CMIT 321 Final Exam Version 3. Questions And Answers. Latest Exam
5 views 0 purchase
Course
CMIT 321
Institution
University Of Maryland
CMIT 321 Final Exam Version 3. Questions And Answers. Latest Exam.Question 1 (1 point)
Saved
The attacker uses the following attack, in order to listen to the
conversation between the user and the server and captures the
authentication token of the user. With this authentication token, the
att...
cmit 321 final exam version 3 questions and answers latest exam
the attacker uses the following attack
in order to listen to the conversation between the user and the server and
Written for
University Of Maryland
CMIT 321
All documents for this subject (3)
Seller
Follow
StudyConnect
Reviews received
Content preview
Quiz
Question 1 (1 point)
Saved
The attacker uses the following attack, in order to listen to the
conversation between the user and the server and captures the
authentication token of the user. With this authentication token, the
attacker replays the request to the server with the captured
authentication token and gains unauthorized access to the server
Question 1 options:
Session Replay attack
Session Fixation attacks
Session hijacking using proxy servers
Client side attacks
Question 2 (1 point)
Saved
From the following identify the technique through which an attacker
distributes malware on the web by sending a malware attached email
and tricking the victim to click the attachment.
Question 2 options:
Social Engineered Click-jacking
Spearphishing Sites
Spam Emails
Drive-by Downloads
Question 3 (1 point)
Saved
,Vulnerability management life cycle is an important process that
helps in finding and remediating security weaknesses before they are
exploited.
identify the phase that involves the remediation.
Question 3 options:
Pre-Assessment Phase
Vulnerability Assessment Phase
Risk Assessment Phase
Post Assessment Phase
Question 4 (1 point)
Saved
Attacker uses the ‘%00’ character prior to a string in order to bypass
detection mechanism. Identify the type of evasion technique used by
the attacker.
Question 4 options:
Case Variation
URL Encoding
Null Byte
Obfuscated Codes
Question 5 (1 point)
Saved
Using which port the attacker can compromise the entire network,
and receive a copy of every packet that passes through a switch
Question 5 options:
, SPAN Port
TAP Port
UDP port
TCP port
Question 6 (1 point)
Saved
Identify the type of cloud computing, which provides virtual machines
and other abstracted hardware and operating systems which may be
controlled through a service API
Question 6 options:
Software-as-a-Service (SaaS)
Platform-as-a-Service (PaaS)
Infrastructure-as-a-Service (IaaS)
Virtual Service
Question 7 (1 point)
Saved
Which of the following tool can capture RPL related information and
live packets from networks in a non-intrusive manner?
Question 7 options:
Foren6
RFCrack
HackRF One
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller StudyConnect. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $15.49. You're not tied to anything after your purchase.