Computer Science > QUESTIONS & ANSWERS > CMIT 321 Final Test-all answers correct-Graded A+ (All)
Attempt 1 Final Exam Question 1 1 / 1 point __________ is a worm for Windows XP that downloads and executes malicious files on the compromised computer and spreads through removable storage devic... es. a. HTTP W32.Drom b. W32/VBAut-B c. W32/QQRob-ADN d. W32/SillyFDC-BK View Feedback Question 2 1 / 1 point __________ monitors and audits databases for security issues in real time. a. Selective Audit b. AppDetective c. AppRadar d. FlexTracer View Feedback Question 3 1 / 1 point Which of the following attacks would you choose to seize control of a legitimate user’s web application session while the session is still in progress? a. session hijacking b. DOS attack c. password sniffing d. spoofing View Feedback Question 4 1 / 1 point __________ viruses search all drives and connected network shares to locate files with an EXE or SCR extension. a. W32/MadangFamb. W32/Hasnot-A c. W32/Fujacks-AK d. W32/Fujacks-E View Feedback Question 5 1 / 1 point In order for traffic to get back to the attacker during session hijacking, a process called __________ is used that allows the sender to specify a particular route for the IP packet to take to the destination. a. desynchronization b. source routing c. spoofing d. TCP routing View Feedback Question 6 1 / 1 point A __________ attack occurs when an attacker sends an oversized ping packet to a victim’s device. a. BlueSmacking b. Blueprinting c. BTVoiceBugging d. Bluesnarfing View Feedback Question 7 1 / 1 point __________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it. a. CheckOK b. SMTPCheck c. SMTPMon d. SLCheck View FeedbackQuestion 8 1 / 1 point Which of the following definitions best describes a wrapper? a. A wrapper is a packet-crafting technique us scans. b. A wrapper is an encryption tool used to hid c. A wrapper is a method of hiding a virus insi d. A wrapper is a tool used to bind a Trojan to View Feedback Question 9 1 / 1 point _________ hijacking is a hacking technique that uses spoofed packets to take over a connection between a victim and a target machine. a. ACK b. Blind c. TCP/IP d. Networklevel View Feedback Question 10 1 / 1 point Which of the following is not a Microsoft Internet Information Services vulnerability? a. ::$DATA vulnerability b. UFS integer overflow vulnerabilit [Show More]
Last updated: 2 years ago
Preview 1 out of 34 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Aug 10, 2021
Number of pages
34
Written in
This document has been written for:
Uploaded
Aug 10, 2021
Downloads
0
Views
53
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·