100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIT 184 Final Exam 2026 | All Questions and Correct Answers | Graded A+ | Verified Answers | Just Released

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
29-08-2025
Written in
2025/2026

The CIT 184 Final Exam 2026 PDF is a comprehensive resource designed to assist students in mastering key concepts in cybersecurity, particularly focusing on system vulnerabilities and network protocols. The document provides detailed questions and verified correct answers, graded A+, offering insights into privilege escalation, packet sniffing, and various cyber attacks such as MAC flooding and SYN flood attacks. It delves into security measures, discussing smart locks, degaussing for data sanitization, and common nontechnical password attacks like shoulder surfing and social engineering. The exam also covers network management tools such as SNMPwalk for information gathering during enumeration tasks and explains the Domain Name System (DNS) role in converting fully qualified domain names into numeric Internet Protocol (IP) addresses. It addresses misconceptions about security practices, such as the cost-effectiveness of lighting as a security control and the limitations of ARP poisoning and passive sniffing.

Show more Read less
Institution
CIT 184
Course
CIT 184










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CIT 184
Course
CIT 184

Document information

Uploaded on
August 29, 2025
Number of pages
19
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CIT 184 Final Exam 2026 | All Questions and
Correct Answers | Graded A+ | Verified
Answers | Just Released

Privilege escalation gives the attacker the ability to ________. ---------CORRECT
ANSWER-----------------perform actions on a system with fewer restrictions and
perform tasks that are potentially more damaging




Which of the following is NOT true regarding the use of a packet sniffer? ---------
CORRECT ANSWER-----------------Packet sniffing involves the attacker capturing
traffic from both ends of a communication between two hosts.




Harold is performing a penetration test and would like to force a switch to fall
back to forwarding mode. Which of the following attacks would be most helpful
to Harold in meeting his goal? ---------CORRECT ANSWER-----------------MAC
flooding




What is a type of denial of service (DoS) attack? ---------CORRECT ANSWER-----------
------SYN flood




Which of the following lock types are smart and programmable? ---------CORRECT
ANSWER-----------------Cipher

,The database on the local Windows system that is used to store user account
information is called ________. ---------CORRECT ANSWER-----------------the Security
Account Manager (SAM)




Dhruv is conducting network traffic analysis and is examining a suspicious HTTP
packet using the Wireshark protocol analyzer. He would like to examine the
destination port of the packet. Where in the packet should he look for this
information? ---------CORRECT ANSWER-----------------TCP header




Which of the following is true regarding account passwords? ---------CORRECT
ANSWER-----------------Passwords should have at least one number and one special
character.




Chris is concerned that attackers might engage in sniffing attacks against traffic on
his network. Which of the following protocols is most susceptible to sniffing
attacks? ---------CORRECT ANSWER-----------------Hypertext Transfer Protocol
(HTTP)




Which of the following statements is NOT true regarding oversharing of company
activities? ---------CORRECT ANSWER-----------------Oversharing of company
activities typically is conducted by disgruntled employees who are intentionally
trying to harm their company.

, Which protocol runs on IPv6 networks and provides services similar to Address
Resolution Protocol (ARP)? ---------CORRECT ANSWER-----------------Neighbor
Discovery Protocol (NDP)




An attacker can deprive the system owner of the ability to detect the activities
that have been carried out by ________. ---------CORRECT ANSWER-----------------
disabling auditing




Which of the following is NOT considered a sensible guideline to follow when
using social networking sites? ---------CORRECT ANSWER-----------------Set up an
email account that uses your real name.




Countermeasures that can be used to defeat sniffing include all of the following
except ________. ---------CORRECT ANSWER-----------------Media Access Control
(MAC) flooding




Dhruv is conducting network traffic analysis and is examining a suspicious
network packet using the Wireshark protocol analyzer. He would like to examine
the source Internet Protocol (IP) address of the packet. Where in the packet
should he look for this information? ---------CORRECT ANSWER-----------------IP
header

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
nevilletadayo Capella University
View profile
Follow You need to be logged in order to follow users or courses
Sold
828
Member since
2 year
Number of followers
456
Documents
3144
Last sold
1 day ago
INVEST IN YOUR FUTURE EXCELLENCE TODAY!

Unlock Your Academic Success: Gain Access to Expertly Crafted Exams, Flash Cards, Test Banks, and Study Guides on this Premium Stuvia Account. Elevate Your Learning Experience and Achieve Top Grades with our Comprehensive and Time-Saving Resources.

4.6

315 reviews

5
247
4
37
3
14
2
6
1
11

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions