SlideShare a Scribd company logo
1 of 17
Download to read offline
Buy here:
http://theperfecthomework.com/cmit-321-final-exam-201
6-version/
Final Exam
Question 1 1 / 1 point
__________ is the exploitation of an organization's telephone, dial, and private branch
exchange (PBX) system to infiltrate the internal network in order to abuse computing
resources.
a. War driving
b. Line dialing
c. PBX driving
d. War dialing
View Feedback
Question 2 1 / 1 point
__________ cryptography is the most common method on the Internet for authenticating a
message sender or encrypting a message.
a. Symmetric
b. Hash-based
c. Private-key
d. Public-key
View Feedback
Question 3 1 / 1 point
__________ is a lightweight Knoppix version cut to 50 MB for a business-card-sized CD.
a. Gnoppix
b. GeeXboX
c. Morphix
d. Damn Small Linux
View Feedback
Question 4 1 / 1 point
The __________ utility tests the integrity of an ODBC data source.
a. odbcping
b. ASPRunner
c. FlexTracer
d. DbEncrypt
View Feedback
Question 5 1 / 1 point
In the TCP/IP stack, the __________ layer is where applications and protocols, such as
HTTP and Telnet, operate.
a. Internet
b. network
c. transport
d. application
View Feedback
Question 6 1 / 1 point
Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error.
They can fill in the username and password fields with __________.
a. a pound sign
b. two dashes
c. a single quotation mark
d. double quotes
View Feedback
Question 7 1 / 1 point
__________ allow attackers to pass malicious code to different systems via a web
application.
a. SQL injection attacks
b. XSS vulnerabilities
c. Authentication hijacking attacks
d. Command injection flaws
View Feedback
Question 8 1 / 1 point
A __________ is a trusted entity that signs certificates and can vouch for the identity of the
user and the user's public key.
a. verification authority
b. certification authority
c. validation authority
d. registration authority
View Feedback
Question 9 1 / 1 point
Null sessions require access to TCP port __________.
a. 139
b. 141
c. 345
d. 349
View Feedback
Question 10 1 / 1 point
__________ is a command-line utility provided by Microsoft with SQL Server 2000 (and
Microsoft SQL Server 2000 Desktop Engine) that allows users to issue queries to the server.
a. ODBC
b. SQLP
c. OSQL
d. SSRS
View Feedback
Question 11 1 / 1 point
The __________ file is used to determine which TTY devices the root user is allowed to log
in to.
a. /usr/securetty
b. /etc/securetty
c. /var/securetty
d. /home/securetty
View Feedback
Question 12 1 / 1 point
__________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after
connecting to it.
a. CheckOK
b. SMTPCheck
c. SMTPMon
d. SLCheck
View Feedback
Question 13 1 / 1 point
__________ is a method of gaining access to sensitive data in a Bluetooth-enabled device.
a. Bluebugging
b. Bluesnarfing
c. BTKeylogging
d. Blueprinting
View Feedback
Question 14 1 / 1 point
__________ is a simple form of attack aimed directly at the application's business logic.
a. Authentication hijacking
b. Parameter tampering
c. Cookie poisoning
d. Session poisoning
View Feedback
Question 15 1 / 1 point
Once the Oracle database server has been traced, the first port of call is made to the
__________ listener.
a. SQL
b. TNS
c. TCP
d. PL/SQL
View Feedback
Question 16 1 / 1 point
__________ is a common and easy form of SQL injection. The technique involves evading
the logon forms.
a. Command injection
b. SELECT bypass
c. INSERT injection
d. Authorization bypass
View Feedback
Question 17 1 / 1 point
__________ gathering is the process of accumulating information from resources like the
Internet that can later be analyzed as business intelligence.
a. Competitive intelligence
b. Tracerouting
c. Passive information
d. Footprinting
View Feedback
Question 18 1 / 1 point
__________, formerly called AppTapp, is a tool for jailbreaking and installing nonsanctioned
third-party applications on the iPhone.
a. iFuntastic
b. iNdependence
c. iActivator
d. AppSnapp
View Feedback
Question 19 1 / 1 point
Firefox 2.0.0.11 cannot correctly interpret single quotation marks and spaces during
authentication. This is called the __________ value of an authentication header.
a. registration
b. site
c. domain
d. realm
View Feedback
Question 20 1 / 1 point
Private data stored by Firefox can be quickly deleted by selecting __________ in the Tools
menu.
a. Clear History
b. Clear Private Data
c. Delete Private Data
d. Delete History
View Feedback
Question 21 1 / 1 point
A(n) __________ is a custom command in Linux that is a substitute for a formal command
string.
a. user string
b. system link
c. alias
d. link
View Feedback
Question 22 1 / 1 point
A __________ is a device that cannot function in any capacity.
a. block
b. brick
c. rock
d. cage
View Feedback
Question 23 0 / 1 point
__________ involves plotting the tables in the database.
a. Database enumeration
b. Database footprinting
c. Table footprinting
d. Table enumeration
View Feedback
Question 24 1 / 1 point
A __________ is a device that receives digital signals and converts them into analog
signals, and vice versa.
a. firewall
b. proxy
c. hub
d. modem
View Feedback
Question 25 1 / 1 point
Which of the following types of tools would be most effective in cracking UNIX passwords?
a. Ophcrack
b. KerbCrack
c. John the Ripper
d. RainbowCrack
View Feedback
Question 26 1 / 1 point
SQL Server, like other databases, delimits queries with a __________.
a. colon
b. period
c. semicolon
d. comma
View Feedback
Question 27 1 / 1 point
__________ is a unique 15- or 17-digit code used to identify a mobile station to a GSM
network.
a. IMEI
b. SIMID
c. SIM
d. PhoneID
View Feedback
Question 28 1 / 1 point
Which of the following password attacks is conducted using nontechnical means?
a. hybrid
b. brute force
c. social engineering
d. rainbow tables
View Feedback
Question 29 1 / 1 point
In __________-level hijacking, the attacker obtains the session IDs to get control of an
existing session or to create a new, unauthorized session.
a. network
b. data link
c. transport
d. application
View Feedback
Question 30 1 / 1 point
Which of the tools listed below can be used to execute code on remote Windows systems?
a. X.exe
b. PsExec
c. Rsync
d. Ghost
View Feedback

More Related Content

What's hot

100 objective question eis
100 objective question eis100 objective question eis
100 objective question eis
gajani121
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
IJNSA Journal
 

What's hot (8)

Reverse Engineering: Protecting and Breaking the Software
Reverse Engineering: Protecting and Breaking the SoftwareReverse Engineering: Protecting and Breaking the Software
Reverse Engineering: Protecting and Breaking the Software
 
Hrishikesh Choudhari - Overview Of Cracks
Hrishikesh Choudhari - Overview Of CracksHrishikesh Choudhari - Overview Of Cracks
Hrishikesh Choudhari - Overview Of Cracks
 
In the lands of corrupted elves - Breaking ELF software with Melkor fuzzer
In the lands of corrupted elves - Breaking ELF software with Melkor fuzzerIn the lands of corrupted elves - Breaking ELF software with Melkor fuzzer
In the lands of corrupted elves - Breaking ELF software with Melkor fuzzer
 
Building HMI with VB Tutorial [1998]
Building HMI with VB Tutorial [1998]Building HMI with VB Tutorial [1998]
Building HMI with VB Tutorial [1998]
 
Reverse Engineering 101
Reverse Engineering 101Reverse Engineering 101
Reverse Engineering 101
 
Offensive cyber security: Smashing the stack with Python
Offensive cyber security: Smashing the stack with PythonOffensive cyber security: Smashing the stack with Python
Offensive cyber security: Smashing the stack with Python
 
100 objective question eis
100 objective question eis100 objective question eis
100 objective question eis
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
 

Viewers also liked

Бібліографічний запис-Бібліографічний опис Gost7 1-06
Бібліографічний запис-Бібліографічний опис Gost7 1-06Бібліографічний запис-Бібліографічний опис Gost7 1-06
Бібліографічний запис-Бібліографічний опис Gost7 1-06
Lana Nazarieva
 
Ftp (file transfer protocol)
Ftp (file transfer protocol)Ftp (file transfer protocol)
Ftp (file transfer protocol)
Raghu nath
 

Viewers also liked (13)

Herramientas colaborativas administración de cursos de formación online
Herramientas colaborativas administración de cursos de formación onlineHerramientas colaborativas administración de cursos de formación online
Herramientas colaborativas administración de cursos de formación online
 
CMIS 320 RESEARCH PAPER
CMIS 320 RESEARCH PAPERCMIS 320 RESEARCH PAPER
CMIS 320 RESEARCH PAPER
 
Entrevista Hector Robles revista MED PLUS n99
Entrevista Hector Robles revista MED PLUS n99Entrevista Hector Robles revista MED PLUS n99
Entrevista Hector Robles revista MED PLUS n99
 
CMSC 350 FINAL PROJECT
CMSC 350 FINAL PROJECTCMSC 350 FINAL PROJECT
CMSC 350 FINAL PROJECT
 
CMIT 321 WEEK 2 QUIZ
CMIT 321 WEEK 2 QUIZCMIT 321 WEEK 2 QUIZ
CMIT 321 WEEK 2 QUIZ
 
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAMCMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
 
Финал конкурса "Учитель года-2016"
Финал конкурса "Учитель года-2016"Финал конкурса "Учитель года-2016"
Финал конкурса "Учитель года-2016"
 
Todo proyecto es un trabajo, pero no todo trabajo es un proyectos
Todo proyecto es un trabajo, pero no todo trabajo es un proyectosTodo proyecto es un trabajo, pero no todo trabajo es un proyectos
Todo proyecto es un trabajo, pero no todo trabajo es un proyectos
 
Бібліографічний запис-Бібліографічний опис Gost7 1-06
Бібліографічний запис-Бібліографічний опис Gost7 1-06Бібліографічний запис-Бібліографічний опис Gost7 1-06
Бібліографічний запис-Бібліографічний опис Gost7 1-06
 
Методы и программа исследования _ занятие Тамары Кулинкович _ www.businessres...
Методы и программа исследования _ занятие Тамары Кулинкович _ www.businessres...Методы и программа исследования _ занятие Тамары Кулинкович _ www.businessres...
Методы и программа исследования _ занятие Тамары Кулинкович _ www.businessres...
 
Highlights: 2016 Enrollment Estimates
Highlights: 2016 Enrollment EstimatesHighlights: 2016 Enrollment Estimates
Highlights: 2016 Enrollment Estimates
 
Child labour in pakistan
Child labour in pakistan Child labour in pakistan
Child labour in pakistan
 
Ftp (file transfer protocol)
Ftp (file transfer protocol)Ftp (file transfer protocol)
Ftp (file transfer protocol)
 

Similar to CMIT 321 FINAL EXAM (2016 VERSION)

Specialist marketing officer professional knowledge questions.pdf(1)
Specialist marketing officer professional knowledge questions.pdf(1)Specialist marketing officer professional knowledge questions.pdf(1)
Specialist marketing officer professional knowledge questions.pdf(1)
Nivi Mohanty
 
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docxREVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
joellemurphey
 
Group 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxGroup 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docx
JeanmarieColbert3
 
Question 1IP addresses are used at the data link layer.True Fa.pdf
Question 1IP addresses are used at the data link layer.True Fa.pdfQuestion 1IP addresses are used at the data link layer.True Fa.pdf
Question 1IP addresses are used at the data link layer.True Fa.pdf
udit652068
 
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
cravennichole326
 
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
elbanglis
 
template for worksheet.docx
template for worksheet.docxtemplate for worksheet.docx
template for worksheet.docx
ComputerBwp
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
Dsunte Wilson
 

Similar to CMIT 321 FINAL EXAM (2016 VERSION) (20)

Cmit 321 final exam new spring 2016
Cmit 321 final exam new  spring 2016 Cmit 321 final exam new  spring 2016
Cmit 321 final exam new spring 2016
 
Cmit 321 final exam new spring 2016
Cmit 321 final exam new  spring 2016Cmit 321 final exam new  spring 2016
Cmit 321 final exam new spring 2016
 
Cmit 321 final exam new spring 2016
Cmit 321 final exam new  spring 2016Cmit 321 final exam new  spring 2016
Cmit 321 final exam new spring 2016
 
exam2
exam2exam2
exam2
 
Specialist marketing officer professional knowledge questions.pdf(1)
Specialist marketing officer professional knowledge questions.pdf(1)Specialist marketing officer professional knowledge questions.pdf(1)
Specialist marketing officer professional knowledge questions.pdf(1)
 
Set3 ict-question
Set3 ict-questionSet3 ict-question
Set3 ict-question
 
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docxREVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
 
Group 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxGroup 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docx
 
Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015
 
Question 1IP addresses are used at the data link layer.True Fa.pdf
Question 1IP addresses are used at the data link layer.True Fa.pdfQuestion 1IP addresses are used at the data link layer.True Fa.pdf
Question 1IP addresses are used at the data link layer.True Fa.pdf
 
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
 
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
 
Abc and w7.
Abc and w7.Abc and w7.
Abc and w7.
 
template for worksheet.docx
template for worksheet.docxtemplate for worksheet.docx
template for worksheet.docx
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
 
41319760 info-sys (1)
41319760 info-sys (1)41319760 info-sys (1)
41319760 info-sys (1)
 
Significance
SignificanceSignificance
Significance
 
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
 
5_2018_08_07!07_51_31_AM.pdf
5_2018_08_07!07_51_31_AM.pdf5_2018_08_07!07_51_31_AM.pdf
5_2018_08_07!07_51_31_AM.pdf
 
Certified ethical hacker (cehv11) exam dumps 2022
Certified ethical hacker (cehv11) exam dumps 2022Certified ethical hacker (cehv11) exam dumps 2022
Certified ethical hacker (cehv11) exam dumps 2022
 

More from HamesKellor

More from HamesKellor (20)

CMST 290 FINAL EXAM
CMST 290 FINAL EXAMCMST 290 FINAL EXAM
CMST 290 FINAL EXAM
 
CMST 301 PROJECT 1 CASE STUDY
CMST 301 PROJECT 1 CASE STUDYCMST 301 PROJECT 1 CASE STUDY
CMST 301 PROJECT 1 CASE STUDY
 
CMSC 350 PROJECT 3
CMSC 350 PROJECT 3CMSC 350 PROJECT 3
CMSC 350 PROJECT 3
 
CMSC 350 PROJECT 4
CMSC 350 PROJECT 4 CMSC 350 PROJECT 4
CMSC 350 PROJECT 4
 
CMSC 350 PROJECT 4
CMSC 350 PROJECT 4CMSC 350 PROJECT 4
CMSC 350 PROJECT 4
 
CMSC 350 PROJECT 1
CMSC 350 PROJECT 1CMSC 350 PROJECT 1
CMSC 350 PROJECT 1
 
CMSC 350 HOMEWORK 2
CMSC 350 HOMEWORK 2CMSC 350 HOMEWORK 2
CMSC 350 HOMEWORK 2
 
CMSC 350 HOMEWORK 3
CMSC 350 HOMEWORK 3CMSC 350 HOMEWORK 3
CMSC 350 HOMEWORK 3
 
CMSC 350 HOMEWORK 1
CMSC 350 HOMEWORK 1CMSC 350 HOMEWORK 1
CMSC 350 HOMEWORK 1
 
CMSC 335 HOMEWORK 3
CMSC 335 HOMEWORK 3CMSC 335 HOMEWORK 3
CMSC 335 HOMEWORK 3
 
CMSC 330 PROJECT 1
CMSC 330 PROJECT 1CMSC 330 PROJECT 1
CMSC 330 PROJECT 1
 
CMSC 335 FINAL PROJECT
CMSC 335 FINAL PROJECTCMSC 335 FINAL PROJECT
CMSC 335 FINAL PROJECT
 
CMSC 330 QUIZ 4
CMSC 330 QUIZ 4CMSC 330 QUIZ 4
CMSC 330 QUIZ 4
 
CMIT 425 RISK ASSESSMENT PAPER
CMIT 425 RISK ASSESSMENT PAPERCMIT 425 RISK ASSESSMENT PAPER
CMIT 425 RISK ASSESSMENT PAPER
 
CMIT 391 LINUX IMPLEMENTATION PROPOSAL
CMIT 391 LINUX IMPLEMENTATION PROPOSALCMIT 391 LINUX IMPLEMENTATION PROPOSAL
CMIT 391 LINUX IMPLEMENTATION PROPOSAL
 
CMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSAL
CMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSALCMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSAL
CMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSAL
 
CMIT 321 WEEK 2 QUIZ.
CMIT 321 WEEK 2 QUIZ.CMIT 321 WEEK 2 QUIZ.
CMIT 321 WEEK 2 QUIZ.
 
CMIT 370 FINAL EXAM
CMIT 370 FINAL EXAMCMIT 370 FINAL EXAM
CMIT 370 FINAL EXAM
 
CMIT 321 QUIZ 4
CMIT 321 QUIZ 4CMIT 321 QUIZ 4
CMIT 321 QUIZ 4
 
CMIT 321 QUIZ 7
CMIT 321 QUIZ 7CMIT 321 QUIZ 7
CMIT 321 QUIZ 7
 

Recently uploaded

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 

Recently uploaded (20)

Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 

CMIT 321 FINAL EXAM (2016 VERSION)

  • 1. Buy here: http://theperfecthomework.com/cmit-321-final-exam-201 6-version/ Final Exam Question 1 1 / 1 point __________ is the exploitation of an organization's telephone, dial, and private branch exchange (PBX) system to infiltrate the internal network in order to abuse computing resources. a. War driving b. Line dialing c. PBX driving d. War dialing View Feedback Question 2 1 / 1 point __________ cryptography is the most common method on the Internet for authenticating a message sender or encrypting a message.
  • 2. a. Symmetric b. Hash-based c. Private-key d. Public-key View Feedback Question 3 1 / 1 point __________ is a lightweight Knoppix version cut to 50 MB for a business-card-sized CD. a. Gnoppix b. GeeXboX c. Morphix d. Damn Small Linux View Feedback Question 4 1 / 1 point The __________ utility tests the integrity of an ODBC data source.
  • 3. a. odbcping b. ASPRunner c. FlexTracer d. DbEncrypt View Feedback Question 5 1 / 1 point In the TCP/IP stack, the __________ layer is where applications and protocols, such as HTTP and Telnet, operate. a. Internet b. network c. transport d. application View Feedback Question 6 1 / 1 point
  • 4. Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error. They can fill in the username and password fields with __________. a. a pound sign b. two dashes c. a single quotation mark d. double quotes View Feedback Question 7 1 / 1 point __________ allow attackers to pass malicious code to different systems via a web application. a. SQL injection attacks b. XSS vulnerabilities c. Authentication hijacking attacks d. Command injection flaws View Feedback
  • 5. Question 8 1 / 1 point A __________ is a trusted entity that signs certificates and can vouch for the identity of the user and the user's public key. a. verification authority b. certification authority c. validation authority d. registration authority View Feedback Question 9 1 / 1 point Null sessions require access to TCP port __________. a. 139 b. 141 c. 345 d. 349 View Feedback
  • 6. Question 10 1 / 1 point __________ is a command-line utility provided by Microsoft with SQL Server 2000 (and Microsoft SQL Server 2000 Desktop Engine) that allows users to issue queries to the server. a. ODBC b. SQLP c. OSQL d. SSRS View Feedback Question 11 1 / 1 point The __________ file is used to determine which TTY devices the root user is allowed to log in to. a. /usr/securetty b. /etc/securetty c. /var/securetty d. /home/securetty
  • 7. View Feedback Question 12 1 / 1 point __________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it. a. CheckOK b. SMTPCheck c. SMTPMon d. SLCheck View Feedback Question 13 1 / 1 point __________ is a method of gaining access to sensitive data in a Bluetooth-enabled device. a. Bluebugging b. Bluesnarfing c. BTKeylogging
  • 8. d. Blueprinting View Feedback Question 14 1 / 1 point __________ is a simple form of attack aimed directly at the application's business logic. a. Authentication hijacking b. Parameter tampering c. Cookie poisoning d. Session poisoning View Feedback Question 15 1 / 1 point Once the Oracle database server has been traced, the first port of call is made to the __________ listener. a. SQL b. TNS
  • 9. c. TCP d. PL/SQL View Feedback Question 16 1 / 1 point __________ is a common and easy form of SQL injection. The technique involves evading the logon forms. a. Command injection b. SELECT bypass c. INSERT injection d. Authorization bypass View Feedback Question 17 1 / 1 point __________ gathering is the process of accumulating information from resources like the Internet that can later be analyzed as business intelligence. a. Competitive intelligence
  • 10. b. Tracerouting c. Passive information d. Footprinting View Feedback Question 18 1 / 1 point __________, formerly called AppTapp, is a tool for jailbreaking and installing nonsanctioned third-party applications on the iPhone. a. iFuntastic b. iNdependence c. iActivator d. AppSnapp View Feedback Question 19 1 / 1 point Firefox 2.0.0.11 cannot correctly interpret single quotation marks and spaces during authentication. This is called the __________ value of an authentication header.
  • 11. a. registration b. site c. domain d. realm View Feedback Question 20 1 / 1 point Private data stored by Firefox can be quickly deleted by selecting __________ in the Tools menu. a. Clear History b. Clear Private Data c. Delete Private Data d. Delete History View Feedback Question 21 1 / 1 point
  • 12. A(n) __________ is a custom command in Linux that is a substitute for a formal command string. a. user string b. system link c. alias d. link View Feedback Question 22 1 / 1 point A __________ is a device that cannot function in any capacity. a. block b. brick c. rock d. cage View Feedback
  • 13. Question 23 0 / 1 point __________ involves plotting the tables in the database. a. Database enumeration b. Database footprinting c. Table footprinting d. Table enumeration View Feedback Question 24 1 / 1 point A __________ is a device that receives digital signals and converts them into analog signals, and vice versa. a. firewall b. proxy c. hub d. modem View Feedback
  • 14. Question 25 1 / 1 point Which of the following types of tools would be most effective in cracking UNIX passwords? a. Ophcrack b. KerbCrack c. John the Ripper d. RainbowCrack View Feedback Question 26 1 / 1 point SQL Server, like other databases, delimits queries with a __________. a. colon b. period c. semicolon d. comma View Feedback
  • 15. Question 27 1 / 1 point __________ is a unique 15- or 17-digit code used to identify a mobile station to a GSM network. a. IMEI b. SIMID c. SIM d. PhoneID View Feedback Question 28 1 / 1 point Which of the following password attacks is conducted using nontechnical means? a. hybrid b. brute force c. social engineering d. rainbow tables
  • 16. View Feedback Question 29 1 / 1 point In __________-level hijacking, the attacker obtains the session IDs to get control of an existing session or to create a new, unauthorized session. a. network b. data link c. transport d. application View Feedback Question 30 1 / 1 point Which of the tools listed below can be used to execute code on remote Windows systems? a. X.exe b. PsExec c. Rsync