DeVry University, Keller Graduate School of Management SEC 311/ SEC311 Week 8 Final Exam Fall 2021/2022 (all answered correctly)
SEC 311Week 8 Final Exam. (TCO 3) Published well-known ports range from Group of answer choices 1024– 49151. 1– 1024. 49152– 65535. 0– 1023. (TCO 1) You have become concerned that one of your workstations might be infected with a malicious program. Which of the following Netstat switches would be the best to use? Group of answer choices netstat –an netstat -r netstat -p netstat –s (TCO 2) You would like to find out more information about a website from a company based in France. Which of the following is a good starting point? Group of answer choices AfriNIC ARIN APNIC RIPE (TCO 4) . While preparing to hack a targeted network, you would like to check the configuration of the DNS server. What port should you look for to attempt a zone transfer? Group of answer choices 53 UDP 79 TCP 53 TCP 79 UDP (TCO 5) The ability to capture a stream of data packets and then insert them back into the network as a valid message is known as which of the following? Group of answer choices Eavesdropping Message modification Brute-force attack Packet replay (TCO 6) This DoS tool is characterized by the fact that it sends packets with the same source and destination address. What is it called? Group of answer choices Ping of death Smurf Land Targa (TCO 7) You are trying to establish a null session to a target system. Which is the correct syntax? Group of answer choices net use IP_address IPC$ “” /u:”” net use //IP_address/IPC$ “” u:”” net use IP_address IPC$ * /u:”” net use IP_address IPC$ * u:”” (TCO 8) This type of virus scanning examines computer files for irregular or unusual instructions. Which of the following matches that description? Group of answer choices Integrity checking Heuristic scanning Activity blocker Signature scanning (TCO 5) Which of the following is an AirPcap adaptor used with? Group of answer choices NetStumbler Aircrack John the Ripper Wireshark (TCO 6) Your company has become serious about security and has changed the rules. It will no longer let you control access to company information and resources. Now, your level of access is based on your clearance level and need to know. Which of the following systems have been implemented? Group of answer choices Discretionary access control Mandatory access control Role-based access control Rule-based access control (TCO 1) Why are grey hat hackers dangerous? Explain. (TCOs 2 and 3) State the seven steps in the information gathering process before an attack. (TCO 3, 4, 5) Explain how usernames and passwords are stored in Linux. (TCOs 3, 4, and 5) Explain how wrappers work. (TCOs 3, 4, and 5) Explain the purpose of SMAC. (TCOs 5 and 6) Explain SQL injection. (TCOs 5, 6, and 7) What is FaceNiff? (TCO 6) What is stateful inspection? (TCO 8) Explain signature scanning. (TCO 5) Explain steganography.
Written for
Document information
- Uploaded on
- December 7, 2021
- Number of pages
- 6
- Written in
- 2021/2022
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- sec 311 ethical hacking
- sec311 week 8 final exam
-
sec 311week 8 final exam
-
published well known ports range from
-
you have become concerned that one of your workstations might be infected with a malici
Also available in package deal