CMIT 321 Final Exam Version 2. Questions And Answers. Latest Exam.A __________ is a device that receives digital signals and converts them into analog
... [Show More] signals, and vice
versa.
a. firewall
b. proxy
c. hub
d. modem
View Feedback
Question 2 1 / 1 point
__________ is a parallelized login cracker that supports numerous protocols for attack.
a. ADMsnmp
b. SING
c. Hydra
d. John the Ripper
View Feedback
Question 3 1 / 1 point
An __________ share is a hidden share that allows communication between two processes on the same
system.
a. SMC
b. IPC
c. EPC
d. SMB
View Feedback
Question 4 1 / 1 point
__________ monitors and audits databases for security issues in real time.
a. Selective Audit
b. AppDetective
c. AppRadar
d. FlexTracer
View Feedback
Question 5 1 / 1 point
__________ is a command-line utility provided by Microsoft with SQL Server 2000 (and Microsoft SQL
Server 2000 Desktop Engine) that allows users to issue queries to the server.
a. ODBC
b. SQLP
c. OSQL
d. SSRS
View Feedback
Question 6 1 / 1 point
__________ allows applications to read and write various image file formats, including GIF.
a. ImageCore
b. CoreText
c. ImageIO
d. CoreImage
View Feedback
Question 7 1 / 1 point
Which of the following types of tools would be most effective in cracking UNIX passwords?
a. Ophcrack
b. KerbCrack
c. John the Ripper
d. RainbowCrack
View Feedback
Question 8 1 / 1 point
A __________ is a device that cannot function in any capacity.
a. block
b. brick
c. rock
d. cage
View Feedback
Question 9 1 / 1 point
__________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it.
a. CheckOK
b. SMTPCheck
c. SMTPMon
d. SLCheck
View Feedback
Question 10 1 / 1 point
In a hit-and-run attack, __________.
a. the attacker constantly injects bad packets into the router
b. the attacker mistreats packets, resulting in traffic congestion
c. the attacker injects a few bad packets into the router
d. the attacker alters a single packet, resulting in denial of service
View Feedback
Question 11 1 / 1 point
__________ is the act of gathering information about the security profile of a computer system or
organization, undertaken in a methodological manner.
a. Tracerouting
b. Passive information gathering
c. Footprinting
d. Competitive intelligence gathering
View Feedback
Question 12 1 / 1 point
__________, formerly called AppTapp, is a tool for jailbreaking and installing nonsanctioned third-party
applications on the iPhone.
a. iFuntastic
b. iNdependence
c. iActivator
d. AppSnapp
View Feedback
Question 13 1 / 1 point
__________ is a tool for performing automated attacks against web-enabled applications.
a. cURL
b. dotDefender
c. Burp Intruder
d. AppScan
View Feedback
Question 14 1 / 1 point
A __________, also called a packet analyzer, is a software program that can capture, log, and analyze
protocol traffic over the network and decode its contents.
a. sniffer
b. recorder
c. logger
d. tapper
View Feedback
Question 15 1 / 1 point
Null sessions require access to TCP port __________.
a. 139
b. 141
c. 345
d. 349
View Feedback
Question 16 1 / 1 point
A __________ is a trusted entity that signs certificates and can vouch for the identity of the user and the
user's public key.
a. verification authority
b. certification authority
c. validation authority
d. registration authority
View Feedback
Question 17 1 / 1 point
__________ is a command-line interface for Microsoft SQL Server that allows an attacker to execute
commands on the underlying operating system, execute SQL queries, and upload files to a remote server.
a. SQLExec
b. Absinthe
c. Sqlninja
d. SQLSmack
View Feedback
Question 18 1 / 1 point
The __________ tool traces various application calls from Windows API functions to the Oracle Call
Interface.
a. ASPRunner
b. FlexTracer
c. odbcping
d. SQL Query Analyzer
View Feedback
Question 19 1 / 1 point
The __________ command displays the ARP table and is used to modify it.
a. ifconfig -arp
b. arp-table
c. netstat -arp
d. arp
View Feedback
Question 20 1 / 1 point
Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error. They can fill
in the username and password fields with __________.
a. a pound sign
b. two dashes
c. a single quotation mark
d. double quotes
View Feedback
Question 21 1 / 1 point
RFID __________ collision occurs when an RFID tag reader energizes numerous tags and the tags'
respective signals are reflected back to the reader simultaneously.
a. tag
b. reader
c. token
d. signal
View Feedback
Question 22 1 / 1 point
__________ reconnaissance is a hacker's attempt to scout [Show Less]