CMIT 321 Final Exam Version 2 questions and answers
CMIT 321 Final Exam Version 2 (UMUC) A __________ is a device that receives digital signals and converts them into analog signals, and vice versa __________ is a parallelized login cracker that supports numerous protocols for attack An __________ share is a hidden share that allows communication between two processes on the same system. __________ monitors and audits databases for security issues in real time __________ is a command-line utility provided by Microsoft with SQL Server 2000 (and Microsoft SQL Server 2000 Desktop Engine) that allows users to issue queries to the server __________ allows applications to read and write various image file formats, including GIF Which of the following types of tools would be most effective in cracking UNIX passwords? A __________ is a device that cannot function in any capacity. __________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it In a hit-and-run attack, __________. __________ is the act of gathering information about the security profile of a computer system or organization, undertaken in a methodological manner. __________, formerly called AppTapp, is a tool for jailbreaking and installing nonsanctioned third-party applications on the iPhone __________ is a tool for performing automated attacks against web-enabled applications. A __________, also called a packet analyzer, is a software program that can capture, log, and analyze protocol traffic over the network and decode its contents Null sessions require access to TCP port __________. A __________ is a trusted entity that signs certificates and can vouch for the identity of the user and the user's public key. __________ is a command-line interface for Microsoft SQL Server that allows an attacker to execute commands on the underlying operating system, execute SQL queries, and upload files to a remote server. The __________ tool traces various application calls from Windows API functions to the Oracle Call Interface The __________ command displays the ARP table and is used to modify it Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error. They can fill in the username and password fields with __________ RFID __________ collision occurs when an RFID tag reader energizes numerous tags and the tags' respective signals are reflected back to the reader simultaneously. __________ reconnaissance is a hacker's attempt to scout for or survey potential targets and then investigate the target using publicly available information The __________ service is responsible for sending a response packet that contains connection details to clients who send a specially formed request The Network News Transport Protocol service uses port __________. The information resource or asset that is being protected from attacks is usually called the __________ In Internet Explorer, the __________ zone is a security zone for sites that the user has designated as safe to visit __________ is a type of computer architecture in which multiple processors share the same memory and are each assigned different tasks to perform What phase of attack uses social engineering and dumpster diving to find information about the target? Redirections for URLs are handled with the __________ URL handler, which can cause errors in older versions of Internet Explorer. __________ gathering is the process of accumulating information from resources like the Internet that can later be analyzed as business intelligence. ...... 125. A common technique used to hide data within image files uses the __________ technique
Written for
- Institution
- University of Maryland
- Course
- CMIT 321 (CMIT321)
Document information
- Uploaded on
- July 9, 2020
- Number of pages
- 32
- Written in
- 2019/2020
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- and vice versa
-
cmit 321 final exam version 2
-
a is a device that receives digital signals and converts them into analog signals
-
is a parallelized login cracker that supports nume