100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CMIT 321 Week 2 Quiz | University of Maryland, University College

Rating
-
Sold
-
Pages
34
Grade
A
Uploaded on
19-05-2025
Written in
2024/2025

CMIT 321 Week 2 Quiz | University of Maryland, University College












Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
May 19, 2025
Number of pages
34
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CMIT 321 Week 2 Quiz

Question 1 points
The Management Information Base (MIB) includes which of the
following? (choose all that apply)

Scalar and Tabular Objects


OID Numbers


File and Folder Permissions


User Accounts

Question 0/5
2 points
NetBIOS uses which of the following? (choose all that apply)


UDP Port 138


TCP Port 139


UDP Port 137


TCP Port 22

Question 0/5
3 points

Which of the following are SNMP enumeration tools? (choose all that
apply)

Getif


Nmap


Spiceworks


Softperfect

,Question 0/5
4 points
Insider threats can be prevented by

Rotation of duties


Controlled access


Separation of duties


Logging and auditing


All of the above


None of the above

Question 0/5
5 points

Which of the following Management Information Base (MIB) files
contains information about server services?

LNMIB2.MIB


HOSTMIB.MIB


WINS.MIB


DCHP.MIB

Question 0/5
6 points
SMTP uses which port?

UDP Port 993


UDP Port 161


TCP Port 110

, TCP Port 25

Question 0/5
7 points

What are three ways that an attacker can perform human-based
social engineering?

Posing a s Technical Support


Posing as someone important


Posing as an legitimate end user


Deploying Malware

Question 0/5
8 points

Which of the following Windows Utilities can be utilized to enumerate
hosts?

net stop


net start


net Use


net view

Question 0/5
9 points
NetBIOS Name Resolution is supported in IPv6:

True


False

, Question 0/5
10 points

Which of the following are Network Time Protocol (NTP) enumeration
commands? (choose all that apply)

Net time


ntpdate


ntptrace


ntpq

Question 0/5
11 points
Attackers cover their tracks online by using tools like

Clearlogs.exe


Meterperter


MRU-Blaster


All of the above


A and B only

Question 0/5
12 points

Sending an email with a link to a malicious website is called ?

Hacking


Phishing


Impersonation


Enumeration

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NurseHenny EXAMS
View profile
Follow You need to be logged in order to follow users or courses
Sold
149
Member since
2 year
Number of followers
71
Documents
1887
Last sold
2 weeks ago
AFFORDABLE EXAMS AND STUDY GUIDES

On this page you will find verified, well elaborated exams and packages, offered by seller NURSE HENNY.

4.3

27 reviews

5
19
4
4
3
0
2
1
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions