CSIT 161- MIDTERM EXAM QUESTIONS AND ANSWERS 100% CORRECT!!
To be effective, hackers and cybercriminals: - ANSWER-only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. - ANSWER-only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. Which of the following is used to perform a scan of the network and create a network topology chart? - ANSWER-Zemap Which of the following is a protocol analyzer tool (sometimes called a "packet sniffer") that is used to capture IP traffic from a variety of sources? - ANSWER-Wireshark Which of the following allows Wireshark to capture packets destined to any host on the same subnet or virtual LAN (VLAN)? - ANSWER-Promiscuous mode Which of the following allows analysts to view and analyze network packet traces? - ANSWER-NetWitness Investigator Which of the following performs remote scans and audits of Unix, Windows, and network infrastructures and can perform a network discovery of devices, operating systems, applications, databases, and services running on those devices? - ANSWER-Nessus Which of the following is used to transfer files using the File Transfer Protocol (FTP) to and from the vWorkstation? - ANSWER-FileZilla Most Linux interactions take place: - ANSWER-from the command line. Within the virtual environment, a Remote Desktop Connection and PuTTY are the two ways to: - ANSWER-connect to the Linux terminal. Which of the following does PuTTY use to securely access a remote computer? - ANSWER-The Secure Shell (SSH) protocol Once connected, PuTTY displays a terminal shell: - ANSWER-in which Linux commands can be executed. Which of the following is a key function in the Cisco IOS (Internetwork Operating System)? - ANSWER-The show command The availability of commands in the Cisco IOS (Internetwork Operating System) is based on: - ANSWER-the privilege level of the user. Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the ARP Ping Scan was to: - ANSWER-discover how many hosts are alive.
Written for
- Institution
- CSIT 161-
- Course
- CSIT 161-
Document information
- Uploaded on
- November 3, 2023
- Number of pages
- 16
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
csit 161 midterm exam questions and ans
-
csit 161 midterm exam stuvia
-
to be effective hackers and cybercriminals ans
-
only need to know one vulnerability or how to use
Also available in package deal