spacenab

Spacenab

Log in

 Password
"Post your contents, writings, articles, info-graphics, and more on spacenab."
sign up with facebook
Create a new post
Rabbit

CIS552 Final Exam Answers

Rabbit

CIS552 Final Exam Answers

 

Purchase From here:

 

http://www.homeworkarena.com/cis552-final-exam-answers

 

 

•           Question 1

 

           

            Which of the following is not a virus preventative technique?

                                   

•           Question 2

 

           

            What is the name of a virus that changes itself when it spreads?

                                   

•           Question 3

 

           

            Which of the following is a piece of code or software that spreads from system to system by attaching itself to other files?

                                   

•           Question 4

 

           

            What type of malware attempts to trick victims into purchasing software or providing their credit card numbers?

                                   

•           Question 5

           

            Which of the following best describes what occurs when a lower-level account is cracked in order to obtain increased access?

                                   

•           Question 6

 

           

            Enumeration can be used to discover all but which of the following types of information?

                                   

•           Question 7

 

           

            Installing Netcat on a remote system by using an exploit is an example of what type of attack?

                                   

•           Question 8

           

            Which of the following best describes what occurs when a user attempts a connection to a Windows system without the standard username and password being provided?

                                   

•           Question 9

0 out of 2.6667 points

           

            What can an insecure login system provide?

                                   

•           Question 10

           

            Which of these describes a database security problem that occurs when actions of database users are not properly tracked?

                                   

•           Question 11

 

           

            Changing the content of a Web site with the intent of leaving a distinguishing mark or changing its appearance is __________.

                                   

•           Question 12

 

           

            Identifying fixes and prevention methods occurs in which of these incident response stages?

                                   

•           Question 13

 

           

            Which of the following properly describes an IDS system?

                                   

•           Question 14

           

            Which of the following is best suited for environments where critical system-level assets need to be monitored?

                                   

•           Question 15

 

           

            An incident response team does not respond to which of the following events?

•           Question 16

 

           

            In Linux, which of the following is the account that has complete and unrestricted access?

                                   

•           Question 17

           

            Who originally designed and created Linux?

                                   

•           Question 18

 

           

            Most versions of Linux make their source code available through which of the following methods?

                                   

•           Question 19

 

           

            Approximately how many distributions of Linux are available in different forms and formats?

                                   

•           Question 20

 

           

            Which of the following is not a target of Trojans?

                                   

•           Question 21

 

           

            Which of the following ports does Back Orifice communicate on?

                                   

•           Question 22

           

            Which of the following terms describes a malware program that helps the attacker gain remote access to a system?

                                   

•           Question 23

 

           

            Which of the following describes valid protection against malware?

                                   

•           Question 24

           

            Which sniffer tool is designed to intercept and reveal passwords?

                                   

•           Question 25

           

            Which of the following is defined in Title 18, Section 2511 of the U.S. Code on electronic crimes?

                                   

•           Question 26

 

           

            Which of the following attacks generally involves one computer targeting another, seeking to shut it down and deny legitimate use of its services?

                                   

•           Question 27

 

           

            Which of the following communication methods employs security mechanisms called trusted devices?

                                   

•           Question 28

 

           

            What capability is provided by inSSIDer?

                                   

•           Question 29

 

           

            Why is WPA2 superior to WPA?

                                   

•           Question 30

 

           

            Factors that affect the emanations of a wireless network include all but which one of the following?

                                   

 

Views(13) Opinions(0) 09/19/2016 12:25:50 Report abuse
Copyright © 2014 spacenab.com . All the right reserved.