100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CSIT 161 MIDTERM UPDATED Actual Exam Questions and CORRECT Answers £7.56   Add to cart

Exam (elaborations)

CSIT 161 MIDTERM UPDATED Actual Exam Questions and CORRECT Answers

 4 views  0 purchase
  • Module
  • CSIT 161
  • Institution
  • CSIT 161

CSIT 161 MIDTERM UPDATED Actual Exam Questions and CORRECT Answers To be effective, hackers and cybercriminals: - CORRECT ANSWER- only need to know one vulnerability, or how to use one automated tool that attacks that vulnerability. only need to know one vulnerability, or how to use one autom...

[Show more]

Preview 3 out of 21  pages

  • September 21, 2024
  • 21
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CSIT 161
  • CSIT 161
avatar-seller
CSIT 161 MIDTERM UPDATED Actual
Exam Questions and CORRECT Answers
To be effective, hackers and cybercriminals: - CORRECT ANSWER✔✔- only need to know
one vulnerability, or how to use one automated tool that attacks that vulnerability.


only need to know one vulnerability, or how to use one automated tool that attacks that
vulnerability. - CORRECT ANSWER✔✔- only need to know one vulnerability, or how to
use one automated tool that attacks that vulnerability.


Which of the following is used to perform a scan of the network and create a network
topology chart? - CORRECT ANSWER✔✔- Zemap


Which of the following is a protocol analyzer tool (sometimes called a "packet sniffer") that
is used to capture IP traffic from a variety of sources? - CORRECT ANSWER✔✔-
Wireshark


Which of the following allows Wireshark to capture packets destined to any host on the same
subnet or virtual LAN (VLAN)? - CORRECT ANSWER✔✔- Promiscuous mode


Which of the following allows analysts to view and analyze network packet traces? -
CORRECT ANSWER✔✔- NetWitness Investigator


Which of the following performs remote scans and audits of Unix, Windows, and network
infrastructures and can perform a network discovery of devices, operating systems,
applications, databases, and services running on those devices? - CORRECT ANSWER✔✔-
Nessus


Which of the following is used to transfer files using the File Transfer Protocol (FTP) to and
from the vWorkstation? - CORRECT ANSWER✔✔- FileZilla



Most Linux interactions take place: - CORRECT ANSWER✔✔- from the command line.

,Within the virtual environment, a Remote Desktop Connection and PuTTY are the two ways
to: - CORRECT ANSWER✔✔- connect to the Linux terminal.


Which of the following does PuTTY use to securely access a remote computer? - CORRECT
ANSWER✔✔- The Secure Shell (SSH) protocol



Once connected, PuTTY displays a terminal shell: - CORRECT ANSWER✔✔- in which
Linux commands can be executed.


Which of the following is a key function in the Cisco IOS (Internetwork Operating System)?
- CORRECT ANSWER✔✔- The show command


The availability of commands in the Cisco IOS (Internetwork Operating System) is based on:
- CORRECT ANSWER✔✔- the privilege level of the user.


Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the ARP Ping
Scan was to: - CORRECT ANSWER✔✔- discover how many hosts are alive.


Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the TCP Port
Scan was to: - CORRECT ANSWER✔✔- identify open TCP ports.


Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the Service
Scan was to: - CORRECT ANSWER✔✔- look for fingerprints of known services by testing
responses to certain types of packets.


Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the
Traceroute was to: - CORRECT ANSWER✔✔- discover the IP path to the remote system.


Zenmap's Topology tab displays a __________ that shows the relative size and connection
type of all discovered IP hosts. - CORRECT ANSWER✔✔- bubble chart


Ethical hackers must obtain __________ prior to performing a scanning and vulnerability
assessment on a live production network. - CORRECT ANSWER✔✔- written authorization
from the client

, During the vulnerability assessment, any known vulnerabilities or bugs will be flagged and
identified by: - CORRECT ANSWER✔✔- Nessus


Which of the following work together to complete the scanning and vulnerability assessment
phase of the ethical hacking process? - CORRECT ANSWER✔✔- Nmap (Zenmap) and
Nessus


A successful __________ assessment of a network is all about using the right tools to map the
network and identify any vulnerabilities that can be the opening for a future attack. -
CORRECT ANSWER✔✔- scanning and vulnerability


Which of the following is a graphical interface for Nmap that is typically used during the
scanning phase of the ethical hacking process? - CORRECT ANSWER✔✔- Zenmap


Which of the following is a port scanning tool that can quickly identify hosts and detect what
operating system and services are running on them? - CORRECT ANSWER✔✔- Zenmap


The __________ confirms that the machine is available, but can't identify ports, operating
systems, or services. - CORRECT ANSWER✔✔- Ping scan


The raw data from the Nmap Output tab is grouped into a more readable form: - CORRECT
ANSWER✔✔- on the Ports/Hosts and Host Details tab for each host in the scan.


The __________ is a form of TCP scanning that is less intrusive on the target host. -
CORRECT ANSWER✔✔- SYN scan


The __________ can identify the services using the TCP protocol, but not the versions of
these applications. - CORRECT ANSWER✔✔- SYN scan


Within Zenmap, which command is used to begin the OS fingerprinting scan and determine
which operating systems are running on the network hosts? - CORRECT ANSWER✔✔- The
-O command

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £7.56. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

84866 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling

Recently viewed by you


£7.56
  • (0)
  Add to cart