100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CMIT 321 Final Exam | Updated 2025, Complete Solutions

Rating
-
Sold
-
Pages
28
Grade
A
Uploaded on
19-05-2025
Written in
2024/2025

CMIT 321 Final Exam | Updated 2025, Complete Solutions If you want to mask (or spoof) your IP address, what type of scan should you use? IDLE, IPID scan ACK flag probe scan UDP scan Stealth scan A packet filtering firewall works at which of these layers of the OSI model? Application layer Network Layer Physical Layer Session Layer Which cryptographic attack refers to extraction of cryptographic secrets from a person by coercion or torture? Rubber hose attack Ciphertext-only attack Chosen-ciphertext attack Adaptive chose-plaintext attack Which of the following assessment types focus on server and client interaction? Passive assessment Active assessment Wireless network assessment Application assessment The psexec utility can be used to perform which of the following actions? List process Launch an interactive command session Get system information show open files Android includes media support for which of the following? AAC ARM H.323 H.264 Which of the following are tools used for footprinting? Maltego Recon-NT Aircrank-ng FOCA WPA enhances WEP by changing temporal keys every . 1000 packets 5000 packets 10000 packets 15000 packets The process of sending an illegitimate email with a malicious link or file in order to attempt to gain access to a company’s network infrastructure is known as: Vishing Phishing Impersonation Passive reconnaissance Enumeration The IEEE 802.16 standard is known as: Wi-Fi Ethernet WiMAX Bluetooth A DNS zone transfer: Uses TCP port 53 Uses UDP port 53 Provides FQDN information about an organization Is possible with Microsoft DNS servers but not BIND servers Which of the following IP spoofing detection techniques succeeds only when the attacker is in a different subnet? TCP flow control method IP identification number technique Direct TTL probes techniques UDP flow control method According to the text, session hijacking is successful due to? Weak session IDs TCP/IP protocol Insecure handling of session IDs Weak passwords What is the first step in the vulnerability management life cycle? Risk assessment Remediation Monitoring Creating a baseline Meterpreter allows the attacks to move laterally by performing which of the following steps: Hashdump Getsystem Route add Load mimkatz The security account manager (SAM) database contains: Users’ passwords Users’ passwords in Unicode Users’ passwords in hexadecimal (0-F) Hashes of users’ passwords Which of the following applies to an SSID? Is part of the frame header Can be up to 32 characters Is case sensitive Will be encrypted in WEP or WPA/WPA2 is used Of the following options, which are virtualization vendors? VMware vSphere Microsoft VMware vCloud Suite Virtual Box Which two tools are used for password cracking? Kali Hashcat John the Ripper Nessus Which of the following techniques practiced by an attacker exploits human behavior to make attacks? Denial of service Social engineering SQL injection Buffer overflow A lack of vetting of apps can lead to which two of the following results? Malicious apps Rooting Jail-breaking Fake apps Which protocols will be encrypted in a packet capture? POP and SMTP TELNET and FTP NTP and SNMP SSH and SSL An attacker uses the following to hide data transferred over the wire: Covert channel TCP Port 995 UDP port 123 One-time pad Which of the following steganography techniques hides information in significant parts of the cover image such as cropping, compression, and some other images processing areas? Domain distortion techniques Spread spectrum techniques Transform domain techniques Cover generation techniques What is the size of the WEP initialization vector? 8-bit 16-bit 24-bit 32-bit Your supervisor is concerned about the use of port 139 in your environment. What measure do you recommend taking to deal with the security risk? Use TCP wrappers Turn on the Windows Firewall Disable file and print sharing Block ICMP so the host cannot be detected Identify the attack which forces an unsuspecting user’s browser to send malicious requests the user did not intend. LDAP injection attack Cross-site request forgery (CSRF) Cross-site scripting (XSS) SQL injection attack Which of the following scans only works if the operating system’s TCP/IP implementation is based on RFC 793? FTP bounce scan Maintaining access NULL scan TCP connect scan IDLE scan IDLE scan Which version of the Linux kernel does Android rely upon? 2.6 3.0 3.10 3.6 Which of the following are mobile network-based attacks? Man-in-the-middle attacks Packet sniffing Rouge access points SSL strip How do you filter for FTP traffic in Wireshark? T == 3389 T == 21 U == 69 T == 25 U == 123 How do you filter for RDP traffic in Wireshark? T == 3389 T == 21 U == 69 T == 25 U == 123 The following is a tool that can be used to harvest credentials from a Windows Machine: Mimikatz LOIC WannaCry Hping Scanning the internal network with Nmap is an example of which of the following assessment types? Passive assessment Active assessment Wireless network assessment Application assessment According to your text, examples of malware include which of the following? Ransomware Botnet Crypter metasploit Which modes on Bluetooth devices are at greater risk? Open Promiscuous Discovery Monitor According to the text, among all smartphones, which is most likely to be hacked? Android Blackberry Windows Phone iPhone The tool hping can be used for: Denial of service Social engineering Phishing DNS lookups The following allows an attacker on a switch to see all traffic, as if it were a hub: SPAN port ARP table BRIDGING mode NBTSTAT The following tool extracts documents of an organization from the internet: Cain Metagoofil Netcraft Nftables Which is the best location to place keyloggers? Operating system and UPS UPS and keyboard Monitor and keyboard software Keyboard hardware and the operating system Microsoft Security Baseline Analyzer will identify: Security issues Possible vulnerabilities STIGS Banner messages All of the statements below are characteristics of Wireshark except: Packet sniffer Protocol analyzer Open source Runs on various platforms Offered for 48-bit and 64-bit platforms Sophos mobile security features include Spam protection Loss and thef t protection Antivirus antimalware Privacy protection and security The act of enumerating hosts is: Considered active scanning Considered passive scanning A passive information gathering technique An active information gathering technique The monitoring phase of the vulnerability management life cycle allows for: Identifying critical assets Identifying bugs and misconfigurations Using intrusion detection systems and intrusion prevention systems Security team checks Reducing obvious and glaring vulnerabilities The following act will help a company become compliant with regulations and standards: Ping scanning Enumeration Vulnerability scanning Replacing Windows systems with Linux Which of the following are types of database attacks? SQL injection Privilege escalation OS command execution Data dumping Which of the following techniques is used to simulate an attack from someone who is unfamiliar with the system? Gray box pen testing Announced pen testing Black box pen testing Maintaining access White box pen testing What were the two dominant attack strategies identified in Symantec’s Threat Report? Advanced persistent threats Focused attack Broader strokes Distributed denial of service App Stores include: Google play ITunes Store Blackberry App World Fanddago Which of the following is one of the most reliable forms of TCP scanning? XMAS scan Connect scan Inverse TCP flag scan Half-open scan The following tool is known for its ability to comprehensively scan websites for security-related issues: Aircrack-ng Wget Nikto John the Ripper Which of the following Management Information Base (MIB) files contains information about server services? LNMIB2.MIB HOSTMIB.MIB WINS.MIB DCHP.MIB This type of database attack does not return error messages from the system. Non-error based Blind injection Stored procedure Tautology-based According to the text, which of the following is a form of a MITM attack? Checksum evasion Packet sniffing API hooking SSL Strip Which of the following are risks of rooting? Malware Voiding the warranty Bricking Poor performance The SMTP Protocol provides three built-in commands, including which of the following? FINGER EXPN RCPT TO VRFY Which of the following are disadvantages of signature detection? False alerts Administrative alerts False positives Signature detection Port 25 and Port 110 are commonly used for: DNS zone transfer Network Time Protocol Network News Transfer Protocol Mail Reasons to scan networks include: Stealing usernames Stealing passwords Identifying hosts Determining open ports Activities like dumpster diving, reading articles related about a company, and searching job postings on an online website fall under what category? Active reconnaissance Passive reconnaissance Active information gathering Passive information gathering Signs of intrusions include which of the following? System crashes Strange processes Slow performance Missing logs What are some of the limitations of cloud computing services? Contracts Storage limits Control limits Inflexible The following protocols often use clear text: SSH, TELNET, TFTP, HTTP SSH, TELNET, FTP, HTTP SSH, FTP, TFTP, HTTP FTP, TELNET, TFTP, HTTP

