on governments is typically:

20 / 25

Which actor is external, organized, and financially motivated?

21 / 25

Which actor would most likely operate without IT approval but inside an organization?

22 / 25

A politically motivated attacker leaking sensitive data is most likely a:

23 / 25

Which group typically uses pre-built tools with little technical knowledge?

24 / 25

An employee misusing legitimate access for sabotage is an example of:

25 / 25

Which threat actor is most likely to be well-funded and target infrastructure?

Your score is

The average score is 0%

0%