100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CMIT 321| ETHICAL HACKING| FINAL EXAM QUESTIONS WITH DETAILED ANSWERS GRADED A $10.99   Add to cart

Exam (elaborations)

CMIT 321| ETHICAL HACKING| FINAL EXAM QUESTIONS WITH DETAILED ANSWERS GRADED A

 9 views  0 purchase
  • Course
  • CMIT 321| ETHICAL HACKING
  • Institution
  • CMIT 321| ETHICAL HACKING

CMIT 321| ETHICAL HACKING| FINAL EXAM QUESTIONS WITH DETAILED ANSWERS GRADED A If you wanted to restrict Google results to stay within the target organization, which is the most likely command that you would add to the Search Bar? Site: Inurl: Allinurl: IsDomain: - Answer-Site: /.If y...

[Show more]

Preview 3 out of 22  pages

  • September 29, 2024
  • 22
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • cmit 321 ethical hacking
  • CMIT 321| ETHICAL HACKING
  • CMIT 321| ETHICAL HACKING
avatar-seller
kartelodoc
If you wanted to restrict Google results to stay within the target organization, which is
the most likely command that you would add to the Search Bar?

Site:
Inurl:
Allinurl:
IsDomain: - Answer-Site:

/.If you want to show the results that specifically do not include certain keywords, what
command would you add to the Search Bar?

-
Exclude:
NotInURL:
Not: - Answer--

/.Which of the following would you most likely use if you wanted to only show results for
documents that included, for instance, "SteamAppUser=" -"username" -"user"

intext:
ispassphrase:
Type:Steam:
Type:PassPhrase - Answer-intext:

/.What technique would you use if you wanted to view the current contents of a website
without revealing your IP details in the target site's web activity logs?

&strip=1
Right Click the 'cache button'
Browse in Incognito Mode
WayBack Machine - Answer-&strip=1

/.If you were looking for an Apache Status page, what command would you most likely
add to the Google Search Bar?

intitle:
intext:
inurl:
IsStatus: - Answer-intitle:

/.Which of the following is not included in reconnaissance?

,Vulnerability Exploitation
Publicly Available Information
Scanning the organization's website
Reviewing Staff LinkedIn pages - Answer-Vulnerability Exploitation

/.Which of the following statements is incorrect?

- NSLOOKUP will provide details regarding who registered the address with the correct
command line options.

- NSLOOKUP and WHOIS are available as command-line utilities.

- ARIN is one of five regional registries.

- ARIN/WHOIS search results may provide direct phone numbers for the registrant. -
Answer-NSLOOKUP will provide details regarding who registered the address with the
correct command line options.

/.If you wanted to restrict your search to only Adobe Acrobat documents, what option
would you add to the search bar?

FileType:
Intitle:
Intext:
IsPDF: - Answer-FileType:

/.Which of the following commands would you most likely add to the Google Search Bar
to show results that contain all of the query terms, such as if you were looking for an
Outlook Web Access logon page?

allinurl:
insite:
islogon:
filetype: - Answer-allinurl:

/.What might you use if you wanted to view the website that has changed over time?

WayBack Machine
Time Capsule
Google Hacking
DuckDuckGo - Answer-WayBack Machine

/.Which of the following is used to convert an IP address to a MAC address?

ARP

, ICMP
DNS
DHCP - Answer-ARP

/.Which of the following networking devices would repeat every packet to every port?

Hub
Switch
Bridge
Router - Answer-Hub

/.Which of the following is considered a Non-Routable Class B Address that would be
assigned to a specific host?

10.0.0.2
127.0.0.1
172.16.13.1
192.168.3.82 - Answer-172.16.13.1

/.Which of the following networking devices would know what packets to pass out of the
local segment?

- Hub
- Switch
- Router
- Proxy - Answer-Router

/.Which of the following would a firewall NOT filter traffic based on?

- MAC Address
- IP address
- Port
- Protocol Type - Answer-MAC Address

/.Which of the following would convert non-routable addresses to routable addresses?

- Network Address Translation

- Wired Equivalent Privacy

- Dynamic Host Configuration Protocol

- Automatic Private IP Addressing - Answer-Network Address Translation

/.When a networking devices retains data about previous packets, what is being
determined?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller kartelodoc. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

64438 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99
  • (0)
  Add to cart