100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CSIT 161- MIDTERM EXAM QUESTIONS AND ANSWERS 100% CORRECT!!

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
03-11-2023
Written in
2023/2024

To be effective, hackers and cybercriminals: - ANSWER-only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. - ANSWER-only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. Which of the following is used to perform a scan of the network and create a network topology chart? - ANSWER-Zemap Which of the following is a protocol analyzer tool (sometimes called a "packet sniffer") that is used to capture IP traffic from a variety of sources? - ANSWER-Wireshark Which of the following allows Wireshark to capture packets destined to any host on the same subnet or virtual LAN (VLAN)? - ANSWER-Promiscuous mode Which of the following allows analysts to view and analyze network packet traces? - ANSWER-NetWitness Investigator Which of the following performs remote scans and audits of Unix, Windows, and network infrastructures and can perform a network discovery of devices, operating systems, applications, databases, and services running on those devices? - ANSWER-Nessus Which of the following is used to transfer files using the File Transfer Protocol (FTP) to and from the vWorkstation? - ANSWER-FileZilla Most Linux interactions take place: - ANSWER-from the command line. Within the virtual environment, a Remote Desktop Connection and PuTTY are the two ways to: - ANSWER-connect to the Linux terminal. Which of the following does PuTTY use to securely access a remote computer? - ANSWER-The Secure Shell (SSH) protocol Once connected, PuTTY displays a terminal shell: - ANSWER-in which Linux commands can be executed. Which of the following is a key function in the Cisco IOS (Internetwork Operating System)? - ANSWER-The show command The availability of commands in the Cisco IOS (Internetwork Operating System) is based on: - ANSWER-the privilege level of the user. Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the ARP Ping Scan was to: - ANSWER-discover how many hosts are alive.

Show more Read less
Institution
CSIT 161-
Course
CSIT 161-










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CSIT 161-
Course
CSIT 161-

Document information

Uploaded on
November 3, 2023
Number of pages
16
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Papersbylee Chowan University
View profile
Follow You need to be logged in order to follow users or courses
Sold
22
Member since
2 year
Number of followers
14
Documents
1264
Last sold
2 months ago

3.3

7 reviews

5
1
4
1
3
4
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions