100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CMIT 321 Final Exam | Updated 2025, Complete Solutions

Puntuación
-
Vendido
-
Páginas
28
Grado
A
Subido en
19-05-2025
Escrito en
2024/2025

CMIT 321 Final Exam | Updated 2025, Complete Solutions If you want to mask (or spoof) your IP address, what type of scan should you use? IDLE, IPID scan ACK flag probe scan UDP scan Stealth scan A packet filtering firewall works at which of these layers of the OSI model? Application layer Network Layer Physical Layer Session Layer Which cryptographic attack refers to extraction of cryptographic secrets from a person by coercion or torture? Rubber hose attack Ciphertext-only attack Chosen-ciphertext attack Adaptive chose-plaintext attack Which of the following assessment types focus on server and client interaction? Passive assessment Active assessment Wireless network assessment Application assessment The psexec utility can be used to perform which of the following actions? List process Launch an interactive command session Get system information show open files Android includes media support for which of the following? AAC ARM H.323 H.264 Which of the following are tools used for footprinting? Maltego Recon-NT Aircrank-ng FOCA WPA enhances WEP by changing temporal keys every . 1000 packets 5000 packets 10000 packets 15000 packets The process of sending an illegitimate email with a malicious link or file in order to attempt to gain access to a company’s network infrastructure is known as: Vishing Phishing Impersonation Passive reconnaissance Enumeration The IEEE 802.16 standard is known as: Wi-Fi Ethernet WiMAX Bluetooth A DNS zone transfer: Uses TCP port 53 Uses UDP port 53 Provides FQDN information about an organization Is possible with Microsoft DNS servers but not BIND servers Which of the following IP spoofing detection techniques succeeds only when the attacker is in a different subnet? TCP flow control method IP identification number technique Direct TTL probes techniques UDP flow control method According to the text, session hijacking is successful due to? Weak session IDs TCP/IP protocol Insecure handling of session IDs Weak passwords What is the first step in the vulnerability management life cycle? Risk assessment Remediation Monitoring Creating a baseline Meterpreter allows the attacks to move laterally by performing which of the following steps: Hashdump Getsystem Route add Load mimkatz The security account manager (SAM) database contains: Users’ passwords Users’ passwords in Unicode Users’ passwords in hexadecimal (0-F) Hashes of users’ passwords Which of the following applies to an SSID? Is part of the frame header Can be up to 32 characters Is case sensitive Will be encrypted in WEP or WPA/WPA2 is used Of the following options, which are virtualization vendors? VMware vSphere Microsoft VMware vCloud Suite Virtual Box Which two tools are used for password cracking? Kali Hashcat John the Ripper Nessus Which of the following techniques practiced by an attacker exploits human behavior to make attacks? Denial of service Social engineering SQL injection Buffer overflow A lack of vetting of apps can lead to which two of the following results? Malicious apps Rooting Jail-breaking Fake apps Which protocols will be encrypted in a packet capture? POP and SMTP TELNET and FTP NTP and SNMP SSH and SSL An attacker uses the following to hide data transferred over the wire: Covert channel TCP Port 995 UDP port 123 One-time pad Which of the following steganography techniques hides information in significant parts of the cover image such as cropping, compression, and some other images processing areas? Domain distortion techniques Spread spectrum techniques Transform domain techniques Cover generation techniques What is the size of the WEP initialization vector? 8-bit 16-bit 24-bit 32-bit Your supervisor is concerned about the use of port 139 in your environment. What measure do you recommend taking to deal with the security risk? Use TCP wrappers Turn on the Windows Firewall Disable file and print sharing Block ICMP so the host cannot be detected Identify the attack which forces an unsuspecting user’s browser to send malicious requests the user did not intend. LDAP injection attack Cross-site request forgery (CSRF) Cross-site scripting (XSS) SQL injection attack Which of the following scans only works if the operating system’s TCP/IP implementation is based on RFC 793? FTP bounce scan Maintaining access NULL scan TCP connect scan IDLE scan IDLE scan Which version of the Linux kernel does Android rely upon? 2.6 3.0 3.10 3.6 Which of the following are mobile network-based attacks? Man-in-the-middle attacks Packet sniffing Rouge access points SSL strip How do you filter for FTP traffic in Wireshark? T == 3389 T == 21 U == 69 T == 25 U == 123 How do you filter for RDP traffic in Wireshark? T == 3389 T == 21 U == 69 T == 25 U == 123 The following is a tool that can be used to harvest credentials from a Windows Machine: Mimikatz LOIC WannaCry Hping Scanning the internal network with Nmap is an example of which of the following assessment types? Passive assessment Active assessment Wireless network assessment Application assessment According to your text, examples of malware include which of the following? Ransomware Botnet Crypter metasploit Which modes on Bluetooth devices are at greater risk? Open Promiscuous Discovery Monitor According to the text, among all smartphones, which is most likely to be hacked? Android Blackberry Windows Phone iPhone The tool hping can be used for: Denial of service Social engineering Phishing DNS lookups The following allows an attacker on a switch to see all traffic, as if it were a hub: SPAN port ARP table BRIDGING mode NBTSTAT The following tool extracts documents of an organization from the internet: Cain Metagoofil Netcraft Nftables Which is the best location to place keyloggers? Operating system and UPS UPS and keyboard Monitor and keyboard software Keyboard hardware and the operating system Microsoft Security Baseline Analyzer will identify: Security issues Possible vulnerabilities STIGS Banner messages All of the statements below are characteristics of Wireshark except: Packet sniffer Protocol analyzer Open source Runs on various platforms Offered for 48-bit and 64-bit platforms Sophos mobile security features include Spam protection Loss and thef t protection Antivirus antimalware Privacy protection and security The act of enumerating hosts is: Considered active scanning Considered passive scanning A passive information gathering technique An active information gathering technique The monitoring phase of the vulnerability management life cycle allows for: Identifying critical assets Identifying bugs and misconfigurations Using intrusion detection systems and intrusion prevention systems Security team checks Reducing obvious and glaring vulnerabilities The following act will help a company become compliant with regulations and standards: Ping scanning Enumeration Vulnerability scanning Replacing Windows systems with Linux Which of the following are types of database attacks? SQL injection Privilege escalation OS command execution Data dumping Which of the following techniques is used to simulate an attack from someone who is unfamiliar with the system? Gray box pen testing Announced pen testing Black box pen testing Maintaining access White box pen testing What were the two dominant attack strategies identified in Symantec’s Threat Report? Advanced persistent threats Focused attack Broader strokes Distributed denial of service App Stores include: Google play ITunes Store Blackberry App World Fanddago Which of the following is one of the most reliable forms of TCP scanning? XMAS scan Connect scan Inverse TCP flag scan Half-open scan The following tool is known for its ability to comprehensively scan websites for security-related issues: Aircrack-ng Wget Nikto John the Ripper Which of the following Management Information Base (MIB) files contains information about server services? LNMIB2.MIB HOSTMIB.MIB WINS.MIB DCHP.MIB This type of database attack does not return error messages from the system. Non-error based Blind injection Stored procedure Tautology-based According to the text, which of the following is a form of a MITM attack? Checksum evasion Packet sniffing API hooking SSL Strip Which of the following are risks of rooting? Malware Voiding the warranty Bricking Poor performance The SMTP Protocol provides three built-in commands, including which of the following? FINGER EXPN RCPT TO VRFY Which of the following are disadvantages of signature detection? False alerts Administrative alerts False positives Signature detection Port 25 and Port 110 are commonly used for: DNS zone transfer Network Time Protocol Network News Transfer Protocol Mail Reasons to scan networks include: Stealing usernames Stealing passwords Identifying hosts Determining open ports Activities like dumpster diving, reading articles related about a company, and searching job postings on an online website fall under what category? Active reconnaissance Passive reconnaissance Active information gathering Passive information gathering Signs of intrusions include which of the following? System crashes Strange processes Slow performance Missing logs What are some of the limitations of cloud computing services? Contracts Storage limits Control limits Inflexible The following protocols often use clear text: SSH, TELNET, TFTP, HTTP SSH, TELNET, FTP, HTTP SSH, FTP, TFTP, HTTP FTP, TELNET, TFTP, HTTP

