Author: Joyce Buda


Question 1

1 / 1 point

__________ is the exploitation of an organization's telephone, dial, and private branch exchange (PBX) system to infiltrate the internal network in order to abuse computing resources.
a. War driving

b. Line dialing

c. PBX driving

d. War dialing

View Feedback

Question 2

1 / 1 point

__________ cryptography is the most common method on the Internet for authenticating a message sender or encrypting a message.
a. Symmetric

b. Hash-based

c. Private-key

d. Public-key

View Feedback

Question 3

1 / 1 point

__________ is a lightweight Knoppix version cut to 50 MB for a business-card-sized CD.
a. Gnoppix

b. GeeXboX

c. Morphix

d. Damn Small Linux

View Feedback

Question 4

1 / 1 point

The __________ utility tests the integrity of an ODBC data source.
a. odbcping

b. ASPRunner

c. FlexTracer

d. DbEncrypt

View Feedback

Question 5

1 / 1 point

In the TCP/IP stack, the __________ layer is where applications and protocols, such as HTTP and Telnet, operate.
a. Internet

b. network

c. transport

d. application

View Feedback

Question 6

1 / 1 point

Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error. They can fill in the username and password fields with __________.
a. a pound sign

b. two dashes

c. a single quotation mark

d. double quotes

View Feedback

Question 7

1 / 1 point

__________ allow attackers to pass malicious code to different systems via a web application.
a. SQL injection attacks

b. XSS vulnerabilities

c. Authentication hijacking attacks

d. Command injection flaws

View Feedback

Question 8

1 / 1 point

A __________ is a trusted entity that signs certificates and can vouch for the identity of the user and the user's public key.
a. verification authority

b. certification authority

c. validation authority

d. registration authority

View Feedback

Question 9

1 / 1 point

Null sessions require access to TCP port __________.
a. 139

b. 141

c. 345

d. 349

View Feedback

Question 10

1 / 1 point

__________ is a command-line utility provided by Microsoft with SQL Server 2000 (and Microsoft SQL Server 2000 Desktop Engine) that allows users to issue queries to the server.




View Feedback

See More
Try a College Course Free

Sophia’s self-paced online courses are a great way to save time and money as you earn credits eligible for transfer to over 2,000 colleges and universities.*

Begin Free Trial
No credit card required

26 Sophia partners guarantee credit transfer.

226 Institutions have accepted or given pre-approval for credit transfer.

* The American Council on Education's College Credit Recommendation Service (ACE Credit®) has evaluated and recommended college credit for 21 of Sophia’s online courses. More than 2,000 colleges and universities consider ACE CREDIT recommendations in determining the applicability to their course and degree programs.