CSIT 161- MIDTERM EXAM QUESTIONS & ANSWERS 100% VERIFIED CORRECT!!
To be effective, hackers and cybercriminals: - ANSWER-only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. - ANSWER-only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. Which of the following is used to perform a scan of the network and create a network topology chart? - ANSWER-Zemap Which of the following is a protocol analyzer tool (sometimes called a "packet sniffer") that is used to capture IP traffic from a variety of sources? - ANSWER-Wireshark Which of the following allows Wireshark to capture packets destined to any host on the same subnet or virtual LAN (VLAN)? - ANSWER-Promiscuous mode Which of the following allows analysts to view and analyze network packet traces? - ANSWER-NetWitness Investigator Which of the following performs remote scans and audits of Unix, Windows, and network infrastructures and can perform a network discovery of devices, operating systems, applications, databases, and services running on those devices? - ANSWER-Nessus Which of the following is used to transfer files using the File Transfer Protocol (FTP) to and from the vWorkstation? - ANSWER-FileZilla Most Linux interactions take place: - ANSWER-from the command line. Within the virtual environment, a Remote Desktop Connection and PuTTY are the two ways to: - ANSWER-connect to the Linux terminal. Which of the following does PuTTY use to securely access a remote computer? - ANSWER-The Secure Shell (SSH) protocol Once connected, PuTTY
Written for
- Institution
- CSIT 161
- Course
- CSIT 161
Document information
- Uploaded on
- November 5, 2023
- Number of pages
- 16
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
csit 161 midterm exam questions answe
-
csit 161 midterm exam stuvia
-
to be effective hackers and cybercriminals ans
-
only need to know one vulnerability or how to use
Also available in package deal