CIS 552 CIS552 Week 5 Midterm Answers (Spring 2017) – Online Homework Help


CIS 552 Cybercrime Techniques & Response Midterm Exam Answers

  1. All but which one of the following is security vulnerability found in RIP?
  2. Which of the following is the main purpose of ICMP?
  3. OSPF operates at which of the following layers of the OSI model?
  4. Which of the following statements is true in regard to protocols?
  5. Which of the following is a common application layer attack?
  6. When choosing between guards and dogs for physical, which of the following factors must be considered?
  7. Which of the following biometric authentication methods is most frequently found on laptops?
  8. Which of the following lock grades should be selected in order to appropriately protect critical business assets?
  9. CCTV can be used as which of the following type of tools?
  10. Focal length defines which of the following camera qualities?
  11. Which of the following describes penetration testing as a four-step process?
  12. Which of the following is a corporate governance law that affects public corporations’ financial reporting?
  13. Which of the following statements is most accurate in regard to successful security professionals?
  14. Which of the following terms best describes hackers that occupy the lowest level of the hacker hierarchy?
  15. Which of the following controls take the form of software or hardware such as firewalls, proxies, and intrusion detection systems?
  16. In order to locate domain information on a Canadian organization, which of the following Regional Internet Registries would be checked first?
  17. Which of the following databases would be valuable for obtaining information about a company’s financial history?
  18. Which of the following is most likely to provide a wealth of publicly posted information about an organization’s employees?
  19. In order to locate domain information on a European organization, which of the following Regional Internet Registries would be checked first?
  20. Which of the following best describes the purpose of the intitle command?
  21. Which of the following is a tool used for network mapping?
  22. Which of the following ports does SSH operate on?
  23. Which of the following is a tool used for wardriving?
  24. Which of the following best describes the SYN flag?
  25. Modems can be located by conducting what type of attack?
  26. Which of the following is a commonly used hashing algorithm?
  27. Which of the following is a cipher commonly known as a key shift cipher?
  28. Key management includes all but which one of the following processes?
  29. Which of following methods is best suited in a situation where bulk encryption is required?
  30. Which of the following terms best describes the main principle behind PKI?

Comments

Popular posts from this blog

Phoenix MKT 593 Week 4 Individual Assignment Signature Assignment Strategic Marketing Plan Marketing Plan Description

BIBL 104 BIBL104 Quiz 1 with Answers (Liberty)

Phoenix MKT 593 Week 3 Individual Assignment Ethical Issues