08.06.2017 Views

CMIT 321 Quiz 1 Answers : Ethical Hacking

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>CMIT</strong> <strong>321</strong> <strong>Quiz</strong> 1 <strong>Answers</strong> / <strong>Ethical</strong><br />

<strong>Hacking</strong><br />

BUY HERE⬊<br />

https://www.homeworkmade.com/cmit-<br />

<strong>321</strong>-quiz-1-answers-ethical-hacking/<br />

<strong>CMIT</strong> <strong>321</strong> <strong>Quiz</strong> 1 <strong>Answers</strong> / <strong>Ethical</strong> <strong>Hacking</strong><br />

<strong>CMIT</strong> <strong>Quiz</strong> 1<br />

Is a worm for window XP that downloads and executes malicious files on the compromised computer and<br />

spreads through removable storage devices?<br />

a. HTTP W32.Drom<br />

b. W32/VBAut-B<br />

c. W32/QQRob-AND<br />

d. W32/Silly FDC- BK<br />

Monitors and audit databases for security issues in real time<br />

a. Selective Audit (may be)<br />

b. AppDetective<br />

c. AppRadar<br />

d. Flex Tracer<br />

Which of the following attack would you choose to seize control of a legitmate user’s web application session<br />

while the session is still in progress?<br />

a. Session hijacking<br />

b. DOS attack<br />

c. Password Sniffing<br />

d. Spoofing<br />

Viruses search all drives and connected network shares to locate files with an EXE or SCE extensions<br />

a. W32/Madang-Fam<br />

b. W32/Hasnot-A<br />

c. W32/Fujacks-AK<br />

d. W32/Fjacks-E<br />

In order for traffic to get back to the attacker during session hijacking, a process called -------- is used that<br />

allows the sender to specify a particular route for the IP packet to take to the destination.<br />

a. desynchronization<br />

b. Source routing<br />

c. Spoofing<br />

d. TCP routing<br />

A ----- attack occurs when a attacker sends an oversized packet to a victim’s device.<br />

a. Bluesmacking<br />

b. Blueprinting<br />

c. BTVoiceBugging


d. Bluesnarfing<br />

---- can monitor a simple mail transfer protocol (SMTP) server regularly after connecting to it.<br />

a. CheckOk<br />

b. SMTPCheck<br />

c. SMTPmom<br />

d. SLCheck<br />

Which of the following definitions best describes a wrapper?<br />

a. A wrapper is a packet-crafting techniques used to perform stealthy port scans.<br />

b. A wrapper is an encryption tool used to hide messages inside image files<br />

c. A wrapper is a method of hiding a virus inside an executable file<br />

d. A wrapper is a tool used to bind a Trojan to a legitimate file.<br />

------ hijacking is a hacking technique that uses spoofed packets to take over a connection between a victim<br />

and a target machine.<br />

a. ACK<br />

b. Blind<br />

c. TCP/IP<br />

d. Network-level<br />

Which of the following is not a Microsoft Internet information services vulnerability<br />

a. ::$Data vulmerability<br />

b. UFS integer overflow vulnerability<br />

c. Showcode.asp vulnerability<br />

d. WebDAV/R PC exploits<br />

The ----- scripts allows a remote user to view the code of server-side scripts.<br />

a. Showlogin.asp<br />

b. Showcode.asp<br />

c. RemoteAccess.asp<br />

d. Remotelogin.asp<br />

----- is acomand-line tool that is bundled with both windows and UNIX operating systems and is used to<br />

querying DNS information<br />

a. Whois<br />

b. Traceroute<br />

c. Netstat<br />

d. NsLookup<br />

Which type of information cannot be found ina resource record (RR)?<br />

a. MX<br />

b. ARP<br />

c. PTR<br />

d. SOA<br />

---- is a network scanning technique used to discover which range of IP address map to live computers<br />

a. Port scanning<br />

b. Ping Sweep<br />

c. Probe scanning<br />

d. Fingerprinting<br />

An attacker is interested in dscovering ports that might be open on a target system. The attacker decides to<br />

port scan the IP address of the system but also wants to make the scan as stealthy as possible. Which of the<br />

following techniques would be the best choice in this scenario?<br />

a. TCP connect scan<br />

b. SYN scan<br />

c. ICMP echo scan<br />

d. List scan<br />

During the reconnaissance phase of an attack, the attacker may resort to looking though an organization;s<br />

trash for discarded sensitive information. This technique is known as<br />

a. social engineering


. breaking and entering<br />

c. dumpster diving<br />

d. passive reconnaissance<br />

Which of the following are objectives of scanning (select all that apply)<br />

All<br />

The simple service discovery protocol will (choose 3)<br />

a. Not work behind a firewall<br />

b. Can be vulnerable to denial of service<br />

c. Uses multicast addresses<br />

d. Controls communication for the universal plug and play service<br />

Which port scanning method is considered the most reliable in terms of accurately reporting port status on a<br />

target system?<br />

a. TCP connect () scan<br />

b. SYN Scan<br />

c. ACK scan<br />

d. Xma Scan<br />

The following tools are used for foot printing (choose 3)<br />

a. Recong-ng<br />

b. Aircrack-ng<br />

c. Maltego<br />

d. FOCA<br />

---- is a spoofing technique that allows an attacker to choose the path a packet will take through the internet<br />

a. SYN Scanning<br />

b. Source Routing<br />

c. Tracerouting<br />

d. Http tunneling<br />

If you want to mask (or spoof your IP address, use this tyoe if scan)<br />

a. IDLE, IPID scan<br />

b. UDP Scan<br />

c. ACK Flag Probe Scan<br />

d. Stealth Scan

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!