CIS 552 CIS552 Final Exam with Answers (March 2017) – Online Homework Help
CIS 552 Week 11 Final Exam / Cybercrime Techniques & Response (March 2017)
- Why are database attacks that inject data a concern for organizations?
- Which of the following options is a useful defense against database attacks?
- What is XSS?
- What type of malware attempts to trick victims into purchasing software or providing their credit card numbers?
- What is the name of a virus that changes itself when it spreads?
- Which of the following is a piece of code or software designed to lie in wait on a system until a specified event occurs?
- Which of the following types of viruses is designed to make the user take action even though no infection or threat exists?
- Which of the following communication methods employs security mechanisms called trusted devices?
- WEP is vulnerable to __________.
- Using MAC filtering and enabling WPA2 encryption are examples of what sort of wireless security activity?
- What capability is provided by inSSIDer?
- In Linux, which of the following correctly denotes a hard drive in a machine?
- Which of the following Linux directories contains system variables such as print and mail spoolers, log files, and process IDs?
- Approximately how many distributions of Linux are available in different forms and formats?
- Who originally designed and created Linux?
- Which of the following is best suited for environments where critical system-level assets need to be monitored?
- Which of the following best describes a proxy firewall?
- Which of the following provides the ability to monitor a network, host, or application, and report back when suspicious activity is detected?
- All but which of the following is commonly included in a security policy?
- Installing Netcat on a remote system by using an exploit is an example of what type of attack?
- Which of the following best describes what occurs when a user attempts a connection to a Windows system without the standard username and password being provided?
- Which of the following best describes what occurs when a lower-level account is cracked in order to obtain increased access?
- Which of the following is an attack that uses the rights of a low-privilege user to assume higher privileges?
- Which of the following is an example of inserting traffic into another system’s traffic to take over its connection?
- Which of the following attacks generally involves one computer targeting another, seeking to shut it down and deny legitimate use of its services?
- Which of the following takes place on networks such as those that have a hub as the connectivity device?
- Which of the following methods allows attackers to merge their intended payload with a harmless executable to create a single executable from the two?
- Which of the following describes valid protection against malware?
- Which of the following is a type of Trojan designed to give an attacker control over a victim’s system?
- Which of the following terms describes a malware program that helps the attacker gain remote access to a system?
Comments
Post a Comment