Final Test

3050 words 13 pages
CMIT 321: Ethical Hacking
Final Examination
This timed final exam will consist of 100 multiple-choice questions, and you will have four hours to complete it. Carefully note the information provided in the yellow box below.
An error occurred while attempting to insert your grade into the WebTycho Gradebook. Your instructor has been notified to insert the grade manually. No further action is required on your part.
Your answers to this activity have been submitted to your instructor. You may review your submitted answers at any time through the My Submissions link in the left menu.

1. __________ is a method in which a sniffer is used to track down a conversation between two users. a. A man-in-the-middle (MITM) attack b. Session
…show more content…

In __________-level hijacking, the attacker obtains the session IDs to get control of an existing session or to create a new, unauthorized session. a. network b. data link c. transport d. application
29. The contract agreement that describes the terms of service an outsourcer provides is known as a __________. a. service-level agreement (SLA) b. rule of engagement c. due contract d. project scope statement
30. __________ provides a complete view for monitoring and analyzing activity within USB host controllers, USB hubs, and USB devices. a. USB PC Lock b. USBlyzer c. Advanced USB Monitor d. Virus Chaser USB
31. Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error. They can fill in the username and password fields with __________. a. a pound sign b. two dashes c. a single quotation mark d. double quotes
32. __________ reconstructs a device's Bluetooth PIN and link key from data sniffed during a pairing session. a. Blooover b. Hidattack c. BTCrack d. Cabir and Mabir
33. __________ is a tool that combines web crawling with the capability of a personal proxy. a. WebSleuth b. BlackWidow c. SiteScope d. WSDigger
34. __________ is a secure method of posting data to the database. a. URL b. SQL c. GET d. POST
35. __________ is a lightweight Knoppix version cut to 50 MB for a business-card-sized CD. a. Gnoppix b. GeeXboX c. Morphix d. Damn Small Linux
36. A hacker has

Related

  • Stat 200 Final Exam
    1888 words | 8 pages
  • Colonial Broadcasting
    3616 words | 15 pages
  • PSY 325 Statistics for Behavioral and Social Science, Ashford
    1414 words | 6 pages
  • outline of the final lab report
    2593 words | 11 pages
  • Comm 215 Syllabus
    1453 words | 6 pages
  • Qnt 275 Statistics for Decision Making Final Exam
    1167 words | 5 pages
  • Recruiting, Selecting, Orienting, and Training
    1313 words | 6 pages
  • | the Occurrence of Osmosis and Diffusion in Artificial and Living Cells
    3653 words | 15 pages
  • Vitamin C Content of Fruit Juices
    2410 words | 10 pages
  • Case Solutions Deloitte
    5660 words | 23 pages