100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CMIT 321 Week 4 Quiz | University of Maryland, University College

Rating
-
Sold
-
Pages
40
Grade
A
Uploaded on
19-05-2025
Written in
2024/2025

CMIT 321 Week 4 Quiz | University of Maryland, University College












Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
May 19, 2025
Number of pages
40
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CMIT 321 Week 4 Quiz

points
This can be used to identify DoS Attacks:

SHA-1


Cusum


MD5


SHA-256

Question 0/5
2 points

Which of the following are password cracking techniques? (choose all
that apply)

Dictionary Attacks


Guessing


Brute Force Attacks


Hybrid Attack

Question 0/5
3 points
Which of the following are true when referring to the term
phlashing? (choose all that apply)


A type of permanent Denial of Service


Something that can cause a device to render hardware inoperable


Can be known as bricking


An email attack in which the user is enticed to click on links

,Question 0/5
4 points
BlackShades Net can best be described as a:

DDoS Tool


Bot


Wrapper


RAT

Question 0/5
5 points

It was publicized that BlackShades Net was used as an attack tool
against:

Sony Pictures


Target


RSA


Syrian Political Activists

Question 0/5
6 points

During this type of an attack, the attacker takes over a DNS server
and changes the DNS settings so that all the requests coming to the
target web server are directed to the attacker’s own malicious
servers.

Session Hijacking


Denial of DNS (DoD)


Web Server Hijacking

, DNS Hijacking

Question 0/5
7 points

What three things happen when a distributed reflective denial of
service attack (DRDoS) is used?

Traffic will be directed to secondary victims


The source Address will be spoofed


Traffic will be directed to intermediate hosts


Traffic to the secondary hosts will originate from the intermediate hosts

Question 0/5
8 points
Which of following items does a DNS Amplification Attack take
advantage of?

DNS Recursive Method


DNS Reverse Lookup


Host file


DNS zone transfer

Question 0/5
9 points

What does Permutation Scanning utilize to find new machines?

Looking for new vulnerable machines on the local subnet


Using a pseudorandom permutation list


Using information from infected machines

, Collecting a list of possibly vulnerable machines

Question 0/5
10 points

To crash a webserver, what should an attacker target? (Select all that
apply)

Database space


Server Memory


CPU


Network Bandwidth

Question 0/5
11 points

Which DOS tool(s) work(s) from a mobile platform? (check all that
apply)

LOIC


AnDOSid


HULK


DOSSIM

Question 0/5
12 points

Egress filtering includes which of the following (choose all that apply):

Scanning packet headers of IP packets leaving the network


Not allowing unauthorized packets to leave the network


Not allowing unauthorized packets entering the network

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NurseHenny EXAMS
View profile
Follow You need to be logged in order to follow users or courses
Sold
149
Member since
2 year
Number of followers
71
Documents
1887
Last sold
2 weeks ago
AFFORDABLE EXAMS AND STUDY GUIDES

On this page you will find verified, well elaborated exams and packages, offered by seller NURSE HENNY.

4.3

27 reviews

5
19
4
4
3
0
2
1
1
3

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions