Search Header Logo

CIT26 Practice Final Exam 97Q

Authored by Casoy Casoy

Information Technology (IT)

University

CIT26 Practice Final Exam 97Q
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

135 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At the request of investors, a company is proceeding with cyber attribution with a particular attack that was conducted from an external source. Which security term is used to describe the person or device responsible for the attack?

  • fragmenter

  • skeleton

  • threat actor

tunneler

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes a threat actor who has advanced skills and pursues a social agenda?

  • script kiddie

  • organized crime

  • corporate/industrial spies

hacktivist

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two motivating factors for nation-state sponsored threat actors? (Choose two.)

  • financial gain

  • social or personal causes

  • industrial espionage

  • disruption of trade or infrastructure

showing off their hacking skill

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match the definition to the Microsoft Windows term. (Not all options are used.)

runs in the background to support the operating system and applications

process

registry

service

thread

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match the definition to the Microsoft Windows term. (Not all options are used.)

instructions executed by the processor

process

registry

service

thread

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match the definition to the Microsoft Windows term. (Not all options are used.)

a currently executing program

process

registry

service

thread

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match the definition to the Microsoft Windows term. (Not all options are used.)

alternate data streams

most common file system

upgraded firmware that stores boot code in the firmware

a method of adding information to an NTFS-based file

NTFS-generated timestamps for file activity

a legacy file system

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Similar Resources on Wayground