CMIT 321 Week 3 Quiz
points
A spoofing attack includes (choose all that apply):
takes over of an HTTP session
pretends to be another user
uses stolen credentials
relies on the legitimate user
Question 0/5
2 points
You can filter for an IP Address in Wireshark by typing:
IP.Address ==
IP ==
IP.ADDR ==
IP =
Question 0/5
3 points
MAC spoofing is also referred to as:
MAC intercept
MAC hijacking
MAC duplicating
MAC attack
Question 0/5
4 points
,The characteristics of these Trojans include the ability to open and
close the CD-ROM tray (check all that apply):
SubSeven
Poison Ivy
Dark Comet
NetBus
Question 0/5
5 points
Your Supervisor is concerned about the use of port 139 in your
environment. What measure do you recommend?
Disable File and Print Sharing
Use TCP Wrappers
Turn on the Windows Firewall
Block ICMP so the host cannot be detected
Question 0/5
6 points
When conducting a Sniffing Pen Testing we follow a certain order.
Select the correct order from the list below.
Rogue Server, DHCP Starvation, Mac Spoofing, ARP Poisoning
MAC Spoofing, Rogue Server, ARP Poisoning, DHCP Starvation
DHCP Starvation, Rogue Server, ARP Poisoning, MAC Spoofing
DHCP Starvation, Rogue Server, MAC Spoofing, ARP Poisoning
Question 0/5
,7 points
A man in the middle attack is an example of what type of attack?
stateful
passive
stateless
active
Question 0/5
8 points
Which of the following uses direct client to client (DCC)?
Internet Browser
Internet Relay Chat
Email Clients such as Outlook Express
File Sharing with Mapped Drives
Question 0/5
9 points
Wireshark is a sniffing tool utilized in many organizations today. What
are the benefits of using it? Select all that apply.
Capture live network traffic
TCPdump is embedded into the program
Set of filters you can customize
I love you virus did not affect systems
Question 0/5
10 points
, An attacker sees that Sara is on the internet every day. The attacker is
able to infect Sara’s machine with a Trojan and change her DNS IP
address. This is DNS spoofing.
True
False
Question 0/5
11 points
Select the anti-virus tools from the list below.
Kaspersky Anti-Virus
McAfee AntiVirus
BitDefender
BlueJay
ESET Smart Security
Redbird
Question 0/5
12 points
This will help prevent DNS spoofing attacks (choose all that apply):
SSL
secondary zones
primary zones
SSH
Question 0/5
13 points
When going through the 3-way handshake put the following in
sequence:
points
A spoofing attack includes (choose all that apply):
takes over of an HTTP session
pretends to be another user
uses stolen credentials
relies on the legitimate user
Question 0/5
2 points
You can filter for an IP Address in Wireshark by typing:
IP.Address ==
IP ==
IP.ADDR ==
IP =
Question 0/5
3 points
MAC spoofing is also referred to as:
MAC intercept
MAC hijacking
MAC duplicating
MAC attack
Question 0/5
4 points
,The characteristics of these Trojans include the ability to open and
close the CD-ROM tray (check all that apply):
SubSeven
Poison Ivy
Dark Comet
NetBus
Question 0/5
5 points
Your Supervisor is concerned about the use of port 139 in your
environment. What measure do you recommend?
Disable File and Print Sharing
Use TCP Wrappers
Turn on the Windows Firewall
Block ICMP so the host cannot be detected
Question 0/5
6 points
When conducting a Sniffing Pen Testing we follow a certain order.
Select the correct order from the list below.
Rogue Server, DHCP Starvation, Mac Spoofing, ARP Poisoning
MAC Spoofing, Rogue Server, ARP Poisoning, DHCP Starvation
DHCP Starvation, Rogue Server, ARP Poisoning, MAC Spoofing
DHCP Starvation, Rogue Server, MAC Spoofing, ARP Poisoning
Question 0/5
,7 points
A man in the middle attack is an example of what type of attack?
stateful
passive
stateless
active
Question 0/5
8 points
Which of the following uses direct client to client (DCC)?
Internet Browser
Internet Relay Chat
Email Clients such as Outlook Express
File Sharing with Mapped Drives
Question 0/5
9 points
Wireshark is a sniffing tool utilized in many organizations today. What
are the benefits of using it? Select all that apply.
Capture live network traffic
TCPdump is embedded into the program
Set of filters you can customize
I love you virus did not affect systems
Question 0/5
10 points
, An attacker sees that Sara is on the internet every day. The attacker is
able to infect Sara’s machine with a Trojan and change her DNS IP
address. This is DNS spoofing.
True
False
Question 0/5
11 points
Select the anti-virus tools from the list below.
Kaspersky Anti-Virus
McAfee AntiVirus
BitDefender
BlueJay
ESET Smart Security
Redbird
Question 0/5
12 points
This will help prevent DNS spoofing attacks (choose all that apply):
SSL
secondary zones
primary zones
SSH
Question 0/5
13 points
When going through the 3-way handshake put the following in
sequence: