Free Essay

Cmit 321 Final Exam

In: Business and Management

Submitted By arnitaetsitty
Words 4865
Pages 20
CMIT 321 Final Exam Click Link Below To Buy:

http://hwaid.com/shop/cmit-321-final-exam/

Written 2016 Attempt Score: 121 / 125 - 96.8 % Final Exam
Question 1 1 / 1 point
__________ is the exploitation of an organization's telephone, dial, and private branch exchange (PBX) system to infiltrate the internal network in order to abuse computing resources. a. War driving b. Line dialing c. PBX driving d. War dialing View Feedback
Question 2 1 / 1 point
__________ cryptography is the most common method on the Internet for authenticating a message sender or encrypting a message. a. Symmetric b. Hash-based c. Private-key d. Public-key View Feedback
Question 3 1 / 1 point
__________ is a lightweight Knoppix version cut to 50 MB for a business-card-sized CD. a. Gnoppix b. GeeXboX c. Morphix d. Damn Small Linux View Feedback
Question 4 1 / 1 point
The __________ utility tests the integrity of an ODBC data source. a. odbcping b. ASPRunner c. FlexTracer d. DbEncrypt View Feedback
Question 5 1 / 1 point
In the TCP/IP stack, the __________ layer is where applications and protocols, such as HTTP and Telnet, operate. a. Internet b. network c. transport d. application View Feedback
Question 6 1 / 1 point
Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error. They can fill in the username and password fields with __________. a. a pound sign b. two dashes c. a single quotation mark d. double quotes View Feedback
Question 7 1 / 1 point
__________ allow attackers to pass malicious code to different systems via a web application. a. SQL injection attacks b. XSS vulnerabilities c. Authentication hijacking attacks d. Command injection flaws View Feedback
Question 8 1 / 1 point
A __________ is a trusted entity that signs certificates and can vouch for the identity of the user and the user's public key. a. verification authority b. certification authority c. validation authority d. registration authority View Feedback
Question 9 1 / 1 point
Null sessions require access to TCP port __________. a. 139 b. 141 c. 345 d. 349 View Feedback
Question 10 1 / 1 point
__________ is a command-line utility provided by Microsoft with SQL Server 2000 (and Microsoft SQL Server 2000 Desktop Engine) that allows users to issue queries to the server. a. ODBC b. SQLP c. OSQL d. SSRS View Feedback
Question 11 1 / 1 point
The __________ file is used to determine which TTY devices the root user is allowed to log in to. a. /usr/securetty b. /etc/securetty c. /var/securetty d. /home/securetty View Feedback
Question 12 1 / 1 point
__________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it. a. CheckOK b. SMTPCheck c. SMTPMon d. SLCheck View Feedback
Question 13 1 / 1 point
__________ is a method of gaining access to sensitive data in a Bluetooth-enabled device. a. Bluebugging b. Bluesnarfing c. BTKeylogging d. Blueprinting View Feedback
Question 14 1 / 1 point
__________ is a simple form of attack aimed directly at the application's business logic. a. Authentication hijacking b. Parameter tampering c. Cookie poisoning d. Session poisoning View Feedback
Question 15 1 / 1 point
Once the Oracle database server has been traced, the first port of call is made to the __________ listener. a. SQL b. TNS c. TCP d. PL/SQL View Feedback
Question 16 1 / 1 point
__________ is a common and easy form of SQL injection. The technique involves evading the logon forms. a. Command injection b. SELECT bypass c. INSERT injection d. Authorization bypass View Feedback
Question 17 1 / 1 point
__________ gathering is the process of accumulating information from resources like the Internet that can later be analyzed as business intelligence. a. Competitive intelligence b. Tracerouting c. Passive information d. Footprinting View Feedback
Question 18 1 / 1 point
__________, formerly called AppTapp, is a tool for jailbreaking and installing nonsanctioned third-party applications on the iPhone. a. iFuntastic b. iNdependence c. iActivator d. AppSnapp View Feedback
Question 19 1 / 1 point
Firefox 2.0.0.11 cannot correctly interpret single quotation marks and spaces during authentication. This is called the __________ value of an authentication header. a. registration b. site c. domain d. realm View Feedback
Question 20 1 / 1 point
Private data stored by Firefox can be quickly deleted by selecting __________ in the Tools menu. a. Clear History b. Clear Private Data c. Delete Private Data d. Delete History View Feedback
Question 21 1 / 1 point
A(n) __________ is a custom command in Linux that is a substitute for a formal command string. a. user string b. system link c. alias d. link View Feedback
Question 22 1 / 1 point
A __________ is a device that cannot function in any capacity. a. block b. brick c. rock d. cage View Feedback
Question 23 0 / 1 point
__________ involves plotting the tables in the database. a. Database enumeration b. Database footprinting c. Table footprinting d. Table enumeration View Feedback
Question 24 1 / 1 point
A __________ is a device that receives digital signals and converts them into analog signals, and vice versa. a. firewall b. proxy c. hub d. modem View Feedback
Question 25 1 / 1 point
Which of the following types of tools would be most effective in cracking UNIX passwords? a. Ophcrack b. KerbCrack c. John the Ripper d. RainbowCrack View Feedback
Question 26 1 / 1 point
SQL Server, like other databases, delimits queries with a __________. a. colon b. period c. semicolon d. comma View Feedback
Question 27 1 / 1 point
__________ is a unique 15- or 17-digit code used to identify a mobile station to a GSM network. a. IMEI b. SIMID c. SIM d. PhoneID View Feedback
Question 28 1 / 1 point
Which of the following password attacks is conducted using nontechnical means? a. hybrid b. brute force c. social engineering d. rainbow tables View Feedback
Question 29 1 / 1 point
In __________-level hijacking, the attacker obtains the session IDs to get control of an existing session or to create a new, unauthorized session. a. network b. data link c. transport d. application View Feedback
Question 30 1 / 1 point
Which of the tools listed below can be used to execute code on remote Windows systems? a. X.exe b. PsExec c. Rsync d. Ghost View Feedback
Question 31 1 / 1 point
Kaspersky is used as __________. a. a hacking tool against PDAs b. a hacking tool against IPHONEs c. a hacking tool against IPODs d. an antivirus for Windows Mobile View Feedback
Question 32 1 / 1 point
__________ viruses search all drives and connected network shares to locate files with an EXE or SCR extension. a. W32/Madang-Fam b. W32/Hasnot-A c. W32/Fujacks-AK d. W32/Fujacks-E View Feedback
Question 33 1 / 1 point
What is the difference between online and offline password attacks? a. Online attacks are conducted against people using the Internet, and offline attacks are conducted against people on private networks. b. Online attacks target passwords or their representations as they traverse a network, and offline attacks focus on stored passwords. c. Online attacks are used to gain access to systems, and offline attacks are used to knock systems off the network. d. Offline attacks target passwords or their representations as they traverse a network, and online attacks focus on stored passwords. View Feedback
Question 34 0 / 1 point
__________ synchronizes the information between a Palm device and a desktop PC. a. HotSync b. ActiveSync c. PocketSync d. PalmSync View Feedback
Question 35 1 / 1 point
__________ is a type of computer architecture in which multiple processors share the same memory and are each assigned different tasks to perform. a. Xcode b. Multitasking c. Cocoa d. Symmetric multiprocessing View Feedback
Question 36 1 / 1 point
__________ hackers are information security professionals who specialize in evaluating, and defending against, threats from attackers. a. Gray-hat b. Black-hat c. Consulting d. Ethical View Feedback
Question 37 1 / 1 point
An __________ share is a hidden share that allows communication between two processes on the same system. a. SMC b. IPC c. EPC d. SMB View Feedback
Question 38 1 / 1 point
The __________ method appends data in the URL field. a. POST b. GET c. APPEND d. URL View Feedback
Question 39 1 / 1 point
__________ is a lightweight substitute for telnet that enables the execution of processes on other systems, eliminating the need for manual installation of client software. a. PsExec b. Alchemy Remote Executor c. Emsa FlexInfo Pro d. RemoteApp View Feedback
Question 40 1 / 1 point
__________ is a back-end GPL tool that works directly with any RFID ISO-reader to make the content stored on the RFID tags accessible. a. RFDump b. RFReader c. RFReceiver d. RFExplorer View Feedback
Question 41 1 / 1 point
__________ is a parallelized login cracker that supports numerous protocols for attack. a. ADMsnmp b. SING c. Hydra d. John the Ripper View Feedback
Question 42 1 / 1 point
IT __________ are designed to evaluate an organization's security policies and procedures. a. ping sweeps b. vulnerability assessments c. penetration tests d. security audits View Feedback
Question 43 1 / 1 point
__________ is the act of gathering information about the security profile of a computer system or organization, undertaken in a methodological manner. a. Tracerouting b. Passive information gathering c. Footprinting d. Competitive intelligence gathering View Feedback
Question 44 1 / 1 point
__________ is a command-line interface for Microsoft SQL Server that allows an attacker to execute commands on the underlying operating system, execute SQL queries, and upload files to a remote server. a. SQLExec b. Absinthe c. Sqlninja d. SQLSmack View Feedback
Question 45 1 / 1 point
__________ occurs when hackers break into government or corporate computer systems as an act of protest. a. Hacktivism b. Cyber terrorism c. Cybercrime d. Suicide hacking View Feedback
Question 46 1 / 1 point
Mac OS X includes __________, a collection of frameworks, APIs, and accompanying runtimes that allows for a host of open-source web, database, scripting, and development technologies. a. Cocoa b. Coffee c. Bean d. Xcode View Feedback
Question 47 1 / 1 point
__________ is usually employed when the attacker discerns that there is a low probability that these reconnaissance activities will be detected. a. Social engineering b. Direct information gathering c. Active reconnaissance d. Inactive reconnaissance View Feedback
Question 48 1 / 1 point
__________ is a programming language that permits website designers to run applications on the user's computer. a. Java b. Ruby c. Python d. Smalltalk View Feedback
Question 49 1 / 1 point
_________ hijacking is a hacking technique that uses spoofed packets to take over a connection between a victim and a target machine. a. ACK b. Blind c. TCP/IP d. Network-level View Feedback
Question 50 1 / 1 point
In order for traffic to get back to the attacker during session hijacking, a process called __________ is used that allows the sender to specify a particular route for the IP packet to take to the destination. a. desynchronization b. source routing c. spoofing d. TCP routing View Feedback
Question 51 1 / 1 point
__________ is a worm for Windows XP that downloads and executes malicious files on the compromised computer and spreads through removable storage devices. a. HTTP W32.Drom b. W32/VBAut-B c. W32/QQRob-ADN d. W32/SillyFDC-BK View Feedback
Question 52 1 / 1 point
The Java-based __________ worm spreads through Bluetooth and affects unprotected Mac OS X 10.4 systems. a. OSX/Leap-A b. AppHook.B c. Inqtana.A d. BTHook-A View Feedback
Question 53 1 / 1 point
__________ is a virus targeted against mobile personal digital assistant devices. a. Skulls b. Brador c. Doomboot.A d. Podloso View Feedback
Question 54 1 / 1 point
The __________ stores confidential information that is accessible only from inside the organization. a. public website b. confidential website c. private website d. external website View Feedback
Question 55 1 / 1 point
__________ is the unauthorized alteration of routing tables. a. Route poisoning b. Routing table spoofing c. Routing table poisoning d. Route spoofing View Feedback
Question 56 1 / 1 point
__________ automatically scans a computer, looking for cookies created by Internet Explorer, Mozilla Firefox, and Netscape Navigator, and then displays the data stored in each one. a. Cookie Viewer b. Cookie Explorer c. Cookie Browser d. Cookie Manager View Feedback
Question 57 1 / 1 point
__________ is a tool that administrators can use to test the reliability of their critical systems and determine what actions they must take to fix any problems. a. DbEncrypt b. AppDetective c. Selective Audit d. AppRadar View Feedback
Question 58 1 / 1 point
The __________ script allows a remote user to view the code of server-side scripts. a. Showlogin.asp b. Showcode.asp c. RemoteAccess.asp d. Remotelogin.asp View Feedback
Question 59 1 / 1 point
__________ is a method in which a sniffer is used to track down a conversation between two users. a. A man-in-the-middle (MITM) attack b. Session hijacking c. IP spoofing d. Network tapping View Feedback
Question 60 1 / 1 point
__________ is a small utility that lists all USB devices currently connected to a computer, as well as all previously used USB devices. a. MyUSBOnly b. USB Blocker c. USB CopyNotify! d. USBDeview View Feedback
Question 61 1 / 1 point
After gaining access, what is the attacker's next goal? a. Cover their tracks. b. Start denial-of-service attacks. c. Find ways to maintain access. d. None of the above. View Feedback
Question 62 1 / 1 point
__________ is an HTTP authentication brute-force program. It attempts to guess passwords for basic HTTP authentication by logging in to a web server. a. Authforce b. ObiWaN c. Hydra d. Cain & Abel View Feedback
Question 63 1 / 1 point
__________ record the parts of the website visited and can contain identifying information. a. Logs b. Records c. Cookies d. Certificates View Feedback
Question 64 1 / 1 point
Web applications have a three-layered architecture consisting of presentation, logic, and __________. a. application b. data layers c. transport d. HTTP View Feedback
Question 65 1 / 1 point
__________ is a Linux security feature that enables a user to choose the directory that an application can access. a. Chroot b. Sandbox c. Jailroot d. Rootjail View Feedback
Question 66 1 / 1 point
There are several aspects to security, and the owner of a system should have confidence that the system will behave according to its specifications. This is called __________. a. confidentiality b. reusability c. accountability d. assurance View Feedback
