CIS 552 CIS552 Week 5 Midterm Answers (Spring 2017) – Online Homework Help
CIS 552 Cybercrime Techniques & Response Midterm Exam Answers
- All but which one of the following is security vulnerability found in RIP?
- Which of the following is the main purpose of ICMP?
- OSPF operates at which of the following layers of the OSI model?
- Which of the following statements is true in regard to protocols?
- Which of the following is a common application layer attack?
- When choosing between guards and dogs for physical, which of the following factors must be considered?
- Which of the following biometric authentication methods is most frequently found on laptops?
- Which of the following lock grades should be selected in order to appropriately protect critical business assets?
- CCTV can be used as which of the following type of tools?
- Focal length defines which of the following camera qualities?
- Which of the following describes penetration testing as a four-step process?
- Which of the following is a corporate governance law that affects public corporations’ financial reporting?
- Which of the following statements is most accurate in regard to successful security professionals?
- Which of the following terms best describes hackers that occupy the lowest level of the hacker hierarchy?
- Which of the following controls take the form of software or hardware such as firewalls, proxies, and intrusion detection systems?
- In order to locate domain information on a Canadian organization, which of the following Regional Internet Registries would be checked first?
- Which of the following databases would be valuable for obtaining information about a company’s financial history?
- Which of the following is most likely to provide a wealth of publicly posted information about an organization’s employees?
- In order to locate domain information on a European organization, which of the following Regional Internet Registries would be checked first?
- Which of the following best describes the purpose of the intitle command?
- Which of the following is a tool used for network mapping?
- Which of the following ports does SSH operate on?
- Which of the following is a tool used for wardriving?
- Which of the following best describes the SYN flag?
- Modems can be located by conducting what type of attack?
- Which of the following is a commonly used hashing algorithm?
- Which of the following is a cipher commonly known as a key shift cipher?
- Key management includes all but which one of the following processes?
- Which of following methods is best suited in a situation where bulk encryption is required?
- Which of the following terms best describes the main principle behind PKI?
Comments
Post a Comment