100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CSIT 161 MIDTERM UPDATED Actual Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
21
Grade
A+
Uploaded on
21-09-2024
Written in
2024/2025

CSIT 161 MIDTERM UPDATED Actual Exam Questions and CORRECT Answers To be effective, hackers and cybercriminals: - CORRECT ANSWER- only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. - CORRECT ANSWER- only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability

Show more Read less
Institution
CSIT 161
Course
CSIT 161










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CSIT 161
Course
CSIT 161

Document information

Uploaded on
September 21, 2024
Number of pages
21
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

CSIT 161 MIDTERM UPDATED Actual
Exam Questions and CORRECT Answers
To be effective, hackers and cybercriminals: - CORRECT ANSWER✔✔- only need to know
one vulnerability, or how to use one automated tool that attacks that vulnerability.


only need to know one vulnerability, or how to use one automated tool that attacks that
vulnerability. - CORRECT ANSWER✔✔- only need to know one vulnerability, or how to
use one automated tool that attacks that vulnerability.


Which of the following is used to perform a scan of the network and create a network
topology chart? - CORRECT ANSWER✔✔- Zemap


Which of the following is a protocol analyzer tool (sometimes called a "packet sniffer") that
is used to capture IP traffic from a variety of sources? - CORRECT ANSWER✔✔-
Wireshark


Which of the following allows Wireshark to capture packets destined to any host on the same
subnet or virtual LAN (VLAN)? - CORRECT ANSWER✔✔- Promiscuous mode


Which of the following allows analysts to view and analyze network packet traces? -
CORRECT ANSWER✔✔- NetWitness Investigator


Which of the following performs remote scans and audits of Unix, Windows, and network
infrastructures and can perform a network discovery of devices, operating systems,
applications, databases, and services running on those devices? - CORRECT ANSWER✔✔-
Nessus


Which of the following is used to transfer files using the File Transfer Protocol (FTP) to and
from the vWorkstation? - CORRECT ANSWER✔✔- FileZilla



Most Linux interactions take place: - CORRECT ANSWER✔✔- from the command line.

,Within the virtual environment, a Remote Desktop Connection and PuTTY are the two ways
to: - CORRECT ANSWER✔✔- connect to the Linux terminal.


Which of the following does PuTTY use to securely access a remote computer? - CORRECT
ANSWER✔✔- The Secure Shell (SSH) protocol



Once connected, PuTTY displays a terminal shell: - CORRECT ANSWER✔✔- in which
Linux commands can be executed.


Which of the following is a key function in the Cisco IOS (Internetwork Operating System)?
- CORRECT ANSWER✔✔- The show command


The availability of commands in the Cisco IOS (Internetwork Operating System) is based on:
- CORRECT ANSWER✔✔- the privilege level of the user.


Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the ARP Ping
Scan was to: - CORRECT ANSWER✔✔- discover how many hosts are alive.


Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the TCP Port
Scan was to: - CORRECT ANSWER✔✔- identify open TCP ports.


Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the Service
Scan was to: - CORRECT ANSWER✔✔- look for fingerprints of known services by testing
responses to certain types of packets.


Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the
Traceroute was to: - CORRECT ANSWER✔✔- discover the IP path to the remote system.


Zenmap's Topology tab displays a __________ that shows the relative size and connection
type of all discovered IP hosts. - CORRECT ANSWER✔✔- bubble chart


Ethical hackers must obtain __________ prior to performing a scanning and vulnerability
assessment on a live production network. - CORRECT ANSWER✔✔- written authorization
from the client

, During the vulnerability assessment, any known vulnerabilities or bugs will be flagged and
identified by: - CORRECT ANSWER✔✔- Nessus


Which of the following work together to complete the scanning and vulnerability assessment
phase of the ethical hacking process? - CORRECT ANSWER✔✔- Nmap (Zenmap) and
Nessus


A successful __________ assessment of a network is all about using the right tools to map the
network and identify any vulnerabilities that can be the opening for a future attack. -
CORRECT ANSWER✔✔- scanning and vulnerability


Which of the following is a graphical interface for Nmap that is typically used during the
scanning phase of the ethical hacking process? - CORRECT ANSWER✔✔- Zenmap


Which of the following is a port scanning tool that can quickly identify hosts and detect what
operating system and services are running on them? - CORRECT ANSWER✔✔- Zenmap


The __________ confirms that the machine is available, but can't identify ports, operating
systems, or services. - CORRECT ANSWER✔✔- Ping scan


The raw data from the Nmap Output tab is grouped into a more readable form: - CORRECT
ANSWER✔✔- on the Ports/Hosts and Host Details tab for each host in the scan.


The __________ is a form of TCP scanning that is less intrusive on the target host. -
CORRECT ANSWER✔✔- SYN scan


The __________ can identify the services using the TCP protocol, but not the versions of
these applications. - CORRECT ANSWER✔✔- SYN scan


Within Zenmap, which command is used to begin the OS fingerprinting scan and determine
which operating systems are running on the network hosts? - CORRECT ANSWER✔✔- The
-O command

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1076
Member since
1 year
Number of followers
102
Documents
68972
Last sold
1 day ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

171 reviews

5
73
4
30
3
46
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions