CMIT 321 Final Exam (UMUC)
The Final Exam consists of 125 Questions + Answers:
- __________ is a worm for Windows XP that downloads and executes malicious files on the compromised computer and spreads through removable storage devices.
- __________ monitors and audits databases for security issues in real time.
- Which of the following attacks would you choose to seize control of a legitimate user’s web application session while the session is still in progress?
- __________ viruses search all drives and connected network shares to locate files with an EXE or SCR extension.
- In order for traffic to get back to the attacker during session hijacking, a process called __________ is used that allows the sender to specify a particular route for the IP packet to take to the destination.
- A __________ attack occurs when an attacker sends an oversized ping packet to a victim’s device.
- __________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it.
- Which of the following definitions best describes a wrapper?
- _________ hijacking is a hacking technique that uses spoofed packets to take over a connection between a victim and a target machine.
- Which of the following is not a Microsoft Internet Information Services vulnerability?
- The __________ script allows a remote user to view the code of server-side scripts.
- __________ automatically scans a computer, looking for cookies created by Internet Explorer, Mozilla Firefox, and Netscape Navigator, and then displays the data stored in each one.
- __________ is an application that identifies all Bluetooth-enabled devices, their communications, and their connectivity within a given area.
- __________ is a command-line TCP/IP packet assembler/analyzer.
- Bluetooth-enabled devices communicate via short-range, ad hoc networks known as __________.
- Redirections for URLs are handled with the __________ URL handler, which can cause errors in older versions of Internet Explorer.
- __________ is a short-range wireless communication technology intended to replace the cables connecting portable or fixed devices while maintaining high levels of security.
- Which of the following types of tools would be most effective in cracking UNIX passwords?
- __________ is a nonvoice service available with most GSM networks.
- Web applications have a three-layered architecture consisting of presentation, logic, and __________.
- After gaining access, what is the attacker’s next goal?
- __________ hackers are information security professionals who specialize in evaluating, and defending against, threats from attackers.
- The Network News Transport Protocol service uses port __________.
- Which of the following selections lists the four phases of a penetration test?
- __________ URLs, or intranets, are private links that only a company’s employees use.
- This type of port scanning technique splits a TCP header into several packets so that the packet filters cannot detect what the packets intend to do.
- __________ is a simple form of attack aimed directly at the application’s business logic.
- The __________ command displays the ARP table and is used to modify it.
- A good countermeasure against hijacking includes which of the following?
- A __________, also called a packet analyzer, is a software program that can capture, log, and analyze protocol traffic over the network and decode its contents.
- The Java-based __________ worm spreads through Bluetooth and affects unprotected Mac OS X 10.4 systems.
- ……………….
125. In the TCP/IP stack, the __________ layer is where applications and protocols, such as HTTP and Telnet, operate.
No comments:
Post a Comment