Log in

"Post your contents, writings, articles, info-graphics, and more on spacenab."
sign up with facebook
Create a new post

CIS552 Final Exam


CIS552 Final Exam Answers


Purchase From here:



•           Question 1



            Which of the following is not a virus preventative technique?


•           Question 2



            What is the name of a virus that changes itself when it spreads?


•           Question 3



            Which of the following is a piece of code or software that spreads from system to system by attaching itself to other files?


•           Question 4



            What type of malware attempts to trick victims into purchasing software or providing their credit card numbers?


•           Question 5


            Which of the following best describes what occurs when a lower-level account is cracked in order to obtain increased access?


•           Question 6



            Enumeration can be used to discover all but which of the following types of information?


•           Question 7



            Installing Netcat on a remote system by using an exploit is an example of what type of attack?


•           Question 8


            Which of the following best describes what occurs when a user attempts a connection to a Windows system without the standard username and password being provided?


•           Question 9

0 out of 2.6667 points


            What can an insecure login system provide?


•           Question 10


            Which of these describes a database security problem that occurs when actions of database users are not properly tracked?


•           Question 11



            Changing the content of a Web site with the intent of leaving a distinguishing mark or changing its appearance is __________.


•           Question 12



            Identifying fixes and prevention methods occurs in which of these incident response stages?


•           Question 13



            Which of the following properly describes an IDS system?


•           Question 14


            Which of the following is best suited for environments where critical system-level assets need to be monitored?


•           Question 15



            An incident response team does not respond to which of the following events?

•           Question 16



            In Linux, which of the following is the account that has complete and unrestricted access?


•           Question 17


            Who originally designed and created Linux?


•           Question 18



            Most versions of Linux make their source code available through which of the following methods?


•           Question 19



            Approximately how many distributions of Linux are available in different forms and formats?


•           Question 20



            Which of the following is not a target of Trojans?


•           Question 21



            Which of the following ports does Back Orifice communicate on?


•           Question 22


            Which of the following terms describes a malware program that helps the attacker gain remote access to a system?


•           Question 23



            Which of the following describes valid protection against malware?


•           Question 24


            Which sniffer tool is designed to intercept and reveal passwords?


•           Question 25


            Which of the following is defined in Title 18, Section 2511 of the U.S. Code on electronic crimes?


•           Question 26



            Which of the following attacks generally involves one computer targeting another, seeking to shut it down and deny legitimate use of its services?


•           Question 27



            Which of the following communication methods employs security mechanisms called trusted devices?


•           Question 28



            What capability is provided by inSSIDer?


•           Question 29



            Why is WPA2 superior to WPA?


•           Question 30



            Factors that affect the emanations of a wireless network include all but which one of the following?



Views(37) Opinions(0) 09/19/2016 12:26:17 Report abuse
Copyright © 2014 . All the right reserved.