CIS 552 CIS552 Final Exam with Answers (March 2017) – Online Homework Help


CIS 552 Week 11 Final Exam / Cybercrime Techniques & Response (March 2017)

  1. Why are database attacks that inject data a concern for organizations?
  2. Which of the following options is a useful defense against database attacks?
  3. What is XSS?
  4. What type of malware attempts to trick victims into purchasing software or providing their credit card numbers?
  5. What is the name of a virus that changes itself when it spreads?
  6. Which of the following is a piece of code or software designed to lie in wait on a system until a specified event occurs?
  7. Which of the following types of viruses is designed to make the user take action even though no infection or threat exists?
  8. Which of the following communication methods employs security mechanisms called trusted devices?
  9. WEP is vulnerable to __________.
  10. Using MAC filtering and enabling WPA2 encryption are examples of what sort of wireless security activity?
  11. What capability is provided by inSSIDer?
  12. In Linux, which of the following correctly denotes a hard drive in a machine?
  13. Which of the following Linux directories contains system variables such as print and mail spoolers, log files, and process IDs?
  14. Approximately how many distributions of Linux are available in different forms and formats?
  15. Who originally designed and created Linux?
  16. Which of the following is best suited for environments where critical system-level assets need to be monitored?
  17. Which of the following best describes a proxy firewall?
  18. Which of the following provides the ability to monitor a network, host, or application, and report back when suspicious activity is detected?
  19. All but which of the following is commonly included in a security policy?
  20. Installing Netcat on a remote system by using an exploit is an example of what type of attack?
  21. Which of the following best describes what occurs when a user attempts a connection to a Windows system without the standard username and password being provided?
  22. Which of the following best describes what occurs when a lower-level account is cracked in order to obtain increased access?
  23. Which of the following is an attack that uses the rights of a low-privilege user to assume higher privileges?
  24. Which of the following is an example of inserting traffic into another system’s traffic to take over its connection?
  25. Which of the following attacks generally involves one computer targeting another, seeking to shut it down and deny legitimate use of its services?
  26. Which of the following takes place on networks such as those that have a hub as the connectivity device?
  27. Which of the following methods allows attackers to merge their intended payload with a harmless executable to create a single executable from the two?
  28. Which of the following describes valid protection against malware?
  29. Which of the following is a type of Trojan designed to give an attacker control over a victim’s system?
  30. Which of the following terms describes a malware program that helps the attacker gain remote access to a system?

Comments

Popular posts from this blog

Phoenix MKT 593 Week 4 Individual Assignment Signature Assignment Strategic Marketing Plan Marketing Plan Description

BIBL 104 BIBL104 Quiz 1 with Answers (Liberty)

Phoenix MKT 593 Week 3 Individual Assignment Ethical Issues