100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CMIT 321| ETHICAL HACKING| FINAL EXAM WITH 100% CORRECT ANSWERS| 2024|GRADED A $13.99   Add to cart

Exam (elaborations)

CMIT 321| ETHICAL HACKING| FINAL EXAM WITH 100% CORRECT ANSWERS| 2024|GRADED A

 7 views  0 purchase
  • Course
  • CMIT 321
  • Institution
  • CMIT 321

CMIT 321| ETHICAL HACKING| FINAL EXAM WITH 100% CORRECT ANSWERS| 2024|GRADED A

Preview 4 out of 129  pages

  • August 18, 2024
  • 129
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • cmit 321
  • CMIT 321
  • CMIT 321
avatar-seller
Prose1
Ethical Hacking Final Exam i i i




Question 0. i




This vulnerability scanner is from Microsoft:
i i i i i


Question options: i



Nessus i




Core
Impact Clou
i i




d Scan
i




MBSA
i




Question 1 i




i is a command-line tool that is bundled with both Windows and
i i i i i i i i i i


UNIXoperating systems and is used for querying DNS information.
i i i i i i i i i i




Question 1 options: i i



Whois
Traceroute i



Netstat
Nslookup
i




Question 2 i




Which type of information cannot be found in a resource record
i i i i i i i i i i




(RR)?Question 2 options:
i i i i



MX
i ARP
i PTR i



SOA

Question 3 i




i is a network scanning technique used to discover i i i i i i i


i whichrange of IP addresses map to live computers.
i i i i i i i i

,Question 3 options: i i



Port scanning i




Ping sweep i



i Probe
scanningFinger
i i



printing


Question 4 i




An attacker is interested in discovering ports that might be open on a target
i i i i i i i i i i i i i


system. The attacker decides to port scan the IP address of the system but
i i i i i i i i i i i i i i


alsowants to make the scan as stealthy as possible. Which of the following
i i i i i i i i i i i i i i


techniques would be the best choice in this scenario?
i i i i i i i i i




Question 4 options: i i



TCP connect scan i i




SYN scan i




i ICMP echo i



scanList scan
i i i




Question 5 i




During the Reconnaissance Phase of an attack, the attacker may resort to looking
i i i i i i i i i i i i


through an organization’s trash for discarded sensitive information. Thistechnique
i i i i i i i i i i


is known as
i i . i




Question 5 options: i i



social engineering
i i



breaking and entering i i



dumpster diving
i i



i passive reconnaissance i




Question 6 i




Which of the following are objectives of scanning? (Select all that apply.)Question 6
i i i i i i i i i i i i i




options:
i



a) b) c) d) i i i




To discover live hosts, IP address, and open ports of live hosts
i i i i i i i i i i i

, To discover operating systems and system
i i i i i




architectureTo discover services running on hosts
i i i i i i i




To discover vulnerabilities in live hosts
i i i i i




Question 7 i




The Simple Service Discovery Protocol (SSDP) will (choose
i i i i i i i




3):Question 7 options:
i i i i


Not work behind a firewall i i i i



Can be vulnerable to denial of i i i i i




i serviceUses multicast addresses i i i



Controls Communication for the Universal Plug and Play i i i i i i i



ServiceSave
i i




Question 8 i




Which port scanning method is considered the most reliable in terms
i i i i i i i i i i


ofaccurately reporting port status on a target system?
i i i i i i i i i




Question 8 options: i i



TCP connect() scan i i




SYN scan i




ACK scan
i i



i XMAS scan i




Question 9 i




The following tools are used for footprining (choose
i i i i i i i




3):Question 9 options:
i i i i



Recong-
ngAircrack- i




ngMaltego i



i FOCA


Question 10 i

, i is a spoofing technique that allows an attacker to choose i i i i i i i i i


thepath a packet will take through the Internet.
i i i i i i i i i




Question 10 options: i i



SYN scanning i




Tracerouting
Source
i



routingHTTP
i i



tunneling
i




Question 11 i




If you want to mask (or spoof your IPAddress, use this type of
i i i i i i i i i i i i i




scan:Question 11 options:
i i i i



IDLE, IPID Scan i i




UDP Scan i




ACK Flag Probe i i



ScanStealth Scan
i i i




Question 12 i




Attackers can use an ACK scan to learn the type of firewall or firewall rule sets that
i i i i i i i i i i i i i i i i


might be guarding a target system. Based on the packet information below, which
i i i i i i i i i i i i i


port is considered to be filtered? Packet 1:Attackers can use an ACK scanto learn
i i i i i i i i i i i i i i i i


the type of firewall or firewall rule sets that might be guarding a target system.
i i i i i i i i i i i i i i i


Based on the packet information below, which port is considered to be filtered?
i i i i i i i i i i i i i




Packet 1: Server IP port 20: F: RST TTL: 68 i i i i i i i i i i


win:0 Packet 2: Server IP port 21: F: RST TTL: 56
i i i i i i i i i i i i


win:0 Packet 3: Server IP port 22: F: RST TTL: 68
i i i i i i i i i i i i


win:0 Packet 4: Server IP port 23: F: RST TTL: 68
i i i i i i i i i i i i


win:0
i




Question 12 options: i i



20
21
22
23

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Prose1. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79223 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.99
  • (0)
  Add to cart