Question 67 1 / 1 point
The __________ command displays the ARP table and is used to modify it. a. ifconfig -arp b. arp-table c. netstat -arp d. arp View Feedback
Question 68 0 / 1 point
__________ detects and monitors Bluetooth devices in a wireless network. It provides information about the features of each device and the services provided by it. a. Bluetooth Network Scanner b. BlueFire Mobile Security c. BlueAuditor d. BlueWatch View Feedback
Question 69 1 / 1 point
Which of the following statements best describes a penetration test? a. A penetration test is using a password cracker to gain access to a system. b. A penetration test is an attempt to simulate methods used by attackers to gain unauthorized access to a computer system. c. A penetration test is the act of hacking computer systems; it is used by criminals to attack legitimate organizations. d. A penetration test is an audit of an organization's security policies and procedures. View Feedback
Question 70 1 / 1 point
Which website can an ethical hacker visit to see web pages from 2002? a. www.symantec.com b. www.archive.org c. www.oldwebsites.net d. www.historyoftheinternet.com View Feedback
Question 71 1 / 1 point
__________ provides a complete view for monitoring and analyzing activity within USB host controllers, USB hubs, and USB devices. a. USB PC Lock b. USBlyzer c. Advanced USB Monitor d. Virus Chaser USB View Feedback
Question 72 1 / 1 point
The __________ is due to a canonicalization error in IIS 4.0 and 5.0 that allows an attacker to use malformed URLs to access files and folders located on the logical drive that includes web folders. a. canonicalization vulnerability b. ::$DATA vulnerability c. Unicode directory traversal vulnerability d. Msw3prt IPP vulnerability View Feedback
Question 73 1 / 1 point
A __________ attack adds numbers or symbols to a dictionary file's contents to crack a password successfully. a. brute-force b. dictionary c. hybrid d. parameter manipulation View Feedback
Question 74 1 / 1 point
Only __________ scan is valid while scanning a Windows system. a. SYN b. Null c. FIN d. Xmas View Feedback
Question 75 1 / 1 point
Ethical hackers use their knowledge and skills to __________. a. learn the details of computer systems and enhance their capabilities b. attack government and commercial businesses c. develop new programs or reverse-engineer existing software to make it more efficient d. defend networks from malicious attackers View Feedback
Question 76 1 / 1 point
Tripwire protects against Trojan horse attacks by __________. a. blocking the port that the Trojan program is listening on b. removing any Trojan horse programs found on the system c. detecting unexpected changes to a system utility file that may indicate it had been replaced by a Trojan horse d. quarantining any Trojan horse programs discovered on the system View Feedback
Question 77 1 / 1 point
The ISAPI extension responsible for IPP is __________. a. msisapi.dll b. msw3prt.dll c. msipp5i.dll d. isapiipp.dll View Feedback
Question 78 1 / 1 point
__________ is a protocol used to create, modify, and terminate sessions such as VOIP. a. SMS b. SIP c. GSMA d. GPRS View Feedback
Question 79 1 / 1 point
A(n) __________ is a specific way to breach the security of an IT system through a vulnerability. a. hole b. exposure c. exploit d. threat View Feedback
Question 80 1 / 1 point
__________ is a portable, battery-powered device that mediates interactions between RFID readers and RFID tags. a. RSA blocker tag b. RFID Firewall c. RFID Guardian d. Kill switch View Feedback
Question 81 1 / 1 point
Which of the statements below correctly describes a dictionary attack against passwords? a. It is an attack that tries every combination of characters until a correct password is identified. b. It is an attack that uses a list of words to guess passwords until a correct password is identified. c. It is an attack that uses a list of words and appends additional numbers or characters to each word until a correct password is identified. d. It is an attack that uses precomputed values until a correct password is identified. View Feedback
Question 82 0 / 1 point
The __________ are the agreed-on guidelines for a penetration test. a. rules of engagement b. project scope statements c. test requirements d. service-level agreements (SLAs) View Feedback
Question 83 1 / 1 point
The Network News Transport Protocol service uses port __________. a. 110 b. 119 c. 135 d. 139 View Feedback
Question 84 1 / 1 point
A(n) __________ is the logical, not physical, component of a TCP connection. a. ISN b. socket c. port d. SYN View Feedback
Question 85 1 / 1 point
__________ reconnaissance is a hacker's attempt to scout for or survey potential targets and then investigate the target using publicly available information. a. Active b. Passive c. Public d. Open View Feedback
Question 86 1 / 1 point
A __________, also called a packet analyzer, is a software program that can capture, log, and analyze protocol traffic over the network and decode its contents. a. sniffer b. recorder c. logger d. tapper View Feedback
Question 87 1 / 1 point
__________ is, simply enough, looking through an organization's trash for any discarded sensitive information. a. Trash diving b. Trash carving c. Dumpster searching d. Dumpster diving View Feedback
Question 88 1 / 1 point
__________ is a secure method of posting data to the database. a. URL b. SQL c. GET d. POST View Feedback
Question 89 1 / 1 point
How do you defend against privilege escalation? a. Use encryption to protect sensitive data. b. Restrict the interactive logon privileges. c. Run services as unprivileged accounts. d. Run users and applications on the least privileges. View Feedback
Question 90 1 / 1 point
When an ethical hacker uses nslookup, which protocol are they querying? a. DNS b. HTTPS c. SMB d. NTP View Feedback
Question 91 1 / 1 point
Bluetooth-enabled devices communicate via short-range, ad hoc networks known as __________. a. piconets b. uninets c. btnets d. pans View Feedback
Question 92 1 / 1 point
The act of hiding data within or behind other data is known as __________. a. encoding b. encryption c. steganography d. fuzzing View Feedback
Question 93 1 / 1 point
A __________ occurs when a connection between the target and host is in the established state, or in a stable state with no data transmission, or the server's sequence number is not equal to the client's acknowledgment number, or the client's sequence number is not equal to the server's acknowledgment number. a. synchronization state b. blind hijacking c. source routing d. desynchronization state View Feedback
Question 94 1 / 1 point
__________ are software applications that run automated tasks over the Internet. a. Zombies b. Spiders c. Bots d. Crawlers View Feedback
Question 95 1 / 1 point
Which of the following definitions best describes a wrapper? a. A wrapper is a packet-crafting technique used to perform stealthy port scans. b. A wrapper is an encryption tool used to hide messages inside image files. c. A wrapper is a method of hiding a virus inside an executable file. d. A wrapper is a tool used to bind a Trojan to a legitimate file. View Feedback
Question 96 1 / 1 point
In a hit-and-run attack, __________. a. the attacker constantly injects bad packets into the router b. the attacker mistreats packets, resulting in traffic congestion c. the attacker injects a few bad packets into the router d. the attacker alters a single packet, resulting in denial of service View Feedback
Question 97 1 / 1 point
__________ is a command-line TCP/IP packet assembler/analyzer. a. Hping2 b. Firewalk c. WUPS d. Blaster Scan View Feedback
Question 98 1 / 1 point
The __________ tool traces various application calls from Windows API functions to the Oracle Call Interface. a. ASPRunner b. FlexTracer c. odbcping d. SQL Query Analyzer View Feedback
Question 99 1 / 1 point
With the __________ tool, you can ping multiple IP addresses simultaneously. a. Fping b. Nmap c. Nessus d. Unicornscan View Feedback
Question 100 1 / 1 point
Attackers use a technique called __________ to exploit the system by pretending to be legitimate users or different systems. a. identity theft b. impersonation c. spoofing d. flooding View Feedback
Question 101 1 / 1 point
__________ is a Microsoft-proprietary protocol that authenticates users and computers based on an authentication challenge and response. a. LMLAN b. Kerberos c. NTLM d. NTLAN View Feedback
Question 102 1 / 1 point
__________ reconstructs a device's Bluetooth PIN and link key from data sniffed during a pairing session. a. Blooover b. Hidattack c. BTCrack d. Cabir and Mabir View Feedback
Question 103 1 / 1 point
This type of port scanning technique splits a TCP header into several packets so that the packet filters cannot detect what the packets intend to do. a. UDP scanning b. IP fragment scanning c. inverse TCP flag scanning d. ACK flag scanning View Feedback
Question 104 1 / 1 point
__________ is an application that, when installed on a system, runs a background process that silently copies files from any USB flash drive connected to it. a. USB Switchblade b. USBDumper c. USB Hacksaw d. USB Copy 'em all View Feedback
Question 105 1 / 1 point
__________ is an application that identifies all Bluetooth-enabled devices, their communications, and their connectivity within a given area. a. BlueSweep b. BlueWatch c. BlueKey d. BlueFire Mobile View Feedback
Question 106 1 / 1 point
__________ URLs, or intranets, are private links that only a company's employees use. a. Internal b. Private c. Organizational d. Domain View Feedback
Question 107 1 / 1 point
In Internet Explorer, the __________ zone is a security zone for sites that the user has designated as safe to visit. a. user sites b. legal sites c. white list d. trusted sites View Feedback
Question 108 1 / 1 point
Which of the following is not a category of security assessment? a. security audit b. rootkit detection c. vulnerability assessment d. penetration testing View Feedback
Question 109 1 / 1 point
A hacker has successfully used a tool to intercept communications between two entities and establish credentials with both sides of the connection. The two remote ends of the communication never notice that the attacker is relaying the information between the two. This is called a(n) __________ attack. a. man-in-the-middle b. interceptoring c. MAC poisoning attack d. firewalking View Feedback
Question 110 1 / 1 point
__________ is a cable modem hacking program. It performs the task of uncapping by incorporating all the uncapping steps into one program. a. Yersinia b. OneStep: ZUP c. Zebra d. Solar Winds MIB Browser View Feedback
Question 111 1 / 1 point
Information on all Linux accounts is stored in the __________ and /etc/shadow files. a. /etc/conf b. /etc/passwd c. /etc/password d. /conf/passwd View Feedback
Question 112 1 / 1 point
Which type of penetration test is conducted with absolutely no prior knowledge of the target environment? a. white-box testing b. gray-box testing c. red-hat testing d. black-box testing View Feedback
Question 113 1 / 1 point
Redirections for URLs are handled with the __________ URL handler, which can cause errors in older versions of Internet Explorer. a. goto: b. mdir: c. mhtml: d. redir: View Feedback
Question 114 1 / 1 point
Traceroute uses the __________ field in an IP packet to determine how long it takes to reach a target host and whether that host is reachable and active. a. IHL b. flags c. TOS d. TTL View Feedback
Question 115 1 / 1 point
Which of the following is not a Microsoft Internet Information Services vulnerability? a. ::$DATA vulnerability b. UFS integer overflow vulnerability c. Showcode.asp vulnerability d. WebDAV/RPC exploits View Feedback
Question 116 1 / 1 point
Which of the following statements best describes the rules of engagement for a penetration test? a. The rules of engagement are the systems that a tester can knock offline during a penetration test. b. The rules of engagement are the agreed-upon guidelines for a penetration test, including desired code of conduct and procedures. c. The rules of engagement define the service-level agreement and scope of a penetration test. d. The rules of engagement include the insurance and risk management associated with third-party testing. View Feedback
Question 117 1 / 1 point
The __________ service is responsible for sending a response packet that contains connection details to clients who send a specially formed request. a. SSRS b. OSQL c. ODBC d. SQLP View Feedback
Question 118 1 / 1 point
The RFID __________ policy establishes the framework for many other security controls. It provides a vehicle for management to communicate its expectations regarding the RFID system and its security. a. security b. physical access c. secure disposal d. usage View Feedback
Question 119 1 / 1 point
A __________ is a set of related programs, usually located at a network gateway server, that protect the resources of a private network from other network users. a. firewall b. proxy c. packet filter d. router View Feedback
Question 120 1 / 1 point
While conducting an ethical penetration test in Europe, which Regional Internet Registry (RIR) would you use? a. APNIC b. RIPE NCC c. ARIN d. LACNIR View Feedback
Question 121 1 / 1 point
__________ is a tool for performing automated attacks against web-enabled applications. a. cURL b. dotDefender c. Burp Intruder d. AppScan View Feedback
Question 122 1 / 1 point
If the supplied data does not fit within the size constraints of a single packet, the data is spread among multiple packets in a process known as __________. a. framing b. separation c. fragmentation d. division View Feedback
Question 123 1 / 1 point
__________ is a nonvoice service available with most GSM networks. a. CDMA b. EDO c. EDVA d. GPRS View Feedback
Question 124 1 / 1 point
The information resource or asset that is being protected from attacks is usually called the __________. a. key value b. target of evaluation c. main asset d. target asset View Feedback
Question 125 1 / 1 point
__________ is an information service provider that helps law offices, government agencies, businesses, and individuals find information about people. a. People-Search-America.com b. Best People Search c. Switchboard d. Google Finance View Feedback
________________________________________
Attempt Score: 121 / 125 - 96.8 %
Overall Grade (highest attempt): 121 / 125 - 96.8 %…...

Similar Documents

Free Essay

Final Exam

...Class, there is a final exam study guide in doc sharing. Please be sure to review it in detail! I would also like to provide more information on the final: * The Final Exam covers all the TCOs and all the course materials. * This exam is worth 250 points in total, which includes 12 multiple-choice questions at five points each for a total of 60 points, one essay question at 30 points, four essay questions at 40 points each for a total of 190 points. * You have three hours and 30 minutes to complete this exam. * This exam contains two pages. You don't need to complete them in order. My suggestion is to start with the 5 essay questions (page 2) and then go back to the multiple choice questions leaving about 1 hour for the multiple choice. This allots approximately 30 minutes to each essay (2.5 hours) and 5 minutes to each multiple choice (1.0 hours). Multiple Choice: there is one multiple choice question from each of the following chapters: 1, 2, 3, 4, 5, 6, 8, 9, 12, 14, 16, 17. Essay Question Topics: 30 point question (there is one of these) you will be given 6 transactions, and asked to indicate which fund each transaction would be recorded in. The fund summary document and week 1 & 2 document should be helpful here, as well as the notes you have taken on each fund. Review chapters 2, 4, 5, 6, 7 on what transactions are accounted for in each fund. 40 point essay questions (there are 4 of these) 1. Question covering uses of the......

Words: 350 - Pages: 2

Premium Essay

Final Exam

...PE 540 Final Exam I. Define, Identify or Explain a. Administrative Philosophy Affects the way the educator presents instructional material and the manner in which on communicates with students, parents, colleagues, and other adminstrators. b. Types of Administrators Principal, Headmaster, Director, Assistant Principal, Specal Educator Coordinator, Curriculum Coordinator, Head of Guidance, Dean. c. Human Resource Management The management of an organization workforce. Responsible for the training and assessment of employees while ensuring compliance eith employment and labor laws. d. Title IX Educational amemndment of 1972 that is the landmark legislation that bans sex discrimination in schools, whether it be academics or athlets. e. Negligence Conduct that falls below the standards of behavior established by law for the protection of others against unreasonable risk of harm. II. Discussion Questions a. Why is a Public Relations Program important to an Organization? By managing, controlling, or influencing people's perceptions, public relations professional hope to intitate a sequence of behaviors that will lead to the achievemnt of organization objectives. b. Why is an understanding of the law importatant to a PE teacher, coach, and administrator? So they can address the proper procedures to the students and players. They have to understand and guide by the law before they can pass it on to the students. c. What is meant by the term, "assumption of risk"? A......

Words: 418 - Pages: 2

Premium Essay

Final Exam

...Page 1 Final Exam Hum 111 11/25/12 Page 2 A critical thinker is open minded and mindful of alternatives. Critical thinking is a type of reasonable reflective thinking that is aimed at deciding what to believe or what to do. Reading, writing, speaking, and listening can be done critically or uncritically. Thinking critically involves seeing things in an open minded way and consider an idea or concept from as many angles as possible. One of the three things about what I learned in this class was one of the habits that hinder thinking is resistance to change. It is just the ways some people feel about certain things and is afraid of changes. Second thing I learned was that it is important to make a distinction between the person and the person’s idea because we tend to heed the advice of someone we like even if it is harmful to us than listen to someone we do not like. Third thing I learned was when a problem becomes an issue. This was big discussion among the class that week. As soon as you address the issue, you are going to have a problem. I knew I had to work on my critical thinking before this course ever started, to work on my critical thinking skills was something I know I could have never figured out on my own. Especially redefining the way I see things, working on my thinking skills was something I thought I did not need any help on, but as I went through this course I realize I did needed help. Asking myself questions to get the right answer to what I am......

Words: 473 - Pages: 2

Premium Essay

Final Exam

...------------------------------------------------- Accounting Principle Final Exam ------------------------------------------------- Date :December 5, 2011 Exam consists three part with 100 points Part I T/F – Please read the question careful and answer T for True and F for False 1.If the unit price of inventory is increasing during a period, a company using the LIFO inventory method will show less gross profit for the period, than if it had used the FIFO inventory method. 2.Under a perpetual inventory system, the cost of goods sold is determined each time a sale occurs. 3.A periodic inventory system does not require a detailed record of inventory items. 4.Control over cash disbursements is improved if major expenditures are paid by check. 5.A manufacturer’s inventory consists of raw materials, work in process, and finished goods. 6.Non-operating activities include revenues and expenses that are related to the company’s main line of operations. 7. In periods of falling prices, FIFO will result in a larger net income than the LIFO method. 8.Sales revenues, cost of goods sold, and gross profit are amounts on a merchandising company's income statement not commonly found on the income statement of a service company. 9. If the unit price of inventory is increasing during a period, a company using the LIFO inventory method will show......

Words: 1182 - Pages: 5

Free Essay

Final Exams

...ARE FINAL EXAM NECESSARY I have news for many of you who have yet to live and work in the real world: rarely in your life will success at any endeavor come down to one event. The real world is getting up every day, going to work at whatever it is you do, making mistakes and learning from them while trying to get better with experience. Although most of you have been conditioned through supposed “make or break you” tests like the SAT and ACT to believe that the culmination of your learning can be gauged by one score on one test taken one particular day, this is a lie. The truth is, that is a ridiculous measurement of successful learning. The way our system is set up is fundamentally flawed. Ending high school with the SAT or ACT, finishing each college semester with a round of heavily weighted tests and basing entrance to graduate schools on standardized test scores like the LSAT, MCAT and GRE does nothing but teach students that attendance and regular work are optional as long as they manage to save themselves with a good midterm and final test grade. This is a bad lesson to teach students because this is not the way the real world works. The classes that allow for you to do this are not helping you at all. By procrastinating all semester long and expecting some miracle to happen where you will suddenly learn everything from the last four months you are not helping yourself at all. Some classes don’t weight or even require a final, they base the grading on......

Words: 321 - Pages: 2

Free Essay

Final Exam

...INSS 370 Final Exam Study Guide  Below is a study guide for your final exam.  There will be a combination of true/false and multiple  choice questions.  1. Who is responsible for prioritizing the product backlog?  2. What does a burn‐down chart show?  3. What are the principles outlined in the Agile Software Development Manifesto?  4. If our highest priority is to satisfy the customer through early and continuous delivery of  valuable software, in general, how can we do that?  5. In agile software processes are the highest priorities to satisfy the customer through  early and continuous delivery of valuable software?  6. What traits need to exist among the members of an agile software team?  7. In agile development is it more important to build software that meets the customers'  needs today than worry about features that might be needed in the future?  8. The ____ phase of the SDLC includes four main activities: requirements modeling, data  and process modeling, object modeling, and consideration of development strategies.  9. One of the main activities in the systems analysis phase is ____ modeling, which  involves fact‐finding to describe the current system and identification requirements for  the new system.  10. How is planning performed on projects that use Agile approaches?   11. Who should be the main judge of the business value (think of the various roles within an  agile team)?   12.......

Words: 443 - Pages: 2

Free Essay

Final Exam

...BCAP 106 – FINAL EXAM Student Name: __________________________________ Date:_________________________ EXERCISE 1 – MS Excel 40 Points You work at a small Orthopedics clinic as a Medical Assistant. Your manager wants you to take a day to do inventory of all medical supplies in the office. She would like to know the profit potential for their inventory based on the categories of inventory in Table 1. Table 1 contains the format of the desired report. The required formulas are shown in Table 2. Please create the table using MS Excel and incorporate the formulas requested in Table 1. Save the files as: “Your Name – Final Exam Exercise 1” Table 2 | | | FORMULAS | Formula A = Units on Hand * Average Unit Cost | Formula B = Average Unit Cost * (1 / (1-.58)) | Formula C = Units on Hand * Average Unit Price | Formula D = Total Value - Total Cost | Formula E = "SUM" of required cells | Formula F = AVERAGE function | Formula G = MIN function | Formula H = MAX function | EXERCISE 2 – MS Excel 20 Points Open the “Final Exam – Exercise 2” file. Bold, Center, Underline, and add color to the Headings in this document. Expand the cells so all of the information can be seen. Add Borders around all the cells containing information. Filter the data. Place all information in alphabetical order by Last Name. Save the file as “Your Name – Final Exam Exercise 2”. EXERCISE 3 – Test Questions 40 Points 1. The view in which all of the slides...

Words: 828 - Pages: 4

Premium Essay

Final Exam

...ETH/125 Final Exam – Multiple Choice Name: _Katrina Winters___________________________ Please note: There are 56 questions. Each question is worth 2.5 points. 1. Which term is used to describe a group that is set apart from others primarily because of its national origin or distinctive cultural patterns? a. social group b. ethnic group c. racial group d. formal group 2. Members of a minority or subordinate group a. share physical or cultural characteristics that distinguish them from the dominant group. b. have less power over their lives than do members of a majority. c. acquire membership by being born into that group. d. all of these apply 3. Secession is a. the physical separation of groups of people. b. the withdrawal of a group of people from a dominant group to establish a new nation. c. the withdrawal of a subordinate group from one neighborhood to another. d. none of these 4. Which term is used by sociologists to describe a group that is set apart from others because of obvious physical differences? a. social group b. ethnic group c. racial group d. formal group 5. Which term is used to refer to a subordinate group whose members have significantly less control or power over their own lives than the members of a dominant group have over theirs? a. minority group b. majority group c. stratified group d. social group 6. Which of the following is......

Words: 1961 - Pages: 8

Free Essay

Final Exam

...Final Exam Review Basics B i • • Basic terminology and concepts Layered model (physical to application) Internet Layering • • • • • • • • Level 5 Level 4 Level 3 Level 2 -- Application Layer (rlogin, ftp, SMTP, POP3, IMAP, HTTP..) -- Transport Layer(a k a Host-to-Host) Layer(a.k.a Host to Host) (TCP, UDP) -- Network Layer (a.k.a. Internet) y ( ) (IP, ICMP, ARP) -- (Data) Link Layer / MAC sub-layer (a.k.a. N t ( k Network Interface or kI t f Network Access Layer) -- Physical Layer • Level 1 Final Exam Review Physical Layer • • • • Time and frequency domains. Bandwidth Band idth and data rate rate. Analog and digital transmission. Simplex, half-duplex and full-duplex transmission Final Exam Review Physical Layer ( Ph i l L (cont’d) ’d) • • • • Transmission impairments. Decibel. S/N ratio. Channel capacity. – Nyquist Nyquist. – Shannon. • Types / properties of media – Copper (UTP: Cat-3, Cat 5) Cat 3, Cat-5) – Fiber. Final Exam Review Physical Layer (cont’d) (cont d) • Data encoding – Analog-to-digital. • (Time sampling / amplitude quantization) – Digital-to-analog. • (D t reconstruction) (Data t ti ) – Transmission modes. • S Synchronous. h • Asynchronous. Final Exam Review Data Li k L D Link Layer Error Control • • Framing Error detection / correction schemes schemes. • Parity. • Hamming distance • CRC (polynomial encoding) . Final Exam Review Data Li k L D Link Layer Flow Control • Acknowledgement • Stop and Wait • PAR (P i i A k (Positive Acknowledgement with l...

Words: 858 - Pages: 4

Premium Essay

Final Exam

...[pic] College of Natural Sciences Course Final Exam GEO/215 Geography Exam Instruction: You must respond to the 5 questions posted below. Please support your responses with reading materials or points from class discussions from the entire 5 weeks of class. Each question should include a 200-250 word response. This exam is worth 15 points. 1. How does human culture affect geography? Which cultures do you believe have had the most significant influence on geography? I would have to say that humans affect geography greatly because as we tend to live on this earth we adapt and change things where we go. Some of these changes tend to have great affects to the earth and to others who share the earth with us. We tend to cut forest down which has an affect on green gasses put into the atmosphere, we make other changes which is starting to affect global warming and making natural disasters stronger which is affecting where we live. I do now believe that human culture has the most significant influence on geography because of the way we have been altering things throughout history though we think were making it better for ourselves there is always some consequences to deal with but we don’t realize it until further down the road by that time its sometimes too late. 2. What are at least......

Words: 973 - Pages: 4

Premium Essay

Acct 321 Advance Financial Reporting Exam Quizzes

...ACCT 321 ADVANCE FINANCIAL REPORTING EXAM QUIZZES To purchase this visit here: http://www.coursehomework.com/product/acct-321-advance-financial-reporting-exam-quizzes/ Contact us at: help@coursehomework.com ACCT 321 ADVANCE FINANCIAL REPORTING EXAM QUIZZES Which of the following is not a required component of financial statements prepared in accordance with generally accepted accounting principles? 1. Balance sheet. 2. Notes to financial statements. 3. Income statement. 4. President's letter to shareholders. When should an expenditure be recorded as an asset rather than an expense? 1. Always 2. If the amount is material. 3. When future benefit exists. 4. President's letter to shareholders Recognition of expense related to amortization of an intangible asset illustrates which principle of accounting? 1. Historical cost. 2. Expense recognition. 3. Full disclosure. 4. Revenue recognition. Allowing firms to estimate rather than physically count inventory at interim (quarterly) periods is an example of a 1. Trade-off between timeliness and verifiability. 2. Neutrality and consistency. 3. Verifiability and faithful representation. 4. Faithful representation and comparability. Which accounting assumption or principle is being violated if a company is a party to major litigation that it may lose and decides not to include the information in the financial statements because it may have a negative impact on the company's stock price? 1. Going......

Words: 426 - Pages: 2

Premium Essay

Acct 321 Advance Financial Reporting Exam Quizzes

...ACCT 321 ADVANCE FINANCIAL REPORTING EXAM QUIZZES To purchase this visit here: http://www.activitymode.com/product/acct-321-advance-financial-reporting-exam-quizzes/ Contact us at: SUPPORT@ACTIVITYMODE.COM ACCT 321 ADVANCE FINANCIAL REPORTING EXAM QUIZZES Which of the following is not a required component of financial statements prepared in accordance with generally accepted accounting principles? 1. Balance sheet. 2. Notes to financial statements. 3. Income statement. 4. President's letter to shareholders. When should an expenditure be recorded as an asset rather than an expense? 1. Always 2. If the amount is material. 3. When future benefit exists. 4. President's letter to shareholders Recognition of expense related to amortization of an intangible asset illustrates which principle of accounting? 1. Historical cost. 2. Expense recognition. 3. Full disclosure. 4. Revenue recognition. Allowing firms to estimate rather than physically count inventory at interim (quarterly) periods is an example of a 1. Trade-off between timeliness and verifiability. 2. Neutrality and consistency. 3. Verifiability and faithful representation. 4. Faithful representation and comparability. Which accounting assumption or principle is being violated if a company is a party to major litigation that it may lose and decides not to include the information in the financial statements because it may have a negative impact on the company's stock price? 1. Going......

Words: 849 - Pages: 4

Premium Essay

Final Exam

...Week 8 : Final Exam - Final Exam 1. (TCO 1) Your company owns a piece of land and is in the middle of purchasing this property to expand their footprint in the community. At the last minute, the seller has backed out of the deal, leaving you with few options. Your supervisor wants to explore the options for remedies in this case. What remedies would be available given the type of transaction and outcome at stake? Would legal damages make the company whole? What equitable remedies may be available? Explain your answer highlighting the difference between remedies at law and remedies at equity? (Points : 20) Equitable remedies are rarely used for contact breaches. They may be used if there is no other way to compensate an Innocent party and also in the sale of unique objects and in the sale of land. In Equity there is only one remedy the “specific performance” where you make the person perform the contact. Remedies at law are ways to right a wrong that are specified in the laws, such as making you pay a person back, or posting a bond against future performance or seizing (repossessing) property. The key is that they are standard and defined in the laws and usually are monetary. Some courts are allowed to apply the principles of equity instead of or in addition to those of law. Equity courts emerged to cover situations where there was no law or the law didn't provide proper remedies. Equity courts don't set precedents. Remedies in equity are more often injunctions or......

Words: 3377 - Pages: 14

Premium Essay

Final Exam~

...reports  Creating a report using wizard  Modify a report  Adding a sub report  Preview and print a report Information Systems  Organizations, Technology and Information  Data vs. Information  Logical Structure ¨ field, record data file, database and data warehouse  Relationship Databases  Information System ¨ Transaction, customer-centric, executive information systems 11 & 12 13 13 & 14 14 Assignment 2 due ASSESSMENT Tutorial: Assignment 1: Assignment 2: Final Exam: Total 10% 20% 20% 50% _____ 100% ===== BCOM 101F PAGE 4 OF 3 EXAM ELIGIBILITY 1. Students must meet all subject requirements such as: a) Complete and submit all given assignments on the set deadlines and b) Attend 80% of scheduled lectures and tutorials before exam eligibility is granted. 2. Students who do not satisfy the subject requirements may appeal to the department for permission to sit for exams. (Please refer to the department¡s notice board for the appeal procedures) The outcome of the appeal is final and cannot be further appealed. PLAGIARISM Plagiarism is the presentation of the work, idea or creation of another person as though it is your own. It is a form of cheating and is considered as a very serious academic offence. Plagiarised material can be drawn from, and presented in, written, graphic and visual form, including electronic data, and oral presentations. Plagiarism occurs when the origin of the material used is not appropriately cited. Examples of......

Words: 1095 - Pages: 5

Premium Essay

Cmit Final Project

...CMIT376 FINAL PROJECT (250 points) You are the network administrator for City Power & Light. CP&L has five different locations named Central, Northwest, Northeast, Southwest, and Southeast. The Central location has 500 client computers and two network servers. The Northwest and Northeast locations have approximately 75 client computers and one server computer each. The Southwest and Southeast locations have 100 client computers and one network server each. The diagram below illustrates the company’s network infrastructure. Each server is on a separate IPv4 subnet, using non-MS routers to provide access to other internal locations. Subnetting Table (using a subnet mask of 255.255.255.0) 10.18.1.0 – Central Location – 250 users and server S1 10.18.2.0 – Central Location – 250 users and server S2 10.18.3.0 – Northwest Location – 75 users and server S3 10.18.4.0 – Northeast Location – 75 users and server S4 10.18.5.0 – Southwest Location – 100 users and server S5 10.18.6.0 – Southeast Location – 100 users and server S6 [pic] All servers are Domain Controllers in the City Power & Light domain (called CPANDL.AD). The servers run Microsoft Windows Server 2008, Enterprise Edition. All client computers run Windows XP, Vista SP1, or Windows 7. City Power & Light also has a website maintained by their ISP called CPANDL.COM (http://www.cpandl.com). Andy Ruth, director of CP&L, asked you to design a networking infrastructure for the company. The requirements......

Words: 626 - Pages: 3