Preview

Final Test

Powerful Essays
Open Document
Open Document
3035 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Final Test
CMIT 321: Ethical Hacking
Final Examination
This timed final exam will consist of 100 multiple-choice questions, and you will have four hours to complete it. Carefully note the information provided in the yellow box below.
An error occurred while attempting to insert your grade into the WebTycho Gradebook. Your instructor has been notified to insert the grade manually. No further action is required on your part.
Your answers to this activity have been submitted to your instructor. You may review your submitted answers at any time through the My Submissions link in the left menu.

1. __________ is a method in which a sniffer is used to track down a conversation between two users. a. A man-in-the-middle (MITM) attack b. Session hijacking c. IP spoofing d. Network tapping
2. __________ reconnaissance is a hacker's attempt to scout for or survey potential targets and then investigate the target using publicly available information. a. Active b. Passive c. Public d. Open
3. __________ is a portable, battery-powered device that mediates interactions between RFID readers and RFID tags. a. RSA blocker tag b. RFID Firewall c. RFID Guardian d. Kill switch
4. __________ is a Microsoft-proprietary protocol that authenticates users and computers based on an authentication challenge and response. a. LMLAN b. Kerberos c. NTLM d. NTLAN
5. __________ is a simple form of attack aimed directly at the application's business logic. a. Authentication hijacking b. Parameter tampering c. Cookie poisoning d. Session poisoning
6. A __________ attack occurs when an attacker sends an oversized ping packet to a victim's device. a. BlueSmacking b. Blueprinting c. BTVoiceBugging d. Bluesnarfing
7. __________ allow attackers to pass malicious code to different systems via a web application. a. SQL injection attacks b. XSS vulnerabilities c. Authentication hijacking attacks d. Command injection flaws
8. In the TCP/IP stack, the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    4. List any two (2) other protocols observed within the wireshark capture and their purposes?…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Pg 662

    • 3667 Words
    • 15 Pages

    The final will consist of 50 multiple choice/T-F questions from chapters 25-30. It will be timed for 55 minutes. The exam will be based on the questions below.…

    • 3667 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    AR Linux HW2

    • 415 Words
    • 2 Pages

    Provide brief but complete answers to the following questions. Submit your written responses to your instructor at the beginning of the next unit.…

    • 415 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Apush Chapter 4-6

    • 3950 Words
    • 12 Pages

    Directions: There will be 80 multiple choice questions on the test. These review questions follow a chronological order. I would suggest that you study them in this order first and then scramble them up.…

    • 3950 Words
    • 12 Pages
    Good Essays
  • Satisfactory Essays

    Final Exam

    • 1601 Words
    • 7 Pages

    TCO D) PuttingPeople2Work has a growing business placing out-of-work MBAs. They claim they can place a client in a job in their field in less than 36 weeks. You are given the following data from a sample.…

    • 1601 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BIO100 quiz 2

    • 734 Words
    • 10 Pages

    Thank you for your participation in this assignment. Your work has been submitted to your instructor.…

    • 734 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Packet sniffing is a type of attack in which the attacker uses the collection of network messages as it is traveling from the user to the server in order to divulge…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    final exam

    • 1080 Words
    • 10 Pages

    What is the relative humidity when the air temperature is 75 degrees Fahrenheit and the Wet Bulb temperature is 65 degrees Fahrenheit?…

    • 1080 Words
    • 10 Pages
    Satisfactory Essays
  • Powerful Essays

    Answers To Assignment 2 1

    • 2996 Words
    • 21 Pages

    Be Sure to submit these assignments by 09/27/2014 on BlackBoard, under “Assignment-Week 2. Answers must be labeled properly, with all pertinent information. No late submissions will be accepted.…

    • 2996 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Quiz1 Study Guide

    • 348 Words
    • 2 Pages

    There are 50 multiple choice questions total. Chapters included in this test as outlined in your syllabus: 1, 2, 9, 10, 13, 15, 18, & 38…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cool Paper

    • 781 Words
    • 4 Pages

    Hackers now use protocols such as the Hypertext Transfer Protocol (HTTP) to send data or commands to attack computers, making it difficult to distinguish an attack from legitimate network traffic. True or false?…

    • 781 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    When a program tries using all commonly used passwords, this is known as a(n) ______.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    FINAL EXAM STUDY GUIDE

    • 631 Words
    • 3 Pages

    The exam is comprised of three parts: four definitions (4 x 5% = 20%), four short answer questions (4 x 10% = 40%) and one essay question (1 x 40% = 40%). You will have two hours to complete the exam so be sure to manage your time accordingly. The purpose of the exam is to demonstrate your knowledge and not just memorization of the course material from readings, lectures and tutorial discussions. Equally important are your skills in critical thinking and writing. Consider all of these when designing your answers.…

    • 631 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cloaking & Other Black Hat SEO Techniques By: Group 12 Chaitra Prabhu Pranita Bargale Prasanna Kotpalliwar SEO Tactics White Hat •Pure and untainted approach •Follows the S.E rules or guidelines. Gray Hat •bends the rules a little •Speeds up results , carefully minimizes the risk of a penalty from S.E in a way that appears natural.…

    • 869 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Info Systems

    • 251 Words
    • 2 Pages

    Defining security policies and then managing and enforcing those policies via security management products and services is known as _______.…

    • 251 Words
    • 2 Pages
    Satisfactory Essays

Related Topics