CIS 552 CIS552 Week 11 Final Exam Answers (Spring 2017) – Online Homework Help
CIS 552 Cybercrime Techniques & Response Final Exam Answers
- What is the name of a virus that changes itself when it spreads?
- Which of the following is a piece of code or software designed to lie in wait on a system until a specified event occurs?
- Which of the following is a piece of code or software that spreads from system to system by attaching itself to other files?
- Which of the following is a self-replicating piece of software?
- Who originally designed and created Linux?
- Which of the following Linux directories is considered to be similar to the Windows folder in the Microsoft operating system?
- Which of the following Linux directories is the location of files that dictates access between hardware and the operating system?
- Most versions of Linux make their source code available through which of the following methods?
- Inserting action is an example of what type of Web attack?
- Which of these describes a database security problem that occurs when actions of database users are not properly tracked?
- An attacker who adds commands to a database query has likely used ___________.
- Which of the following best describes the ability of a network card to see all traffic and not only the traffic specifically addressed to it?
- Which of the following is an application or device that is designed to capture network traffic as it moves across the network?
- Which of the following protocols is not easily sniffed?
- All but which of the following is commonly included in a security policy?
- Which of the following best describes the control of information when a security incident occurs?
- Which of the following is a use for a honeynet?
- All but which of the following constitutes a security incident?
- Nessus® is a __________.
- Which of the following is a type of Trojan designed to give an attacker control over a victim’s system?
- Which of the following ports does Back Orifice communicate on?
- Which of the following is not a target of Trojans?
- Factors that affect the emanations of a wireless network include all but which one of the following?
- Why is WPA2 superior to WPA?
- What is Bluejacking?
- What capability is provided by inSSIDer?
- Processes in Windows run in all of but which one of the following user contexts?
- Which of the following is an attack that uses the rights of a low-privilege user to assume higher privileges?
- Enumeration can be used to discover all but which of the following types of information?
- Which of the following is a utility specifically designed to troubleshoot name resolution issues?
Comments
Post a Comment