CSIT 161 MIDTERM UPDATED Actual Exam Questions and CORRECT Answers
4 views 0 purchase
Module
CSIT 161
Institution
CSIT 161
CSIT 161 MIDTERM UPDATED Actual
Exam Questions and CORRECT Answers
To be effective, hackers and cybercriminals: - CORRECT ANSWER- only need to know
one vulnerability, or how to use one automated tool that attacks that vulnerability.
only need to know one vulnerability, or how to use one autom...
CSIT 161 MIDTERM UPDATED Actual
Exam Questions and CORRECT Answers
To be effective, hackers and cybercriminals: - CORRECT ANSWER✔✔- only need to know
one vulnerability, or how to use one automated tool that attacks that vulnerability.
only need to know one vulnerability, or how to use one automated tool that attacks that
vulnerability. - CORRECT ANSWER✔✔- only need to know one vulnerability, or how to
use one automated tool that attacks that vulnerability.
Which of the following is used to perform a scan of the network and create a network
topology chart? - CORRECT ANSWER✔✔- Zemap
Which of the following is a protocol analyzer tool (sometimes called a "packet sniffer") that
is used to capture IP traffic from a variety of sources? - CORRECT ANSWER✔✔-
Wireshark
Which of the following allows Wireshark to capture packets destined to any host on the same
subnet or virtual LAN (VLAN)? - CORRECT ANSWER✔✔- Promiscuous mode
Which of the following allows analysts to view and analyze network packet traces? -
CORRECT ANSWER✔✔- NetWitness Investigator
Which of the following performs remote scans and audits of Unix, Windows, and network
infrastructures and can perform a network discovery of devices, operating systems,
applications, databases, and services running on those devices? - CORRECT ANSWER✔✔-
Nessus
Which of the following is used to transfer files using the File Transfer Protocol (FTP) to and
from the vWorkstation? - CORRECT ANSWER✔✔- FileZilla
Most Linux interactions take place: - CORRECT ANSWER✔✔- from the command line.
,Within the virtual environment, a Remote Desktop Connection and PuTTY are the two ways
to: - CORRECT ANSWER✔✔- connect to the Linux terminal.
Which of the following does PuTTY use to securely access a remote computer? - CORRECT
ANSWER✔✔- The Secure Shell (SSH) protocol
Once connected, PuTTY displays a terminal shell: - CORRECT ANSWER✔✔- in which
Linux commands can be executed.
Which of the following is a key function in the Cisco IOS (Internetwork Operating System)?
- CORRECT ANSWER✔✔- The show command
The availability of commands in the Cisco IOS (Internetwork Operating System) is based on:
- CORRECT ANSWER✔✔- the privilege level of the user.
Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the ARP Ping
Scan was to: - CORRECT ANSWER✔✔- discover how many hosts are alive.
Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the TCP Port
Scan was to: - CORRECT ANSWER✔✔- identify open TCP ports.
Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the Service
Scan was to: - CORRECT ANSWER✔✔- look for fingerprints of known services by testing
responses to certain types of packets.
Based on your interpretation of the Zenmap Intense Scan, the purpose/results of the
Traceroute was to: - CORRECT ANSWER✔✔- discover the IP path to the remote system.
Zenmap's Topology tab displays a __________ that shows the relative size and connection
type of all discovered IP hosts. - CORRECT ANSWER✔✔- bubble chart
Ethical hackers must obtain __________ prior to performing a scanning and vulnerability
assessment on a live production network. - CORRECT ANSWER✔✔- written authorization
from the client
, During the vulnerability assessment, any known vulnerabilities or bugs will be flagged and
identified by: - CORRECT ANSWER✔✔- Nessus
Which of the following work together to complete the scanning and vulnerability assessment
phase of the ethical hacking process? - CORRECT ANSWER✔✔- Nmap (Zenmap) and
Nessus
A successful __________ assessment of a network is all about using the right tools to map the
network and identify any vulnerabilities that can be the opening for a future attack. -
CORRECT ANSWER✔✔- scanning and vulnerability
Which of the following is a graphical interface for Nmap that is typically used during the
scanning phase of the ethical hacking process? - CORRECT ANSWER✔✔- Zenmap
Which of the following is a port scanning tool that can quickly identify hosts and detect what
operating system and services are running on them? - CORRECT ANSWER✔✔- Zenmap
The __________ confirms that the machine is available, but can't identify ports, operating
systems, or services. - CORRECT ANSWER✔✔- Ping scan
The raw data from the Nmap Output tab is grouped into a more readable form: - CORRECT
ANSWER✔✔- on the Ports/Hosts and Host Details tab for each host in the scan.
The __________ is a form of TCP scanning that is less intrusive on the target host. -
CORRECT ANSWER✔✔- SYN scan
The __________ can identify the services using the TCP protocol, but not the versions of
these applications. - CORRECT ANSWER✔✔- SYN scan
Within Zenmap, which command is used to begin the OS fingerprinting scan and determine
which operating systems are running on the network hosts? - CORRECT ANSWER✔✔- The
-O command
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £7.56. You're not tied to anything after your purchase.