CMIT 321 Week 2 Quiz
Question 1 points
The Management Information Base (MIB) includes which of the
following? (choose all that apply)
Scalar and Tabular Objects
OID Numbers
File and Folder Permissions
User Accounts
Question 0/5
2 points
NetBIOS uses which of the following? (choose all that apply)
UDP Port 138
TCP Port 139
UDP Port 137
TCP Port 22
Question 0/5
3 points
Which of the following are SNMP enumeration tools? (choose all that
apply)
Getif
Nmap
Spiceworks
Softperfect
,Question 0/5
4 points
Insider threats can be prevented by
Rotation of duties
Controlled access
Separation of duties
Logging and auditing
All of the above
None of the above
Question 0/5
5 points
Which of the following Management Information Base (MIB) files
contains information about server services?
LNMIB2.MIB
HOSTMIB.MIB
WINS.MIB
DCHP.MIB
Question 0/5
6 points
SMTP uses which port?
UDP Port 993
UDP Port 161
TCP Port 110
, TCP Port 25
Question 0/5
7 points
What are three ways that an attacker can perform human-based
social engineering?
Posing a s Technical Support
Posing as someone important
Posing as an legitimate end user
Deploying Malware
Question 0/5
8 points
Which of the following Windows Utilities can be utilized to enumerate
hosts?
net stop
net start
net Use
net view
Question 0/5
9 points
NetBIOS Name Resolution is supported in IPv6:
True
False
, Question 0/5
10 points
Which of the following are Network Time Protocol (NTP) enumeration
commands? (choose all that apply)
Net time
ntpdate
ntptrace
ntpq
Question 0/5
11 points
Attackers cover their tracks online by using tools like
Clearlogs.exe
Meterperter
MRU-Blaster
All of the above
A and B only
Question 0/5
12 points
Sending an email with a link to a malicious website is called ?
Hacking
Phishing
Impersonation
Enumeration
Question 1 points
The Management Information Base (MIB) includes which of the
following? (choose all that apply)
Scalar and Tabular Objects
OID Numbers
File and Folder Permissions
User Accounts
Question 0/5
2 points
NetBIOS uses which of the following? (choose all that apply)
UDP Port 138
TCP Port 139
UDP Port 137
TCP Port 22
Question 0/5
3 points
Which of the following are SNMP enumeration tools? (choose all that
apply)
Getif
Nmap
Spiceworks
Softperfect
,Question 0/5
4 points
Insider threats can be prevented by
Rotation of duties
Controlled access
Separation of duties
Logging and auditing
All of the above
None of the above
Question 0/5
5 points
Which of the following Management Information Base (MIB) files
contains information about server services?
LNMIB2.MIB
HOSTMIB.MIB
WINS.MIB
DCHP.MIB
Question 0/5
6 points
SMTP uses which port?
UDP Port 993
UDP Port 161
TCP Port 110
, TCP Port 25
Question 0/5
7 points
What are three ways that an attacker can perform human-based
social engineering?
Posing a s Technical Support
Posing as someone important
Posing as an legitimate end user
Deploying Malware
Question 0/5
8 points
Which of the following Windows Utilities can be utilized to enumerate
hosts?
net stop
net start
net Use
net view
Question 0/5
9 points
NetBIOS Name Resolution is supported in IPv6:
True
False
, Question 0/5
10 points
Which of the following are Network Time Protocol (NTP) enumeration
commands? (choose all that apply)
Net time
ntpdate
ntptrace
ntpq
Question 0/5
11 points
Attackers cover their tracks online by using tools like
Clearlogs.exe
Meterperter
MRU-Blaster
All of the above
A and B only
Question 0/5
12 points
Sending an email with a link to a malicious website is called ?
Hacking
Phishing
Impersonation
Enumeration