Show more Read less










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
May 19, 2025
Number of pages
28
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CMIT 321 Final Exam


If you want to mask (or spoof) your IP address, what type of scan should you use?

IDLE, IPID scan

ACK flag probe scan

UDP scan

Stealth scan



A packet filtering firewall works at which of these layers of the OSI model?

Application layer

Network Layer

Physical Layer

Session Layer



Which cryptographic attack refers to extraction of cryptographic secrets from a person by coercion or
torture?

Rubber hose attack

Ciphertext-only attack

Chosen-ciphertext attack

Adaptive chose-plaintext attack



Which of the following assessment types focus on server and client interaction?

Passive assessment

Active assessment

Wireless network assessment

Application assessment



The psexec utility can be used to perform which of the following actions?

List process

Launch an interactive command session

Get system information

,show open files



Android includes media support for which of the following?

AAC

ARM

H.323

H.264



Which of the following are tools used for footprinting?

Maltego

Recon-NT

Aircrank-ng

FOCA



WPA enhances WEP by changing temporal keys every .

1000 packets

5000 packets

10000 packets

15000 packets



The process of sending an illegitimate email with a malicious link or file in order to attempt to gain
access to a company’s network infrastructure is known as:

Vishing

Phishing

Impersonation

Passive reconnaissance

Enumeration



The IEEE 802.16 standard is known as:

, Wi-Fi

Ethernet

WiMAX

Bluetooth



A DNS zone transfer:

Uses TCP port 53

Uses UDP port 53

Provides FQDN information about an organization

Is possible with Microsoft DNS servers but not BIND servers



Which of the following IP spoofing detection techniques succeeds only when the attacker is in a different
subnet?

TCP flow control method

IP identification number technique

Direct TTL probes techniques

UDP flow control method



According to the text, session hijacking is successful due to?

Weak session IDs

TCP/IP protocol

Insecure handling of session IDs

Weak passwords



What is the first step in the vulnerability management life cycle?

Risk assessment

Remediation

Monitoring

Creating a baseline

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NurseHenny EXAMS
View profile
Follow You need to be logged in order to follow users or courses
Sold
149
Member since
2 year
Number of followers
71
Documents
1887
Last sold
3 weeks ago
AFFORDABLE EXAMS AND STUDY GUIDES

On this page you will find verified, well elaborated exams and packages, offered by seller NURSE HENNY.

4.3

27 reviews

5
19
4
4
3
0
2
1
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions