100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CSIT 161- MIDTERM EXAM QUESTIONS AND ANSWERS 100% VERIFIED

Rating
-
Sold
-
Pages
15
Grade
A+
Uploaded on
13-02-2024
Written in
2023/2024

CSIT 161- MIDTERM EXAM QUESTIONS AND ANSWERS 100% VERIFIED To be effective, hackers and cybercriminals: - answeronly need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. - answeronly need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. Which of the following is used to perform a scan of the network and create a network topology chart? - answerZemap Which of the following is a protocol analyzer tool (sometimes called a "packet sniffer") that is used to capture IP traffic from a variety of sources? - answerWireshark Which of the following allows Wireshark to capture packets destined to any host on the same subnet or virtual LAN (VLAN)? - answerPromiscuous mode Which of the following allows analysts to view and analyze network packet traces? - answerNetWitness Investigator Which of the following performs remote scans and audits of Unix, Windows, and network infrastructures and can perform a network discovery of devices, operating systems, applications, databases, and services running on those devices? - answerNessus Which of the following is used to transfer files using the File Transfer Protocol (FTP) to and from the vWorkstation? - answerFileZilla Most Linux interactions take place: - answerfrom the command line. Within the virtual environment, a Remote Desktop Connection and PuTTY are the two ways to: - answerconnect to the Linux terminal. Which of the following does PuTTY use to securely access a remote computer? - answerThe Secure Shell (SSH) protocol Once connected, PuTTY displays a terminal shell: - answerin which Linux commands can be executed. Which of the following is a key function in the Cisco IOS (Internetwork Operating System)? - answerThe show command The availability of commands in the Cisco IOS (Internetwork Operating System) is based on: - answerthe privilege level of the user. Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the ARP Ping Scan was to: - answerdiscover how many hosts are alive. Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the TCP Port Scan was to: - answeridentify open TCP ports. Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the Service Scan was to: - answerlook for fingerprints of known services by testing responses to certain types of packets. Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the Traceroute was to: - answerdiscover the IP path to the remote system. Zenmap's Topology tab displays a __________ that shows the relative size and connection type of all discovered IP hosts. - answerbubble chart Ethical hackers must obtain __________ prior to performing a scanning and vulnerability assessment on a live production network. - answerwritten authorization from the client During the vulnerability assessment, any known vulnerabilities or bugs will be flagged and identified by: - answerNessus Which of the following work together to complete the scanning and vulnerability assessment phase of the ethical hacking process? - answerNmap (Zenmap) and Nessus A successful __________ assessment of a network is all about using the right tools to map the network and identify any vulnerabilities that can be the opening for a future attack. - answerscanning and vulnera

Show more Read less
Institution
CSIT
Course
CSIT









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CSIT
Course
CSIT

Document information

Uploaded on
February 13, 2024
Number of pages
15
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TheStar Florida State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
590
Member since
1 year
Number of followers
178
Documents
23589
Last sold
4 days ago
Stuvia Prodigy

Tested, Verified and Updated Study Materials with 100% Guaranteed Success.

3.8

119 reviews

5
56
4
21
3
21
2
4
1
17

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions