spacenab

Spacenab

Log in

 Password
"Post your contents, writings, articles, info-graphics, and more on spacenab."
sign up with facebook
Create a new post
Rabbit

CIS 552 Final Exam Solution

Rabbit

CIS 552 Final Exam Solution

 http://hwminute.com/downloads/cis-552-final-exam-solution/

  • Question 1

 

 

Which of the following is not a virus preventative technique?

 

  • Question 2

 

 

What is the name of a virus that changes itself when it spreads?

 

  • Question 3

 

 

Which of the following is a piece of code or software that spreads from system to system by attaching itself to other files?

 

  • Question 4

 

 

What type of malware attempts to trick victims into purchasing software or providing their credit card numbers?

 

  • Question 5

 

Which of the following best describes what occurs when a lower-level account is cracked in order to obtain increased access?

 

  • Question 6

 

 

Enumeration can be used to discover all but which of the following types of information?

 

  • Question 7

 

 

Installing Netcat on a remote system by using an exploit is an example of what type of attack?

 

  • Question 8

 

Which of the following best describes what occurs when a user attempts a connection to a Windows system without the standard username and password being provided?

 

  • Question 9

0 out of 2.6667 points

 

What can an insecure login system provide?

 

  • Question 10

 

Which of these describes a database security problem that occurs when actions of database users are not properly tracked?

 

  • Question 11

 

 

Changing the content of a Web site with the intent of leaving a distinguishing mark or changing its appearance is __________.

 

  • Question 12

 

 

Identifying fixes and prevention methods occurs in which of these incident response stages?

 

  • Question 13

 

 

Which of the following properly describes an IDS system?

 

  • Question 14

 

Which of the following is best suited for environments where critical system-level assets need to be monitored?

 

  • Question 15

 

 

An incident response team does not respond to which of the following events?

  • Question 16

 

 

In Linux, which of the following is the account that has complete and unrestricted access?

 

  • Question 17

 

Who originally designed and created Linux?

 

  • Question 18

 

 

Most versions of Linux make their source code available through which of the following methods?

 

  • Question 19

 

 

Approximately how many distributions of Linux are available in different forms and formats?

 

  • Question 20

 

 

Which of the following is not a target of Trojans?

 

  • Question 21

 

 

Which of the following ports does Back Orifice communicate on?

 

  • Question 22

 

Which of the following terms describes a malware program that helps the attacker gain remote access to a system?

 

  • Question 23

 

 

Which of the following describes valid protection against malware?

 

  • Question 24

 

Which sniffer tool is designed to intercept and reveal passwords?

 

  • Question 25

 

Which of the following is defined in Title 18, Section 2511 of the U.S. Code on electronic crimes?

 

  • Question 26

 

 

Which of the following attacks generally involves one computer targeting another, seeking to shut it down and deny legitimate use of its services?

 

  • Question 27

 

 

Which of the following communication methods employs security mechanisms called trusted devices?

 

  • Question 28

 

 

What capability is provided by inSSIDer?

 

  • Question 29

 

 

Why is WPA2 superior to WPA?

 

  • Question 30

 

 

Factors that affect the emanations of a wireless network include all but which one of the following?

Views(62) Opinions(0) 09/05/2016 14:53:56 Report abuse
Copyright © 2014 spacenab.com . All the right reserved.