+
CMIT 321 QUIZ 3

CMIT 321 QUIZ 3

Rating:
Rating
(0)
Author: Joyce Buda
Description:

http://theperfecthomework.com/cmit-321-quiz-4/


At what layer of the TCP stack does web browsing take place?
Question 1 options:
 
network

 
application

 
Internet

 
data link
Which of the following functions can used to defend against buffer overflows? (Select all that apply.)
Question 6 options:
 
a) 

gets()

 
b) 

fgets()

 
c) 

strcopy()

 
d) 

strncopy()

 
Which of the following tools automates and takes advantage of directory traversal exploits in IIS?
Question 3 options:
 
Msw3prt IPP Vulnerability

 
IIS_Traversal

 
ServerMask

 
IIS Xploit

Save
Previous PageNext Page
The Autorun feature of Removable Disks and CD Drives can be a threat to network Security.  What is the best course of action to remove Autorun for Removable Disks and CD Drives  for in Windows?
Question 5 options:
 
Tape the USB ports

 
Remove the CD-ROM Drive from the System

 
Use Group Policy

 
Provide Users without Administrative Rights

Save
Previous PageNext Page
Which of the following components help defend against session hijacking? (Select all that apply.)
Question 6 options:
 
a) 

per-packet integrity checking

 
b) 

source routing

 
c) 

PPTP

 
d) 

SSL

 
Identify two vulnerabilities of Microsoft’s Internet Information Services (IIS) from the options listed below. (Select two.)
Question 9 options:
 
a) 

mod_rewrite log escape filtering

 
b) 

::$DATA IIS vulnerability

 
c) 

WebDAV/RPC exploits

 
d) 

mod_proxy reverse proxy exposure

Save
Previous PageNext Page
IP spoofing is not difficult and can be used in a variety of attacks. However, the attacker will not see the packets that are returned to the spoofed IP address. In this case, the attacker uses ______________ and then sniffs the traffic as it passes.
Question 11 options:
 
alternate data streams

 
source routing

 
session hijacking

 
a redirect

 
This is an example of a Trojan that can be utilized for Website Defacement?:
Question 14 options:
 
HTTrack

 
WGET

 
Restorator

 
CrimePack

Save
Previous PageNext Page
Which of the following is the best countermeasure against hijacking? (Select all that apply.)
Question 15 options:
 
a) 

Use unpredictable sequence numbers.

 
b) 

Do not use the TCP protocol.

 
c) 

Use encryption.

 
d) 

Limit the unique sessions token to each browser’s instance.


(more)
See More
Try a College Course Free

Sophia’s self-paced online courses are a great way to save time and money as you earn credits eligible for transfer to over 2,000 colleges and universities.*

Begin Free Trial
No credit card required

25 Sophia partners guarantee credit transfer.

221 Institutions have accepted or given pre-approval for credit transfer.

* The American Council on Education's College Credit Recommendation Service (ACE Credit®) has evaluated and recommended college credit for 20 of Sophia’s online courses. More than 2,000 colleges and universities consider ACE CREDIT recommendations in determining the applicability to their course and degree programs.

Tutorial