Mostrar más Leer menos
Institución
Grado










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
19 de mayo de 2025
Número de páginas
28
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CMIT 321 Final Exam


If you want to mask (or spoof) your IP address, what type of scan should you use?

IDLE, IPID scan

ACK flag probe scan

UDP scan

Stealth scan



A packet filtering firewall works at which of these layers of the OSI model?

Application layer

Network Layer

Physical Layer

Session Layer



Which cryptographic attack refers to extraction of cryptographic secrets from a person by coercion or
torture?

Rubber hose attack

Ciphertext-only attack

Chosen-ciphertext attack

Adaptive chose-plaintext attack



Which of the following assessment types focus on server and client interaction?

Passive assessment

Active assessment

Wireless network assessment

Application assessment



The psexec utility can be used to perform which of the following actions?

List process

Launch an interactive command session

Get system information

,show open files



Android includes media support for which of the following?

AAC

ARM

H.323

H.264



Which of the following are tools used for footprinting?

Maltego

Recon-NT

Aircrank-ng

FOCA



WPA enhances WEP by changing temporal keys every .

1000 packets

5000 packets

10000 packets

15000 packets



The process of sending an illegitimate email with a malicious link or file in order to attempt to gain
access to a company’s network infrastructure is known as:

Vishing

Phishing

Impersonation

Passive reconnaissance

Enumeration



The IEEE 802.16 standard is known as:

, Wi-Fi

Ethernet

WiMAX

Bluetooth



A DNS zone transfer:

Uses TCP port 53

Uses UDP port 53

Provides FQDN information about an organization

Is possible with Microsoft DNS servers but not BIND servers



Which of the following IP spoofing detection techniques succeeds only when the attacker is in a different
subnet?

TCP flow control method

IP identification number technique

Direct TTL probes techniques

UDP flow control method



According to the text, session hijacking is successful due to?

Weak session IDs

TCP/IP protocol

Insecure handling of session IDs

Weak passwords



What is the first step in the vulnerability management life cycle?

Risk assessment

Remediation

Monitoring

Creating a baseline
$24.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
NurseHenny EXAMS
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
150
Miembro desde
2 año
Número de seguidores
71
Documentos
1887
Última venta
1 día hace
AFFORDABLE EXAMS AND STUDY GUIDES

On this page you will find verified, well elaborated exams and packages, offered by seller NURSE HENNY.

4.3

27 reseñas

5
19
4
4
3
0
2
1
1
3

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes