Computer Science > QUESTIONS & ANSWERS > CMIT 321 Final Test-all answers correct-Graded A+ (All)

CMIT 321 Final Test-all answers correct-Graded A+

Document Content and Description Below

Attempt 1 Final Exam Question 1 1 / 1 point __________ is a worm for Windows XP that downloads and executes malicious files on the compromised computer and spreads through removable storage devic... es. a. HTTP W32.Drom b. W32/VBAut-B c. W32/QQRob-ADN d. W32/SillyFDC-BK View Feedback Question 2 1 / 1 point __________ monitors and audits databases for security issues in real time. a. Selective Audit b. AppDetective c. AppRadar d. FlexTracer View Feedback Question 3 1 / 1 point Which of the following attacks would you choose to seize control of a legitimate user’s web application session while the session is still in progress? a. session hijacking b. DOS attack c. password sniffing d. spoofing View Feedback Question 4 1 / 1 point __________ viruses search all drives and connected network shares to locate files with an EXE or SCR extension. a. W32/MadangFamb. W32/Hasnot-A c. W32/Fujacks-AK d. W32/Fujacks-E View Feedback Question 5 1 / 1 point In order for traffic to get back to the attacker during session hijacking, a process called __________ is used that allows the sender to specify a particular route for the IP packet to take to the destination. a. desynchronization b. source routing c. spoofing d. TCP routing View Feedback Question 6 1 / 1 point A __________ attack occurs when an attacker sends an oversized ping packet to a victim’s device. a. BlueSmacking b. Blueprinting c. BTVoiceBugging d. Bluesnarfing View Feedback Question 7 1 / 1 point __________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it. a. CheckOK b. SMTPCheck c. SMTPMon d. SLCheck View FeedbackQuestion 8 1 / 1 point Which of the following definitions best describes a wrapper? a. A wrapper is a packet-crafting technique us scans. b. A wrapper is an encryption tool used to hid c. A wrapper is a method of hiding a virus insi d. A wrapper is a tool used to bind a Trojan to View Feedback Question 9 1 / 1 point _________ hijacking is a hacking technique that uses spoofed packets to take over a connection between a victim and a target machine. a. ACK b. Blind c. TCP/IP d. Networklevel View Feedback Question 10 1 / 1 point Which of the following is not a Microsoft Internet Information Services vulnerability? a. ::$DATA vulnerability b. UFS integer overflow vulnerabilit [Show More]

Last updated: 2 years ago

Preview 1 out of 34 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$13.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

53
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 10, 2021

Number of pages

34

Written in

Seller


seller-icon
d.occ

Member since 4 years

231 Documents Sold

Reviews Received
30
8
4
1
7
Additional information

This document has been written for:

Uploaded

Aug 10, 2021

Downloads

 0

Views

 53

Document Keyword Tags


$13.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·