SmartExpert

(118)

$30/per page/Negotiable

About SmartExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Business & Finance See all
Accounting,Business & Finance,Economics,English,HR Management,Math Hide all
Teaching Since: Apr 2017
Last Sign in: 57 Weeks Ago
Questions Answered: 7570
Tutorials Posted: 7352

Education

  • BS,MBA, PHD
    Adelphi University/Devry
    Apr-2000 - Mar-2005

Experience

  • HOD ,Professor
    Adelphi University
    Sep-2007 - Apr-2017

Category > Business & Finance Posted 21 Jan 2019 My Price 25.00

SEC 435 Quizzes

Week 5 Quiz

 

 

·          

·  Question 1

2 out of 2 points

   
 

What type of authentication uses physical characteristics to verify a user's identity?

     
 
     

·  Question 2

2 out of 2 points

   
 

Which type of authentication is quite common on the Internet and uses an electronic "credit card" that establishes user credentials?

     
 
     

·  Question 3

2 out of 2 points

   
 

Which tool captures the passwords that pass through a network adapter, displays them on the screen instantly, and is used to recover lost Web/FTP/e-mail passwords?

     
 
     

·  Question 4

2 out of 2 points

   
 

Which type of web-based attack uses the GET and POST functions of an HTML form?

     
 
     

·  Question 5

2 out of 2 points

   
 

Which type of authentication uses a one-way cryptographic function that is easily computed in one direction but computationally impossible to reverse?

     
 
     

·  Question 6

2 out of 2 points

   
 

Which of the following is a brute-force password cracker for Web-based e-mail addresses that comes with pseudo-POST support, meaning data is not URL encoded?

     
 
     

·  Question 7

2 out of 2 points

   
 

Which Microsoft-proprietary protocol authenticates users and computers based on an authentication challenge and response?

     
 
     

·  Question 8

2 out of 2 points

   
 

Which tool is an automated vulnerability scanning application that scans for the presence of exploitable files on remote Web servers?

     
 
     

·  Question 9

2 out of 2 points

   
 

Which technology allows programmers to uniformly develop applications to access many types of databases, specifically SQL?

     
 
     

·  Question 10

2 out of 2 points

   
 

Which of the following is a technique to increase web werver security?

     
 
     

·  Question 11

2 out of 2 points

   
 

Which type of attack is usually the result of bad programming practices?

     
 
     

·  Question 12

2 out of 2 points

   
 

Which of the following is a security weakness in a system that may be exploited by an attack?

     
 
     

·  Question 13

2 out of 2 points

   
 

Which set of HTTP extensions allows clients to search the content and properties of files?

     
 
     

·  Question 14

2 out of 2 points

   
 

Which of the following is a technology that allows retrieval of data from a remote database server, alteration of that data in some way, and the return of the altered data for further processing by the remote database server?

     
 
     

·  Question 15

2 out of 2 points

   
 

Which of the following is a technique that takes advantage of nonvalidated input vulnerabilities and allows attackers to inject database query commands through a Web application?

     
 
     

·  Question 16

2 out of 2 points

   
 

Where is the first port of call made once the Oracle database server has been traced?

     
 
     

·  Question 17

2 out of 2 points

   
 

Which of the following is a secure method of posting data to the database.

     
 
     

·  Question 18

2 out of 2 points

   
 

What do the majority of SQL injection attacks use to terminate a string?

     
 
     

·  Question 19

2 out of 2 points

   
 

Which method of hacking an SQL server uses tools such as SQLPing and AppDetective?

     
 
     

·  Question 20

2 out of 2 points

   
 

What type of error are attackers looking for when they fill in the username and password fields with a single quote to test for SQL injection vulnerabilities?

     
 
     

·  Question 21

2 out of 2 points

   
 

In an HTML form, what statement appends data in the URL field but allows attackers to see the parameters in the URL?

     
 
     

·  Question 22

2 out of 2 points

   
 

What can an attacker use to allow packets to slip by devices that only inspect packets rather than the entire session?

     
 
     

·  Question 23

2 out of 2 points

   
 

Which protocol should typically NOT be used to ensure confidentiality of data as it traverses a network?

     
 
     

·  Question 24

2 out of 2 points

   
 

Which attack method involves encoding portions of the attack with Unicode, UTF-8, or URL encoding?

     
 
     

·  Question 25

2 out of 2 points

   
 

Which tool combines Web crawling with the capability of a personal proxy?

     
 
     

·  Question 26

2 out of 2 points

   
 

Which Web application threat uses Web applications to send malicious JavaScript code to end users?

     
 
     

·  Question 27

2 out of 2 points

   
 

Which tool offers protection to the Web environment by blocking HTTP requests that match an attack pattern?

     
 
     

·  Question 28

2 out of 2 points

   
 

Which of the following is NOT one of the three-layered architectures in basic Web applications?

     
 
     

·  Question 29

2 out of 2 points

   
 

Which of the following is a programming language that permits Web site designers to run applications on the user's computer?

     
 
     

·  Question 30

2 out of 2 points

   
 

What should you look for in the Firefox browser in the bottom right corner of the window that indicates the web site is secure?

     
 
     

·  Question 31

2 out of 2 points

   
 

What tool automatically scans a computer, looking for cookies created by Internet Explorer, Mozilla Firefox, and Netscape Navigator, and then displays the data stored in each one?

     
 
     

·  Question 32

2 out of 2 points

   
 

In the Firefox browser, which tool allows cookies to be protected and includes a Remove All button that will delete only unprotected cookies?

     
 
     

·  Question 33

2 out of 2 points

   
 

Which protocol statement in a URL specifies that an email document should be retrieved?

     
 
     

·  Question 34

2 out of 2 points

   
 

In Internet Explorer, what warns the user about potential or known fraudulent Web sites, and blocks the sites if appropriate?

     
 
     

·  Question 35

2 out of 2 points

   
 

In Firefox, what option should you select to ensure that your personal information such as passwords and usernames are deleted?

     
 
     

·  Question 36

2 out of 2 points

   
 

In which form of TCP/IP hijacking can the hacker can reset the victim's connection if it uses an accurate acknowledgment number?

     
 
     

·  Question 37

2 out of 2 points

   
 

At what layer do routers allow the datagram to hop from the source to the destination, one hop at a time?

     
 
     

·  Question 38

2 out of 2 points

   
 

Which of the following is a best practice to try to prevent session hijacking?

     
 
     

·  Question 39

2 out of 2 points

   
 

Which of the following is a process that allows the sender to specify a specific route for an IP packet to take to the destination?

     
 
     

·  Question 40

2 out of 2 points

   
 

Which layer communicates with the physical hardware and is responsible for the delivery of signals from the source to the destination over a physical communication platform?

     
         
           



 

 

Week 8 Quiz

 

·          

·         Question 1

2 out of 2 points

   
 

Which technology provides networking capabilities over existing CAT3 cable and can share the same wire as a standard telephone line?

     
 
     

·         Question 2

2 out of 2 points

   
 

Which Wi-Fi standard uses dual-band technology and support simultaneous connections on both the 2.4 GHz and 5 GHz bands?

     
 
     

·         Question 3

2 out of 2 points

   
 

In which type of network can every computer communicate directly with the other computers on the same network without going through an access point?

     
 
     

·         Question 4

2 out of 2 points

   
 

Which IEEE standard includes 802.1x RSN, and CCMP security features?

     
 
     

·         Question 5

2 out of 2 points

   
 

Which of the following is a names a particular WLAN and must be used by all devices in the same WLAN?

     
 
     

·         Question 6

2 out of 2 points

   
 

In which technique does an attacker acquire a trusted address that allows the attacker to communicate with the access point?

     
 
     

·         Question 7

2 out of 2 points

   
 

Which intrusion detection technique is based on heuristics or behavioral rules derived from a baseline established during normal network operations?

     
 
     

·         Question 8

0 out of 2 points

   
 

Which of the following symptoms is an indication of possible network intrusions?

     
 
     

·         Question 9

2 out of 2 points

   
 

Which intrusion detection technique is also known as misuse detection and is based on creating models of intrusions?

     
 
     

·         Question 10

2 out of 2 points

   
 

What type of attack at the IP layer allows an attacker to attempt arbitrary attacks against hosts on a network, without the IDS ever realizing it?

     
 
     

·         Question 11

2 out of 2 points

   
 

Which of the following monitors key system objects to determine whether an intruder has changed them?

     
 
     

·         Question 12

2 out of 2 points

   
 

Which type of intrusion detection system is platform-centric and is effective at detecting unauthorized file modification?

     
 
     

·         Question 13

2 out of 2 points

   
 

Which device is a computer or virtual appliance purposely set up as a vulnerable system?

     
 
     

·         Question 14

2 out of 2 points

   
 

Which technology uses an individual's unique physical traits to identify a valid user?

     
 
     

·         Question 15

2 out of 2 points

   
 

Which security item is a physical object?

     
 
     

·         Question 16

2 out of 2 points

   
 

What procedure is used to translate information into code for secure transmission?

     
 
     

·         Question 17

2 out of 2 points

   
 

What type of network functions securely by "tunneling" through larger public networks?

     
 
     

·         Question 18

2 out of 2 points

   
 

This officer primarily looks into network security and related issues.

     
 
     

·         Question 19

2 out of 2 points

   
 

What is used to verify a user's identity and security clearance?

     
 
     

·         Question 20

2 out of 2 points

   
 

Which technology deals with information that is unintentionally leaked out of computers through energy emissions?

     
 
     

 

Week 10 Quiz

 

 

 

·          

·         Question 1

4 out of 4 points

   
 

With what type of attack does the attacker simply inject a single or a few bad packets into a router to exploit a network?

     
 
     

·         Question 2

4 out of 4 points

   
 

What can you use to monitor a Simple Mail Transfer Protocol (SMTP) server regularly after connecting to it?

     
 
     

·         Question 3

4 out of 4 points

   
 

What type of attack causes routers to mishandle packets, resulting in traffic congestion?

     
 
     

·         Question 4

4 out of 4 points

   
 

What can you run from a command shell to identify a router?

     
 
     

·         Question 5

4 out of 4 points

   
 

What can you do to access a router to see if its firewall is configured?

     
 
     

·         Question 6

4 out of 4 points

   
 

Which device receives digital signals and converts them into analog signals, and vice versa?

     
 
     

·         Question 7

4 out of 4 points

   
 

Which tool is a parallelized login cracker that supports numerous protocols for attack?

     
 
     

·         Question 8

4 out of 4 points

   
 

Which term can be described as the unauthorized alteration of routing tables?

     
 
     

·         Question 9

4 out of 4 points

   
 

Which tool can perform multiple-thread scanning, application-layer fingerprinting, and host discovery for telnet, SSH, Web, NTP, and SNMP?

     
 
     

·         Question 10

4 out of 4 points

   
 

Which device maintains a table of the available networks to determine the best path to get a packet to its destination?

     
 
     

 

Answers

(118)
Status NEW Posted 21 Jan 2019 10:01 PM My Price 25.00

SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC----------- 43-----------5 Q-----------uiz-----------zes-----------SEC-----------

Not Rated(0)