Australia Finance

Jan 31 2018

CMIT 321 2016 FINAL EXAM – Parida Amadou(username PAMADOU Attempt 1 Written Mar 6 2016

#war-dialing


#

CMIT 321 2016 FINAL EXAM – Parida Amadou(username PAMADOU.

Parida Amadou (username: PAMADOU) Attempt 1 Written: Mar 6, 2016 2:40 PM – Mar 6, 2016 6:03 PM Submission View Released: Mar 31, 2014 12:21 PM Exam ion 1 1 / 1 point __________ is the exploitation of an organization’s telephone, dial, and private branch exchange (PBX) system to infiltrate the internal network in order to abuse computing resources. a. War driving b. Line dialing c. PBX driving d. War dialing View Feedback ion 2 1 / 1 point __________ cryptography is the most common method on the Internet for authenticating a message sender or encrypting a message. a. Symmetric b. Hash-based c. Private-key d. Public-key View Feedback ion 3 1 / 1 point __________ is a lightweight Knoppix version cut to 50 MB for a business-card-sized CD. a. Gnoppix b. GeeXboX c. Morphix d. Damn Small Linux View Feedback ion 4 1 / 1 point The __________ utility tests the integrity of an ODBC data source. a. odbcping b. ASPRunner

This preview has intentionally blurred sections. Sign up to view the full version.

c. FlexTracer d. DbEncrypt View Feedback ion 5 1 / 1 point In the TCP/IP stack, the __________ layer is where applications and protocols, such as HTTP and Telnet, operate. a. Internet b. network c. transport d. application View Feedback ion 6 1 / 1 point Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error. They can fill in the username and password fields with __________. a. a pound sign b. two dashes c. a single quotation mark d. double quotes View Feedback ion 7 1 / 1 point __________ allow attackers to pass malicious code to different systems via a web application. a. SQL injection attacks b. XSS vulnerabilities c. Authentication hijacking attacks d. Command injection flaws View Feedback ion 8 1 / 1 point A __________ is a trusted entity that signs certificates and can vouch for the identity of the user and the user’s public key. a. verification authority b. certification authority c. validation authority

d. registration authority View Feedback ion 9 1 / 1 point Null sessions require access to TCP port __________. a. 139 b. 141 c. 345 d. 349 View Feedback ion 10 1 / 1 point __________ is a command-line utility provided by Microsoft with SQL Server 2000 (and Microsoft SQL Server 2000 Desktop Engine) that allows users to issue queries to the server. a. ODBC b. SQLP c. OSQL d. SSRS View Feedback ion 11 1 / 1 point The __________ file is used to determine which TTY devices the root user is allowed to log in to. a. /usr/securetty b. /etc/securetty c. /var/securetty d. /home/securetty View Feedback ion 12 1 / 1 point __________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it. a. CheckOK b. SMTPCheck c. SMTPMon d. SLCheck View Feedback ion 13 1 / 1 point

This preview has intentionally blurred sections. Sign up to view the full version.

__________ is a method of gaining access to sensitive data in a Bluetooth-enabled device. a. Bluebugging b. Bluesnarfing c. BTKeylogging d. Blueprinting View Feedback ion 14 1 / 1 point __________ is a simple form of attack aimed directly at the application’s business logic. a. Authentication hijacking b. Parameter tampering c. Cookie poisoning d. Session poisoning View Feedback ion 15 1 / 1 point Once the Oracle database server has been traced, the first port of call is made to the __________ listener.

Written by admin


Leave a Reply

Your email address will not be published. Required fields are marked *