Computer Science > EXAM > CMIT 321 Final Exam Version 2 2021/2022 | University of Maryland, University College (All)

CMIT 321 Final Exam Version 2 2021/2022 | University of Maryland, University College

Document Content and Description Below

A __________ is a device that receives digital signals and converts them into analog signals, and vice versa. a. firewall b. proxy c. hub d. modem View Feedback n 2 1 / 1 point __________ is a... parallelized login cracker that supports numerous protocols for attack. a. ADMsnmp b. SING c. Hydra d. John the Ripper View Feedback n 3 1 / 1 point An __________ share is a hidden share that allows communication between two processes on the same system. a. SMC b. IPC c. EPC d. SMB View Feedback n 4 1 / 1 point __________ monitors and audits databases for security issues in real time. a. Selective Audit b. AppDetective c. AppRadar d. FlexTracer View Feedbackn 5 1 / 1 point __________ is a command-line utility provided by Microsoft with SQL Server 2000 (and Microsoft SQL Server 2000 Desktop Engine) that allows users to issue queries to the server. a. ODBC b. SQLP c. OSQL d. SSRS View Feedback n 6 1 / 1 point __________ allows applications to read and write various image file formats, including GIF. a. ImageCore b. CoreText c. ImageIO d. CoreImage View Feedback n 7 1 / 1 point Which of the following types of tools would be most effective in cracking UNIX passwords? a. Ophcrack b. KerbCrack c. John the Ripper d. RainbowCrack View Feedback n 8 1 / 1 point A __________ is a device that cannot function in any capacity. a. block b. brick c. rock d. cage View Feedback n 9 1 / 1 point __________ can monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it.a. CheckOK b. SMTPCheck c. SMTPMon d. SLCheck View Feedback n 10 1 / 1 point In a hit-and-run attack, __________. a. the attacker constantly injects bad packets into the router b. the attacker mistreats packets, resulting in traffic congestion c. the attacker injects a few bad packets into the router d. the attacker alters a single packet, resulting in denial of service View Feedback n 11 1 / 1 point __________ is the act of gathering information about the security profile of a computer system or organization, undertaken in a methodological manner. a. Tracerouting b. Passive information gathering c. Footprinting d. Competitive intelligence gathering View Feedback n 12 1 / 1 point __________, formerly called AppTapp, is a tool for jailbreaking and installing nonsanctioned third-party applications on the iPhone. a. iFuntastic b. iNdependence [Show More]

Last updated: 1 year ago

Preview 1 out of 32 pages

Reviews( 0 )

$13.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
50
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 30, 2021

Number of pages

32

Written in

Seller


seller-icon
d.occ

Member since 3 years

228 Documents Sold


Additional information

This document has been written for:

Uploaded

Aug 30, 2021

Downloads

 0

Views

 50

Document Keyword Tags

Recommended For You


$13.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·