CSIT 161- MIDTERM EXAM QUESTIONS AND ANSWERS 100% VERIFIED
CSIT 161- MIDTERM EXAM QUESTIONS AND ANSWERS 100% VERIFIED To be effective, hackers and cybercriminals: - answeronly need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. - answeronly need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. Which of the following is used to perform a scan of the network and create a network topology chart? - answerZemap Which of the following is a protocol analyzer tool (sometimes called a "packet sniffer") that is used to capture IP traffic from a variety of sources? - answerWireshark Which of the following allows Wireshark to capture packets destined to any host on the same subnet or virtual LAN (VLAN)? - answerPromiscuous mode Which of the following allows analysts to view and analyze network packet traces? - answerNetWitness Investigator Which of the following performs remote scans and audits of Unix, Windows, and network infrastructures and can perform a network discovery of devices, operating systems, applications, databases, and services running on those devices? - answerNessus Which of the following is used to transfer files using the File Transfer Protocol (FTP) to and from the vWorkstation? - answerFileZilla Most Linux interactions take place: - answerfrom the command line. Within the virtual environment, a Remote Desktop Connection and PuTTY are the two ways to: - answerconnect to the Linux terminal. Which of the following does PuTTY use to securely access a remote computer? - answerThe Secure Shell (SSH) protocol Once connected, PuTTY displays a terminal shell: - answerin which Linux commands can be executed. Which of the following is a key function in the Cisco IOS (Internetwork Operating System)? - answerThe show command The availability of commands in the Cisco IOS (Internetwork Operating System) is based on: - answerthe privilege level of the user. Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the ARP Ping Scan was to: - answerdiscover how many hosts are alive. Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the TCP Port Scan was to: - answeridentify open TCP ports. Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the Service Scan was to: - answerlook for fingerprints of known services by testing responses to certain types of packets. Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the Traceroute was to: - answerdiscover the IP path to the remote system. Zenmap's Topology tab displays a __________ that shows the relative size and connection type of all discovered IP hosts. - answerbubble chart Ethical hackers must obtain __________ prior to performing a scanning and vulnerability assessment on a live production network. - answerwritten authorization from the client During the vulnerability assessment, any known vulnerabilities or bugs will be flagged and identified by: - answerNessus Which of the following work together to complete the scanning and vulnerability assessment phase of the ethical hacking process? - answerNmap (Zenmap) and Nessus A successful __________ assessment of a network is all about using the right tools to map the network and identify any vulnerabilities that can be the opening for a future attack. - answerscanning and vulnera
Written for
- Institution
- CSIT
- Course
- CSIT
Document information
- Uploaded on
- February 13, 2024
- Number of pages
- 15
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
csit 161 midterm exam questions and answers 100
Also available in package deal