CIST 1601 Final Exam 2024 with 50 Questions and
Answers|Graded A+
Correct 50
A+
Incorrect 00
Final Quiz CIST 1601
1 of 50
Term
A cyber criminal sends a series of maliciously formatted packets to the
database server. The server cannot parse the packets and the event
causes the server crash. What is the type of attack the cyber criminal
launches?
Give this one a try later!
, Worm Wtp
DoS Windows
Don't know?
2 of 50
Term
Which framework should be recommended for establishing a
comprehensive information security management system in an
organization?
Give this one a try later!
Nist cybersecurity framework Itil service management
ISO/IEC 27000 Cobit 5
Don't know?
3 of 50
Term
,Which website offers guidance on putting together a checklist to
provide
guidance on configuring and hardening operating systems?
Give this one a try later!
The National Vulnerability
The National Park Service website
Database website
The International Space Station The World Health Organization
website website
Don't know?
4 of 50
Term
Which statement best describes a motivation of hacktivists?
Give this one a try later!
They are government agents They work independently to create
monitoring online activities. malware for profit.
They are hired by corporations to They are part of a protest
protect their digital assets. group behind a political cause.
, Don't know?
5 of 50
Term
A penetration testing service hired by the company has reported that a
backdoor was identified on the network. What action should the
organization take to find out if systems have been compromised?
Give this one a try later!
Look for policy changes in event
Look for unauthorized accounts
viewer
Look for usernames that do not have
Scan the systems for viruses
passwords
Don't know?
Answers|Graded A+
Correct 50
A+
Incorrect 00
Final Quiz CIST 1601
1 of 50
Term
A cyber criminal sends a series of maliciously formatted packets to the
database server. The server cannot parse the packets and the event
causes the server crash. What is the type of attack the cyber criminal
launches?
Give this one a try later!
, Worm Wtp
DoS Windows
Don't know?
2 of 50
Term
Which framework should be recommended for establishing a
comprehensive information security management system in an
organization?
Give this one a try later!
Nist cybersecurity framework Itil service management
ISO/IEC 27000 Cobit 5
Don't know?
3 of 50
Term
,Which website offers guidance on putting together a checklist to
provide
guidance on configuring and hardening operating systems?
Give this one a try later!
The National Vulnerability
The National Park Service website
Database website
The International Space Station The World Health Organization
website website
Don't know?
4 of 50
Term
Which statement best describes a motivation of hacktivists?
Give this one a try later!
They are government agents They work independently to create
monitoring online activities. malware for profit.
They are hired by corporations to They are part of a protest
protect their digital assets. group behind a political cause.
, Don't know?
5 of 50
Term
A penetration testing service hired by the company has reported that a
backdoor was identified on the network. What action should the
organization take to find out if systems have been compromised?
Give this one a try later!
Look for policy changes in event
Look for unauthorized accounts
viewer
Look for usernames that do not have
Scan the systems for viruses
passwords
Don't know?