Buy here:
http://theperfecthomework.com/cmit-321-final-exam-umu
c/
Final Exam
Question 1 1 / 1 point
A __________ is a device that receives digital signals and converts them into analog
signals, and vice versa.
a. firewall
b. proxy
c. hub
d. modem
View Feedback
Question 2 1 / 1 point
__________ is a parallelized login cracker that supports numerous protocols for attack.
a. ADMsnmp
b. SING
c. Hydra
d. John the Ripper
View Feedback
Question 3 1 / 1 point
An __________ share is a hidden share that allows communication between two processes
on the same system.
a. SMC
b. IPC
c. EPC
d. SMB
View Feedback
Question 4 1 / 1 point
__________ monitors and audits databases for security issues in real time.
a. Selective Audit
b. AppDetective
c. AppRadar
d. FlexTracer
View Feedback
Question 5 1 / 1 point
__________ is a command-line utility provided by Microsoft with SQL Server 2000 (and
Microsoft SQL Server 2000 Desktop Engine) that allows users to issue queries to the server.
a. ODBC
b. SQLP
c. OSQL
d. SSRS
View Feedback
Question 6 1 / 1 point
__________ allows applications to read and write various image file formats, including GIF.
a. ImageCore
b. CoreText
c. ImageIO
d. CoreImage
View Feedback
Question 7 1 / 1 point
Which of the following types of tools would be most effective in cracking UNIX passwords?
a. Ophcrack
b. KerbCrack
c. John the Ripper
d. RainbowCrack
View Feedback
Question 8 1 / 1 point
A __________ is a device that cannot function in any capacity.
a. block
b. brick
c. rock
d. cage
View Feedback
Question 9 1 / 1 point
__________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after
connecting to it.
a. CheckOK
b. SMTPCheck
c. SMTPMon
d. SLCheck
View Feedback
Question 10 1 / 1 point
In a hit-and-run attack, __________.
a. the attacker constantly injects bad packets into the router
b. the attacker mistreats packets, resulting in traffic congestion
c. the attacker injects a few bad packets into the router
d. the attacker alters a single packet, resulting in denial of service
View Feedback
Question 11 1 / 1 point
__________ is the act of gathering information about the security profile of a computer
system or organization, undertaken in a methodological manner.
a. Tracerouting
b. Passive information gathering
c. Footprinting
d. Competitive intelligence gathering
View Feedback
Question 12 1 / 1 point
__________, formerly called AppTapp, is a tool for jailbreaking and installing nonsanctioned
third-party applications on the iPhone.
a. iFuntastic
b. iNdependence
c. iActivator
d. AppSnapp
View Feedback
Question 13 1 / 1 point
__________ is a tool for performing automated attacks against web-enabled applications.
a. cURL
b. dotDefender
c. Burp Intruder
d. AppScan
View Feedback
Question 14 1 / 1 point
A __________, also called a packet analyzer, is a software program that can capture, log,
and analyze protocol traffic over the network and decode its contents.
a. sniffer
b. recorder
c. logger
d. tapper
View Feedback
Question 15 1 / 1 point
Null sessions require access to TCP port __________.
a. 139
b. 141
c. 345
d. 349
View Feedback
Question 16 1 / 1 point
A __________ is a trusted entity that signs certificates and can vouch for the identity of the
user and the user's public key.
a. verification authority
b. certification authority
c. validation authority
d. registration authority
View Feedback
Question 17 1 / 1 point
__________ is a command-line interface for Microsoft SQL Server that allows an attacker to
execute commands on the underlying operating system, execute SQL queries, and upload
files to a remote server.
a. SQLExec
b. Absinthe
c. Sqlninja
d. SQLSmack
View Feedback
Question 18 1 / 1 point
The __________ tool traces various application calls from Windows API functions to the
Oracle Call Interface.
a. ASPRunner
b. FlexTracer
c. odbcping
d. SQL Query Analyzer
View Feedback
Question 19 1 / 1 point
The __________ command displays the ARP table and is used to modify it.
a. ifconfig -arp
b. arp-table
c. netstat -arp
d. arp
View Feedback
Question 20 1 / 1 point
Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error.
They can fill in the username and password fields with __________.
a. a pound sign
b. two dashes
c. a single quotation mark
d. double quotes
View Feedback
Question 21 1 / 1 point
RFID __________ collision occurs when an RFID tag reader energizes numerous tags and
the tags' respective signals are reflected back to the reader simultaneously.
a. tag
b. reader
c. token
d. signal
View Feedback
Question 22 1 / 1 point
__________ reconnaissance is a hacker's attempt to scout for or survey potential targets
and then investigate the target using publicly available information.
a. Active
b. Passive
c. Public
d. Open
View Feedback
Question 23 1 / 1 point
The __________ service is responsible for sending a response packet that contains
connection details to clients who send a specially formed request.

More Related Content

PDF
CMIT 321 FINAL EXAM 2016
PDF
CMIT 321 FINAL EXAM (2016 VERSION)
PDF
CMIT 321 FINAL EXAM
ODT
Cmit 321 final exam new spring 2016
ODT
Cmit 321 final exam new spring 2016
PDF
150104 3 methods for-binary_analysis_and_valgrind
PPTX
Reverse Engineering: Protecting and Breaking the Software (Workshop)
PPTX
Reverse Engineering: Protecting and Breaking the Software
CMIT 321 FINAL EXAM 2016
CMIT 321 FINAL EXAM (2016 VERSION)
CMIT 321 FINAL EXAM
Cmit 321 final exam new spring 2016
Cmit 321 final exam new spring 2016
150104 3 methods for-binary_analysis_and_valgrind
Reverse Engineering: Protecting and Breaking the Software (Workshop)
Reverse Engineering: Protecting and Breaking the Software

What's hot (9)

PPTX
Reverse Engineering 101
PPT
Building HMI with VB Tutorial [1998]
PPT
Hrishikesh Choudhari - Overview Of Cracks
PDF
Offensive cyber security: Smashing the stack with Python
PDF
Ceh v8 labs module 05 system hacking
PDF
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
PDF
Asert threat-intelligence-brief-2014-07-illuminating-etumbot-apt
PDF
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
PDF
CEHv8 practice Exam with key
Reverse Engineering 101
Building HMI with VB Tutorial [1998]
Hrishikesh Choudhari - Overview Of Cracks
Offensive cyber security: Smashing the stack with Python
Ceh v8 labs module 05 system hacking
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
Asert threat-intelligence-brief-2014-07-illuminating-etumbot-apt
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
CEHv8 practice Exam with key
Ad

Similar to CMIT 321 FINAL EXAM (UMUC) (20)

ODT
Cmit 321 final exam new spring 2016
ODT
Cmit 321 final exam new spring 2016
ODT
Cmit 321 final exam new spring 2016
PDF
CMIT 321 QUIZ 3
DOCX
1)Which of the following are Penetration testing methodology
PPTX
cyber quiz ppt presentation of engineering
DOC
Stayer cis 359 midterm exam set 3 new
DOC
Strayer cis 359 midterm exam set 3 new
DOC
Strayer cis 359 midterm exam set 3 new
DOC
Stayer cis 359 midterm exam set 3 new
DOC
Stayer cis 359 midterm exam set 3 new
DOCX
Network security interview questions & answers
DOCX
CIS 502 Effective Communication/tutorialrank.com
DOCX
Cis 502 Extraordinary Success/newtonhelp.com
DOCX
1) Which of the following are Penetration testing methodology .docx
DOC
CIS 502 Life of the Mind/newtonhelp.com   
DOC
CIS 502 Focus Dreams/newtonhelp.com
DOC
CIS 502 Imagine Your Future/newtonhelp.com   
DOC
CIS 502 Education Specialist / snaptutorial.com
Cmit 321 final exam new spring 2016
Cmit 321 final exam new spring 2016
Cmit 321 final exam new spring 2016
CMIT 321 QUIZ 3
1)Which of the following are Penetration testing methodology
cyber quiz ppt presentation of engineering
Stayer cis 359 midterm exam set 3 new
Strayer cis 359 midterm exam set 3 new
Strayer cis 359 midterm exam set 3 new
Stayer cis 359 midterm exam set 3 new
Stayer cis 359 midterm exam set 3 new
Network security interview questions & answers
CIS 502 Effective Communication/tutorialrank.com
Cis 502 Extraordinary Success/newtonhelp.com
1) Which of the following are Penetration testing methodology .docx
CIS 502 Life of the Mind/newtonhelp.com   
CIS 502 Focus Dreams/newtonhelp.com
CIS 502 Imagine Your Future/newtonhelp.com   
CIS 502 Education Specialist / snaptutorial.com
Ad

More from HamesKellor (20)

PDF
CMST 290 FINAL EXAM
PDF
CMST 301 PROJECT 1 CASE STUDY
PDF
CMSC 350 PROJECT 3
PDF
CMSC 350 PROJECT 4
PDF
CMSC 350 PROJECT 4
PDF
CMSC 350 PROJECT 1
PDF
CMSC 350 FINAL PROJECT
PDF
CMSC 350 HOMEWORK 2
PDF
CMSC 350 HOMEWORK 3
PDF
CMSC 350 HOMEWORK 1
PDF
CMSC 335 HOMEWORK 3
PDF
CMSC 330 PROJECT 1
PDF
CMSC 335 FINAL PROJECT
PDF
CMSC 330 QUIZ 4
PDF
CMIT 425 RISK ASSESSMENT PAPER
PDF
CMIT 391 LINUX IMPLEMENTATION PROPOSAL
PDF
CMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSAL
PDF
CMIT 321 WEEK 2 QUIZ.
PDF
CMIT 370 FINAL EXAM
PDF
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMST 290 FINAL EXAM
CMST 301 PROJECT 1 CASE STUDY
CMSC 350 PROJECT 3
CMSC 350 PROJECT 4
CMSC 350 PROJECT 4
CMSC 350 PROJECT 1
CMSC 350 FINAL PROJECT
CMSC 350 HOMEWORK 2
CMSC 350 HOMEWORK 3
CMSC 350 HOMEWORK 1
CMSC 335 HOMEWORK 3
CMSC 330 PROJECT 1
CMSC 335 FINAL PROJECT
CMSC 330 QUIZ 4
CMIT 425 RISK ASSESSMENT PAPER
CMIT 391 LINUX IMPLEMENTATION PROPOSAL
CMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSAL
CMIT 321 WEEK 2 QUIZ.
CMIT 370 FINAL EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM

Recently uploaded (20)

PDF
Value-based IP Management at Siemens: A Cross-Divisional Analysis
PDF
Second Hand Fashion Call to Action March 2025
PDF
HQ #118 / 'Building Resilience While Climbing the Event Mountain
PDF
Engaging Stakeholders in Policy Discussions: A Legal Framework (www.kiu.ac.ug)
PDF
Challenges of Managing International Schools (www.kiu. ac.ug)
PDF
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
PPTX
IMM.pptx marketing communication givguhfh thfyu
DOCX
Center Enamel Powering Innovation and Resilience in the Italian Chemical Indu...
PPTX
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
PDF
Kishore Vora - Best CFO in India to watch in 2025.pdf
PDF
Consumer Behavior in the Digital Age (www.kiu.ac.ug)
PPTX
IITM - FINAL Option - 01 - 12.08.25.pptx
PDF
Cross-Cultural Leadership Practices in Education (www.kiu.ac.ug)
PDF
Highest-Paid CEO in 2025_ You Won’t Believe Who Tops the List.pdf
PPTX
Understanding Procurement Strategies.pptx Your score increases as you pick a ...
PPTX
Chapter 2 strategic Presentation (6).pptx
DOCX
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
PDF
Immigration Law and Communication: Challenges and Solutions {www.kiu.ac.ug)
PDF
Business Communication for MBA Students.
PPTX
2 - Self & Personality 587689213yiuedhwejbmansbeakjrk
Value-based IP Management at Siemens: A Cross-Divisional Analysis
Second Hand Fashion Call to Action March 2025
HQ #118 / 'Building Resilience While Climbing the Event Mountain
Engaging Stakeholders in Policy Discussions: A Legal Framework (www.kiu.ac.ug)
Challenges of Managing International Schools (www.kiu. ac.ug)
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
IMM.pptx marketing communication givguhfh thfyu
Center Enamel Powering Innovation and Resilience in the Italian Chemical Indu...
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
Kishore Vora - Best CFO in India to watch in 2025.pdf
Consumer Behavior in the Digital Age (www.kiu.ac.ug)
IITM - FINAL Option - 01 - 12.08.25.pptx
Cross-Cultural Leadership Practices in Education (www.kiu.ac.ug)
Highest-Paid CEO in 2025_ You Won’t Believe Who Tops the List.pdf
Understanding Procurement Strategies.pptx Your score increases as you pick a ...
Chapter 2 strategic Presentation (6).pptx
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
Immigration Law and Communication: Challenges and Solutions {www.kiu.ac.ug)
Business Communication for MBA Students.
2 - Self & Personality 587689213yiuedhwejbmansbeakjrk

CMIT 321 FINAL EXAM (UMUC)

  • 1. Buy here: http://theperfecthomework.com/cmit-321-final-exam-umu c/ Final Exam Question 1 1 / 1 point A __________ is a device that receives digital signals and converts them into analog signals, and vice versa. a. firewall b. proxy c. hub d. modem View Feedback Question 2 1 / 1 point __________ is a parallelized login cracker that supports numerous protocols for attack.
  • 2. a. ADMsnmp b. SING c. Hydra d. John the Ripper View Feedback Question 3 1 / 1 point An __________ share is a hidden share that allows communication between two processes on the same system. a. SMC b. IPC c. EPC d. SMB View Feedback
  • 3. Question 4 1 / 1 point __________ monitors and audits databases for security issues in real time. a. Selective Audit b. AppDetective c. AppRadar d. FlexTracer View Feedback Question 5 1 / 1 point __________ is a command-line utility provided by Microsoft with SQL Server 2000 (and Microsoft SQL Server 2000 Desktop Engine) that allows users to issue queries to the server. a. ODBC b. SQLP c. OSQL
  • 4. d. SSRS View Feedback Question 6 1 / 1 point __________ allows applications to read and write various image file formats, including GIF. a. ImageCore b. CoreText c. ImageIO d. CoreImage View Feedback Question 7 1 / 1 point Which of the following types of tools would be most effective in cracking UNIX passwords? a. Ophcrack
  • 5. b. KerbCrack c. John the Ripper d. RainbowCrack View Feedback Question 8 1 / 1 point A __________ is a device that cannot function in any capacity. a. block b. brick c. rock d. cage View Feedback Question 9 1 / 1 point
  • 6. __________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it. a. CheckOK b. SMTPCheck c. SMTPMon d. SLCheck View Feedback Question 10 1 / 1 point In a hit-and-run attack, __________. a. the attacker constantly injects bad packets into the router b. the attacker mistreats packets, resulting in traffic congestion c. the attacker injects a few bad packets into the router d. the attacker alters a single packet, resulting in denial of service View Feedback
  • 7. Question 11 1 / 1 point __________ is the act of gathering information about the security profile of a computer system or organization, undertaken in a methodological manner. a. Tracerouting b. Passive information gathering c. Footprinting d. Competitive intelligence gathering View Feedback Question 12 1 / 1 point __________, formerly called AppTapp, is a tool for jailbreaking and installing nonsanctioned third-party applications on the iPhone. a. iFuntastic b. iNdependence
  • 8. c. iActivator d. AppSnapp View Feedback Question 13 1 / 1 point __________ is a tool for performing automated attacks against web-enabled applications. a. cURL b. dotDefender c. Burp Intruder d. AppScan View Feedback Question 14 1 / 1 point A __________, also called a packet analyzer, is a software program that can capture, log, and analyze protocol traffic over the network and decode its contents.
  • 9. a. sniffer b. recorder c. logger d. tapper View Feedback Question 15 1 / 1 point Null sessions require access to TCP port __________. a. 139 b. 141 c. 345 d. 349 View Feedback
  • 10. Question 16 1 / 1 point A __________ is a trusted entity that signs certificates and can vouch for the identity of the user and the user's public key. a. verification authority b. certification authority c. validation authority d. registration authority View Feedback Question 17 1 / 1 point __________ is a command-line interface for Microsoft SQL Server that allows an attacker to execute commands on the underlying operating system, execute SQL queries, and upload files to a remote server. a. SQLExec b. Absinthe c. Sqlninja
  • 11. d. SQLSmack View Feedback Question 18 1 / 1 point The __________ tool traces various application calls from Windows API functions to the Oracle Call Interface. a. ASPRunner b. FlexTracer c. odbcping d. SQL Query Analyzer View Feedback Question 19 1 / 1 point The __________ command displays the ARP table and is used to modify it. a. ifconfig -arp
  • 12. b. arp-table c. netstat -arp d. arp View Feedback Question 20 1 / 1 point Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error. They can fill in the username and password fields with __________. a. a pound sign b. two dashes c. a single quotation mark d. double quotes View Feedback
  • 13. Question 21 1 / 1 point RFID __________ collision occurs when an RFID tag reader energizes numerous tags and the tags' respective signals are reflected back to the reader simultaneously. a. tag b. reader c. token d. signal View Feedback Question 22 1 / 1 point __________ reconnaissance is a hacker's attempt to scout for or survey potential targets and then investigate the target using publicly available information. a. Active b. Passive c. Public d. Open
  • 14. View Feedback Question 23 1 / 1 point The __________ service is responsible for sending a response packet that contains connection details to clients who send a specially formed request.