100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CIS-171 Midterm Ch 1-6 || WITH ANSWERS 100% PASSED!! $10.99   Add to cart

Exam (elaborations)

CIS-171 Midterm Ch 1-6 || WITH ANSWERS 100% PASSED!!

 3 views  0 purchase
  • Course
  • CIS
  • Institution
  • CIS

Acme Widgets recently experienced an attack in which the attacker broke into a file server and modified protected data. Which of the following is a goal of information security that was violated? correct answers Integrity In an organization protecting its IT infrastructure from risks, which cont...

[Show more]

Preview 2 out of 5  pages

  • September 16, 2024
  • 5
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CIS
  • CIS
avatar-seller
ProPerfomer
CIS-171 Midterm Ch 1-6 || WITH ANSWERS 100%
PASSED!!
Acme Widgets recently experienced an attack in which the attacker broke into a file server
and modified protected data. Which of the following is a goal of information security that
was violated? correct answers Integrity

In an organization protecting its IT infrastructure from risks, which control includes firewalls,
intrusion prevention systems (IPSs), and biometric authentication? correct answers Technical

Of the following, which description best describes the scanning step of hacking? correct
answers An attacker conducting a ping sweep of all of the victim's known Internet Protocol
(IP) addresses

Planning, discovery, attack, and reporting are considered: correct answers penetration testing
steps.

Reconnaissance, scanning, infiltration and escalation, exfiltration, access extension, assault,
and obfuscation are considered: correct answers hacking steps.

Which hacking methodology is defined as an attacker wanting to cover their tracks by erasing
any traces of their presence in the target system? correct answers Obfuscation

Which of the following statements is true regarding ethical hackers? correct answers Ethical
hackers engage in their activities only with the permission of the asset owner.

Which type of penetration test includes anything that targets equipment and facilities with
actions such as theft, breaking and entering, or similar actions? It can also include actions
against people, such as social engineering-related threats. correct answers Physical attack

Which type of penetration test is designed to find loopholes or shortcomings in how tasks and
operational processes are performed? correct answers Administrative attack

__________ are specialists in finding software bugs. correct answers Bug bounty hunters

A shell is a command-prompt environment used to issue commands and execute shell scripts.
In Linux, which is the most popular shell? correct answers bash

Kaiden would like to find the list of physical disk drives that are connected to a Linux
system. Which directory contains a subdirectory for each drive? correct answers /dev

Ron is building a system that he will use in a penetration test. He would like to choose a
Linux distribution well suited to that purpose. Which of the following Linux distributions
would be his best choice? correct answers Kali Linux

The __________ is the core component of the Linux operating system, which has control
over all low-level system functions such as resource management, input and output
operations, and central processing unit (CPU). correct answers kernel

, Using Linux Kali as a _____________allows a forensic technician to examine a running
computer, pause it, restart it, and then save the current state of the tool. correct answers
virtual machine

What does the ls -al Linux command return? correct answers Displays files and
subdirectories in the current directory including hidden files but uses different output formats
than the ls -a command

Which Linux directory contains executables used by the operating system and administrators
that are not typically used by ordinary users? correct answers /sbin

Which command displays the current location of the user within the Linux directory
structure? correct answers pwd

Which of the following is a paid Linux distribution that includes support? correct answers
Red Hat Enterprise

Which of the following specifies filenames or other targets that fine-tune the action of a
Linux command? correct answers Argument

Alice installed a new firewall that faces the Internet and protects her company's internal
network. After she made that change, company users started complaining that they could not
access websites or send or receive emails. What firewall issue is the most likely cause?
correct answers Firewalls are initially set with default ports and services disabled.

Beth wants to establish a connection from her computer to a remote server. Which of the
following will allow her to do so and not have the exchange conducted in the clear? correct
answers Secure Shell (SSH)

Carrie is examining a piece of malware. She determines that it was gathering information
about the user of a system, but she has no other information. Which of the following terms
should she use to describe this malware? correct answers Spyware

Dhruv is a network engineer. He is investigating a series of denial of service (DoS) attacks
against his company's servers. He has an intern shadowing him who asks at what layer on the
OSI model such attacks take place. What does he tell her? correct answers Transport

The TCP/IP and OSI Reference Models both illustrate the location of network services as
layers. The OSI model has seven layers whereas the TCP/IP model has four, yet they map to
each other. To which layer of the TCP/IP model does the OSI Session Layer map? correct
answers Application

Which layer of the OSI model specifies whether messages are sent by digital or analog, base
or broadband, and synchronous or asynchronous transmission? correct answers Physical

Which of the following is not true of routers? correct answers They direct traffic using
physical addresses as opposed to logical addresses.

Which of the following is true of Internet Protocol version 6 (IPv6)? correct answers IPv6
addresses are 128-bit numbers.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ProPerfomer. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77016 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99
  • (0)
  Add to cart