среда, 11 ноября 2015 г.

CIS 333 WEEK 2 QUIZ 3


  • Question 1
1 out of 1 points
  
 
A(n) ___________ fingerprint scanner is a software program that allows an attacker to send logon packets to an IP host device.
Answer
   

 
   
  • Question 2
1 out of 1 points
  
 
What is meant by firewall?
Answer
   

 
   
  • Question 3
0 out of 1 points
  
 
________ is a type of attack in which the attacker takes control of a session between two machines and masquerades as one of them.
Answer
   

 
   
  • Question 4
0 out of 1 points
  
 
What is meant by promiscuous mode?
Answer
   

 
   
  • Question 5
0 out of 1 points
  
 
A protocol analyzer or ____________ is a software program that enables a computer to monitor and capture network traffic.
Answer
   

 
   
  • Question 6
0 out of 1 points
  
 
A ___________ is a software program that performs one of two functions: brute-force password attack to gain unauthorized access to a system, or recovery of passwords stored in a computer system.
Answer
   

 
   
  • Question 7
1 out of 1 points
  
 
Prior to VoIP, attackers would use wardialers to ________.
Answer
   

 
   
  • Question 8
1 out of 1 points
  
 
Black-hat hackers generally poke holes in systems, but do not attempt to disclose __________ they find to the administrators of those systems.
Answer
   

 
   
  • Question 9
1 out of 1 points
  
 
A software program that collects information about Internet usage and uses it to present targeted advertisements to users is the definition of ________.
Answer
   

 
   
  • Question 10
0 out of 1 points
  
 
When an attacker discovers a __________, he or she can use it to bypass existing security controls such as passwords, encryption, and so on.
Answer
   

 
   
  • Question 11
1 out of 1 points
  
 
Which of the following is the definition of netcat?
Answer
   

 
   
  • Question 12
1 out of 1 points
  
 
Malicious software can be hidden in a ________.
Answer
   

 
  
   
  • Question 13
1 out of 1 points
  
 
Loss of financial assets due to ________ is a worst-case scenario for all organizations.
Answer
   

 
   
  • Question 14
1 out of 1 points
  
 
What term is used to describe an attack in which the attacker gets between two parties and intercepts messages before transferring them on to their intended destination?
Answer
   

 
   
  • Question 15
1 out of 1 points
  
 
What name is given to any event that results in a violation of any of the C-I-A security tenets?
Answer
   

 
   
  • Question 16
0 out of 1 points
  
 
A _________ has a hostile intent, possesses sophisticated skills, and may be interested in financial gain. They represent the greatest threat to networks and information resources.
Answer
   

 
   
  • Question 17
0 out of 1 points
  
 
A ___________ is a tool used to scan IP host devices for open ports that have been enabled.
Answer
   

 
   
  • Question 18
0 out of 1 points
  
 
What is meant by rootkit?
Answer
   

 
   
  • Question 19
1 out of 1 points
  
 
________ is a method that black-hat hackers use to attempt to compromise logon and password access controls, usually following a specific attack plan, including the use of social engineering to obtain user information.
Answer
   

 
   
  • Question 20
1 out of 1 points
  
 
Another type of attacker is called a ________. This is a person with little or no skill who simply follows directions or uses a “cookbook” approach to carrying out a cyberattack without understanding the meaning of the steps he or she is performing.
Answer

Комментариев нет:

Отправить комментарий