Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CMIT 321 Final Exam 2021-All Answers Correct

Rating
-
Sold
-
Pages
64
Grade
A+
Uploaded on
10-08-2021
Written in
2021/2022

Final Exam Question 1 1 / 1 point __________ is a worm for Windows XP that downloads and executes malicious files on the compromised computer and spreads through removable storage devices. a. HTTP W32.Drom b. W32/VBAut-B c. W32/QQRob-ADN d. W32/SillyFDC-BK View Feedback Question 2 1 / 1 point __________ monitors and audits databases for security issues in real time. a. Selective Audit b. AppDetective c. AppRadar d. FlexTracer View Feedback Question 3 1 / 1 pointWhich of the following attacks would you choose to seize control of a legitimate user’s web application session while the session is still in progress? a. session hijacking b. DOS attack c. password sniffing d. spoofing View Feedback Question 4 1 / 1 point __________ viruses search all drives and connected network shares to locate files with an EXE or SCR extension. a. W32/Madang-Fam b. W32/Hasnot-A c. W32/Fujacks-AK d. W32/Fujacks-E View Feedback Question 5 1 / 1 pointIn order for traffic to get back to the attacker during session hijacking, a process called __________ is used that allows the sender to specify a particular route for the IP packet to take to the destination. a. desynchronization b. source routing c. spoofing d. TCP routing View Feedback

Show more Read less
Institution
Course

Content preview

Final Exam

Question 1 point



__________ is a worm for Windows XP that downloads and executes malicious files on the
compromised computer and spreads through removable storage devices.



a. HTTP W32.Drom

b. W32/VBAut-B

c. W32/QQRob-ADN

d. W32/SillyFDC-BK

View Feedback



Question 2 point



__________ monitors and audits databases for security issues in real time.



a. Selective Audit

b. AppDetective

c. AppRadar

d. FlexTracer

View Feedback



Question 3 point

,Which of the following attacks would you choose to seize control of a legitimate user’s web
application session while the session is still in progress?



a. session hijacking

b. DOS attack

c. password sniffing

d. spoofing

View Feedback



Question 4 point



__________ viruses search all drives and connected network shares to locate files with an EXE
or SCR extension.



a. W32/Madang-Fam

b. W32/Hasnot-A

c. W32/Fujacks-AK

d. W32/Fujacks-E

View Feedback




Question 5 point

,In order for traffic to get back to the attacker during session hijacking, a process called
__________ is used that allows the sender to specify a particular route for the IP packet to take
to the destination.



a. desynchronization

b. source routing

c. spoofing

d. TCP routing

View Feedback




Question 6 point



A __________ attack occurs when an attacker sends an oversized ping packet to a victim’s
device.



a. BlueSmacking

b. Blueprinting

c. BTVoiceBugging

d. Bluesnarfing

View Feedback

, Question 7 point



__________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after
connecting to it.



a. CheckOK

b. SMTPCheck

c. SMTPMon

d. SLCheck

View Feedback




Question 8 point



Which of the following definitions best describes a wrapper?



a. A wrapper is a packet-crafting technique used to perform stealthy port scans.

b. A wrapper is an encryption tool used to hide messages inside image files.

c. A wrapper is a method of hiding a virus inside an executable file.

d. A wrapper is a tool used to bind a Trojan to a legitimate file.

View Feedback

Written for

Course

Document information

Uploaded on
August 10, 2021
Number of pages
64
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Examhack Stanford University
Follow You need to be logged in order to follow users or courses
Sold
300
Member since
4 year
Number of followers
238
Documents
999
Last sold
23 hours ago
EASY A GRADE!!

Here, you will find simple, articulate well-researched education material for you. .... ALL WORK HAS PASSED WITHOUT NEEDING REVISIONS AND BY THE RUBRIC.

3.8

61 reviews

5
31
4
11
3
5
2
4
1
10

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions