Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CMIT 321 Final Exam Version 2 20201/2022

Beoordeling
-
Verkocht
-
Pagina's
32
Cijfer
A+
Geüpload op
10-08-2021
Geschreven in
2021/2022

CMIT 321 Final Exam Version 2 n 1 1 / 1 point A __________ is a device that receives digital signals and converts them into analog signals, and vice versa. a. firewall b. proxy c. hub d. modem View Feedback n 2 1 / 1 point __________ is a parallelized login cracker that supports numerous protocols for attack. a. ADMsnmp b. SING c. Hydra d. John the Ripper View Feedback n 3 1 / 1 point An __________ share is a hidden share that allows communication between two processes on the same system. a. SMC b. IPC c. EPC d. SMB View Feedback n 4 1 / 1 point __________ monitors and audits databases for security issues in real time. a. Selective Audit b. AppDetective c. AppRadar d. FlexTracerCMIT 321 Final Exam Version 2 View Feedback n 5 1 / 1 point __________ is a command-line utility provided by Microsoft with SQL Server 2000 (and Microsoft SQL Server 2000 Desktop Engine) that allows users to issue queries to the server. a. ODBC b. SQLP c. OSQL d. SSRS View Feedback n 6 1 / 1 point __________ allows applications to read and write various image file formats, including GIF. a. ImageCore b. CoreText c. ImageIO d. CoreImage View Feedback n 7 1 / 1 point Which of the following types of tools would be most effective in cracking UNIX passwords? a. Ophcrack b. KerbCrack c. John the Ripper d. RainbowCrack View Feedback n 8 1 / 1 point A __________ is a device that cannot function in any capacity. a. block b. brick c. rock d. cageCMIT 321 Final Exam Version 2 View Feedback n 9 1 / 1 point __________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it. a. CheckOK b. SMTPCheck c. SMTPMon d. SLCheck View Feedback n 10 1 / 1 point In a hit-and-run attack, __________. a. the attacker constantly injects bad packets into the router b. the attacker mistreats packets, resulting in traffic congestion c. the attacker injects a few bad packets into the router d. the attacker alters a single packet, resulting in denial of service View Feedback n 11 1 / 1 point __________ is the act of gathering information about the security profile of a computer system or organization, undertaken in a methodological manner. a. Tracerouting b. Passive information gathering c. Footprinting d. Competitive intelligence gathering View Feedback n 12 1 / 1 point __________, formerly called AppTapp, is a tool for jailbreaking and installing nonsanctioned third-party applications on the iPhone. a. iFuntastic b. iNdependence c. iActivator d. AppSnappCMIT 321 Final Exam Version 2 View Feedback n 13 1 / 1 point __________ is a tool for performing automated attacks against web-enabled applications. a. cURL b. dotDefender c. Burp Intruder d. AppScan View Feedback n 14 1 / 1 point A __________, also called a packet analyzer, is a software program that can capture, log, and analyze protocol traffic over the network and decode its contents. a. sniffer b. recorder c. logger d. tapper View Feedback

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

CMIT 321 Final Exam Version 2




n1 point
A __________ is a device that receives digital signals and converts them into analog signals, and vice
versa.

a. firewall
b. proxy
c. hub
d. modem
View Feedback

n2 point
__________ is a parallelized login cracker that supports numerous protocols for attack.

a. ADMsnmp
b. SING
c. Hydra
d. John the Ripper
View Feedback

n3 point
An __________ share is a hidden share that allows communication between two processes on the same
system.

a. SMC
b. IPC
c. EPC
d. SMB
View Feedback

n4 point
__________ monitors and audits databases for security issues in real time.

a. Selective Audit
b. AppDetective
c. AppRadar
d. FlexTracer

, CMIT 321 Final Exam Version 2



View Feedback

n5 point
__________ is a command-line utility provided by Microsoft with SQL Server 2000 (and Microsoft SQL
Server 2000 Desktop Engine) that allows users to issue queries to the server.

a. ODBC
b. SQLP
c. OSQL
d. SSRS
View Feedback

n6 point
__________ allows applications to read and write various image file formats, including GIF.

a. ImageCore
b. CoreText
c. ImageIO
d. CoreImage
View Feedback

n7 point
Which of the following types of tools would be most effective in cracking UNIX passwords?

a. Ophcrack
b. KerbCrack
c. John the Ripper
d. RainbowCrack
View Feedback

n8 point
A __________ is a device that cannot function in any capacity.

a. block
b. brick
c. rock
d. cage

, CMIT 321 Final Exam Version 2



View Feedback

n9 point
__________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it.

a. CheckOK
b. SMTPCheck
c. SMTPMon
d. SLCheck
View Feedback

n 10 point
In a hit-and-run attack, __________.

a. the attacker constantly injects bad packets into the router
b. the attacker mistreats packets, resulting in traffic congestion
c. the attacker injects a few bad packets into the router
d. the attacker alters a single packet, resulting in denial of service
View Feedback

n 11 point
__________ is the act of gathering information about the security profile of a computer system or
organization, undertaken in a methodological manner.

a. Tracerouting
b. Passive information gathering
c. Footprinting
d. Competitive intelligence gathering
View Feedback

n 12 point
__________, formerly called AppTapp, is a tool for jailbreaking and installing nonsanctioned third-party
applications on the iPhone.

a. iFuntastic
b. iNdependence
c. iActivator
d. AppSnapp

, CMIT 321 Final Exam Version 2



View Feedback

n 13 point
__________ is a tool for performing automated attacks against web-enabled applications.

a. cURL
b. dotDefender
c. Burp Intruder
d. AppScan
View Feedback

n 14 point
A __________, also called a packet analyzer, is a software program that can capture, log, and analyze
protocol traffic over the network and decode its contents.

a. sniffer
b. recorder
c. logger
d. tapper
View Feedback

n 15 point
Null sessions require access to TCP port __________.

a. 139
b. 141
c. 345
d. 349
View Feedback

n 16 point
A __________ is a trusted entity that signs certificates and can vouch for the identity of the user and the
user's public key.

a. verification authority
b. certification authority
c. validation authority
d. registration authority

Geschreven voor

Vak

Documentinformatie

Geüpload op
10 augustus 2021
Aantal pagina's
32
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$18.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Examhack Stanford University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
296
Lid sinds
4 jaar
Aantal volgers
238
Documenten
999
Laatst verkocht
1 week geleden
EASY A GRADE!!

Here, you will find simple, articulate well-researched education material for you. .... ALL WORK HAS PASSED WITHOUT NEEDING REVISIONS AND BY THE RUBRIC.

3.8

61 beoordelingen

5
31
4
11
3
5
2
4
1
10

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen