100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CMIT 321 Final Exam Version 2. Questions And Answers. Latest Exam $15.49   Add to cart

Exam (elaborations)

CMIT 321 Final Exam Version 2. Questions And Answers. Latest Exam

 1 view  0 purchase
  • Course
  • Institution

CMIT 321 Final Exam Version 2. Questions And Answers. Latest Exam.A __________ is a device that receives digital signals and converts them into analog sign als, and vice versa. a. firewall b. proxy c. hub d. modem View Feedback Question 2 1 / 1 point __________ is a parallelized login cracker that ...

[Show more]

Preview 4 out of 32  pages

  • May 14, 2022
  • 32
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
avatar-seller
am
n1 point
A __________ is a device that receives digital signals and converts them into analog signals, and vice
versa.

a. firewall
b. proxy
c. hub
d. modem
View Feedback

n2 point
__________ is a parallelized login cracker that supports numerous protocols for attack.

a. ADMsnmp
b. SING
c. Hydra
d. John the Ripper
View Feedback

n3 point
An __________ share is a hidden share that allows communication between two processes on the same
system.

a. SMC
b. IPC
c. EPC
d. SMB
View Feedback

n4 point
__________ monitors and audits databases for security issues in real time.

a. Selective Audit
b. AppDetective
c. AppRadar
d. FlexTracer
View Feedback

,n5 point
__________ is a command-line utility provided by Microsoft with SQL Server 2000 (and Microsoft SQL
Server 2000 Desktop Engine) that allows users to issue queries to the server.

a. ODBC
b. SQLP
c. OSQL
d. SSRS
View Feedback

n6 point
__________ allows applications to read and write various image file formats, including GIF.

a. ImageCore
b. CoreText
c. ImageIO
d. CoreImage
View Feedback

n7 point
Which of the following types of tools would be most effective in cracking UNIX passwords?

a. Ophcrack
b. KerbCrack
c. John the Ripper
d. RainbowCrack
View Feedback

n8 point
A __________ is a device that cannot function in any capacity.

a. block
b. brick
c. rock
d. cage
View Feedback

n9 point
__________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it.

, a. CheckOK
b. SMTPCheck
c. SMTPMon
d. SLCheck
View Feedback

n 10 point
In a hit-and-run attack, __________.

a. the attacker constantly injects bad packets into the router
b. the attacker mistreats packets, resulting in traffic congestion
c. the attacker injects a few bad packets into the router
d. the attacker alters a single packet, resulting in denial of service
View Feedback

n 11 point
__________ is the act of gathering information about the security profile of a computer system or
organization, undertaken in a methodological manner.

a. Tracerouting
b. Passive information gathering
c. Footprinting
d. Competitive intelligence gathering
View Feedback

n 12 point
__________, formerly called AppTapp, is a tool for jailbreaking and installing nonsanctioned third-party
applications on the iPhone.

a. iFuntastic
b. iNdependence
c. iActivator
d. AppSnapp
View Feedback

n 13 point
__________ is a tool for performing automated attacks against web-enabled applications.

, a. cURL
b. dotDefender
c. Burp Intruder
d. AppScan
View Feedback

n 14 point
A __________, also called a packet analyzer, is a software program that can capture, log, and analyze
protocol traffic over the network and decode its contents.

a. sniffer
b. recorder
c. logger
d. tapper
View Feedback

n 15 point
Null sessions require access to TCP port __________.

a. 139
b. 141
c. 345
d. 349
View Feedback

n 16 point
A __________ is a trusted entity that signs certificates and can vouch for the identity of the user and the
user's public key.

a. verification authority
b. certification authority
c. validation authority
d. registration authority
View Feedback

n 17 point
__________ is a command-line interface for Microsoft SQL Server that allows an attacker to execute
commands on the underlying operating system, execute SQL queries, and upload files to a remote server.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller StudyConnect. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $15.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling

Recently viewed by you


$15.49
  • (0)
  Add to cart