Preview

Final Test

Powerful Essays
Open Document
Open Document
3035 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Final Test
CMIT 321: Ethical Hacking
Final Examination
This timed final exam will consist of 100 multiple-choice questions, and you will have four hours to complete it. Carefully note the information provided in the yellow box below.
An error occurred while attempting to insert your grade into the WebTycho Gradebook. Your instructor has been notified to insert the grade manually. No further action is required on your part.
Your answers to this activity have been submitted to your instructor. You may review your submitted answers at any time through the My Submissions link in the left menu.

1. __________ is a method in which a sniffer is used to track down a conversation between two users. a. A man-in-the-middle (MITM) attack b. Session hijacking c. IP spoofing d. Network tapping
2. __________ reconnaissance is a hacker's attempt to scout for or survey potential targets and then investigate the target using publicly available information. a. Active b. Passive c. Public d. Open
3. __________ is a portable, battery-powered device that mediates interactions between RFID readers and RFID tags. a. RSA blocker tag b. RFID Firewall c. RFID Guardian d. Kill switch
4. __________ is a Microsoft-proprietary protocol that authenticates users and computers based on an authentication challenge and response. a. LMLAN b. Kerberos c. NTLM d. NTLAN
5. __________ is a simple form of attack aimed directly at the application's business logic. a. Authentication hijacking b. Parameter tampering c. Cookie poisoning d. Session poisoning
6. A __________ attack occurs when an attacker sends an oversized ping packet to a victim's device. a. BlueSmacking b. Blueprinting c. BTVoiceBugging d. Bluesnarfing
7. __________ allow attackers to pass malicious code to different systems via a web application. a. SQL injection attacks b. XSS vulnerabilities c. Authentication hijacking attacks d. Command injection flaws
8. In the TCP/IP stack, the

You May Also Find These Documents Helpful

  • Good Essays

    This exam consist of 25 multiple choice questions and covers the material in Chapters 1 through 3.…

    • 1806 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    ____ authentication can be used in a Windows domain environment or on a Linux system to authenticate users and computers.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Practice Final

    • 1884 Words
    • 8 Pages

    | A) the air in this room B) gold C) hydrogen fluoride D) purified water E) all of these…

    • 1884 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    4. List any two (2) other protocols observed within the wireshark capture and their purposes?…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Apush Chapter 4-6

    • 3950 Words
    • 12 Pages

    Directions: There will be 80 multiple choice questions on the test. These review questions follow a chronological order. I would suggest that you study them in this order first and then scramble them up.…

    • 3950 Words
    • 12 Pages
    Good Essays
  • Satisfactory Essays

    BIO100 quiz 2

    • 734 Words
    • 10 Pages

    Thank you for your participation in this assignment. Your work has been submitted to your instructor.…

    • 734 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Robot/intermediary process is a form of attack that is lunched on one computer but attacks another computer.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    AR Linux HW2

    • 415 Words
    • 2 Pages

    Provide brief but complete answers to the following questions. Submit your written responses to your instructor at the beginning of the next unit.…

    • 415 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    final exam

    • 1080 Words
    • 10 Pages

    What is the relative humidity when the air temperature is 75 degrees Fahrenheit and the Wet Bulb temperature is 65 degrees Fahrenheit?…

    • 1080 Words
    • 10 Pages
    Satisfactory Essays
  • Powerful Essays

    Answers To Assignment 2 1

    • 2996 Words
    • 21 Pages

    Be Sure to submit these assignments by 09/27/2014 on BlackBoard, under “Assignment-Week 2. Answers must be labeled properly, with all pertinent information. No late submissions will be accepted.…

    • 2996 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Quiz1 Study Guide

    • 348 Words
    • 2 Pages

    There are 50 multiple choice questions total. Chapters included in this test as outlined in your syllabus: 1, 2, 9, 10, 13, 15, 18, & 38…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cool Paper

    • 781 Words
    • 4 Pages

    Hackers now use protocols such as the Hypertext Transfer Protocol (HTTP) to send data or commands to attack computers, making it difficult to distinguish an attack from legitimate network traffic. True or false?…

    • 781 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    When a program tries using all commonly used passwords, this is known as a(n) ______.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cloaking & Other Black Hat SEO Techniques By: Group 12 Chaitra Prabhu Pranita Bargale Prasanna Kotpalliwar SEO Tactics White Hat •Pure and untainted approach •Follows the S.E rules or guidelines. Gray Hat •bends the rules a little •Speeds up results , carefully minimizes the risk of a penalty from S.E in a way that appears natural.…

    • 869 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Info Systems

    • 251 Words
    • 2 Pages

    Defining security policies and then managing and enforcing those policies via security management products and services is known as _______.…

    • 251 Words
    • 2 Pages
    Satisfactory Essays

Related Topics