100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIT 480 FINAL EXAM 2025/2026 WITH ACTUAL CORRECT QUESTIONS AND VERIFIED DETAILED ANSWERS |FREQUENTLY TESTED QUESTIONS AND SOLUTIONS |ALREADY GRADED A+|NEWEST|BRAND NEW VERSION !!!|GUARANTEED PASS

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
26-08-2025
Written in
2025/2026

CIT 480 FINAL EXAM 2025/2026 WITH ACTUAL CORRECT QUESTIONS AND VERIFIED DETAILED ANSWERS |FREQUENTLY TESTED QUESTIONS AND SOLUTIONS |ALREADY GRADED A+|NEWEST|BRAND NEW VERSION !!!|GUARANTEED PASS

Institution
CIT 300
Course
CIT 300










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CIT 300
Course
CIT 300

Document information

Uploaded on
August 26, 2025
Number of pages
18
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

CIT 184 FINAL EXAM 2025/2026 WITH
ACTUAL CORRECT QUESTIONS AND
VERIFIED DETAILED ANSWERS
|FREQUENTLY TESTED QUESTIONS AND
SOLUTIONS |ALREADY GRADED
A+|NEWEST|BRAND NEW VERSION
!!!|GUARANTEED PASS

Mateo is testing a new biometric security control. In his testing, 10 authorized users attempted
to access the facility; 9 of them were granted access while 1 was denied access. Ten
unauthorized users also attempted to access the facility but all were turned away. What is the
false rejection rate (FRR) of this control?

10%

Which of the following statements is NOT true regarding social engineering?

Social engineering has different goals and objectives than other types of hacking.

Blocking all ports by default and allowing only those ports that are needed is known as
________.

the deny-all principle

What is a mechanism used to encrypt communication between two parties?

Transport Layer Security (TLS)

Brynn discovered that her company's accounts receivable department is discarding customer
payment checks without shredding them. What is the primary social engineering risk associated
with this activity?

Dumpster diving

Yolanda discovered that a botnet infected several systems on her network. Which of the
following activities is not a likely use of the botnet?
1|Page

,Social engineering

The Windows operating system feature used to give access to certain types of information
across the network is _________.

the NULL session

Tricking or coercing people into revealing information or violating normal security practices is
referred to as ________.

social engineering

Which protocol resolves an Internet Protocol v4 (IPv4) address to an unknown Media Access
Control (MAC) address?

Address Resolution Protocol (ARP)

Which of the following is a disadvantage of alarms?

False alarms tied to the police may result in fines.

Which two protocols are associated with the Host-to-Host Layer of the TCP/IP model?

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)

Vic is analyzing the LinkedIn profiles of his company's employees. He discovers that one of them
is labeled with the keyword LION. What risk does this pose?

Collecting too many connections

Carrie is examining a piece of malware and determines that it was gathering information about
the user of a system. Which of the following terms can she use to describe this malware?

Spyware

A measurement of the percentage of individuals who should have been granted to a system via
biometrics but were not allowed access is called the ________.

false rejection rate (FRR)

Lin is analyzing a system. She wishes to list all established NetBIOS sessions between that
system and other networked systems. What command can she use to achieve this goal?

nbtstat -S

In what type of attack does the attacker take over an established session between two parties
and then interacts with the remaining party as if the attacker were the party that has been
disconnected?

2|Page

, Active session hijacking

An attacker who sets up a realistic persona from which the victim seeks assistance is
participating in ________.

reverse social engineering

Beth would like to eavesdrop on network traffic resulting from users browsing the Web. Which
port would provide her with the most information about user web activity?

80

Repeaters, hubs, bridges, and switches are typically part of which layer of the TCP/IP model?

Physical or Network Access Layer

A point where all traffic must enter or exit a facility is called a ________.

gate

Which of the following is NOT true of routers?

They direct traffic using physical addresses as opposed to logical addresses.

Which of the following is a distributed denial of service (DDoS) attack in which the attacker
sends a large number of ping packets with the intent of overwhelming a victim?

Ping flood

What type of sniffing takes place on networks that have connectivity hardware that is "smarter"
or more advanced, such as those with a switch?

Active sniffing

Greg is designing the lighting scheme for a building. He would like the lights to be randomly
turned on to create an impression of activity. Which lighting scheme should he use?

Standby

Diego is concerned about attackers targeting his Windows servers using the NetBIOS protocol
and wants to block use of that protocol at the firewall. Which of the following ports does Diego
NOT need to block to prevent NetBIOS access?

140/tcp

Which Facebook protection practice enables you to "friend" work associates with whom you
feel uncomfortable sharing personal information?


3|Page

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Drmserpi Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
75
Member since
2 year
Number of followers
31
Documents
1902
Last sold
17 hours ago
PERFECT GRADES

Welcome to my all inclusive store. Get all quality study materials at a cost-effective price

4.6

215 reviews

5
150
4
57
3
3
2
1
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions