CIT 184 Final Actual EXAM Newest 2025/2026
With Complete Questions And Correct Answers
|Already Graded A+||Brand New Version!|
Which of the following statements is NOT true regarding oversharing of
company activities? - ANSWER-Oversharing of company activities
typically is conducted by disgruntled employees who are intentionally
trying to harm their company.
Which protocol runs on IPv6 networks and provides services similar to
Address Resolution Protocol (ARP)? - ANSWER-Neighbor Discovery
Protocol (NDP)
An attacker can deprive the system owner of the ability to detect the
activities that have been carried out by ________. - ANSWER-disabling
auditing
Which of the following is NOT considered a sensible guideline to follow
when using social networking sites? - ANSWER-Set up an email
account that uses your real name.
,2|Page
Countermeasures that can be used to defeat sniffing include all of the
following except ________. - ANSWER-Media Access Control (MAC)
flooding
Dhruv is conducting network traffic analysis and is examining a
suspicious network packet using the Wireshark protocol analyzer. He
would like to examine the source Internet Protocol (IP) address of the
packet. Where in the packet should he look for this information? -
ANSWER-IP header
Kyle is responsible for sanitizing hard drives that contain sensitive
information before they may be reused. Which of the following provides
the strongest level of protection? - ANSWER-Degaussing
Darcy would like to gather information from network devices as she
performs enumeration. Which tool exploits a common network
management protocol to gather information? - ANSWER-SNMPwalk
Which of the following is NOT true of lighting? - ANSWER-It is one of
the highest-cost security controls that can be implemented by an
organization.
Shoulder surfing, keyboard sniffing, and social engineering are
considered ________. - ANSWER-nontechnical password attacks
, 3|Page
Which of the following statements is NOT true regarding passive
sniffing? - ANSWER-Passive sniffing works only when the traffic you
wish to observe and the station that will do the sniffing are in different
collision domains.
When considering closed circuit TV as a security measure, the focal
length must be considered. What is focal length? - ANSWER-The
camera's effectiveness in viewing objects from a horizontal and vertical
view
Which of the following types of authentication is based on a behavioral
or physiological characteristic that is unique to an individual? -
ANSWER-Biometrics
Brenda believes an attacker was using precomputed password hashes to
attempt an attack against her network. What type of attack uses this
approach? - ANSWER-Rainbow table
Which of the following statements is NOT true regarding distributed
denial of service (DDoS) attacks? - ANSWER-The attack is easily
tracked back to its true source.
Which of the following is the first step an attacker must perform to
conduct a successful session hijacking? - ANSWER-Insert
himself/herself between Party A and Party B.