CMIT 321 quiz 2 -  IP Network Browser can determine this on a Cisco

Question # 00791589 Posted By: dr.tony Updated on: 01/28/2021 09:40 AM Due on: 01/28/2021
Subject Education Topic General Education Tutorials:
Question
Dot Image

University of Maryland, University College CMIT 321 quiz 2
CMIT 321 QUIZ 2

Version 2

Question 1 (5 points)
  IP Network Browser can determine this on a Cisco Device (select all that apply):

Question 1 options:
    Passwords
    ARP Tables
    IOS Version
    Cards Installed
Save

Question 2 (5 points)
  

Symmetric Encryption uses the _____________ to encrypt and decrypt.

Question 2 options:
    Same keys
    Two Key Pairs method
    Different keys
    None of the above
Save

Question 3 (5 points)
  

NETBIOS Name Resolution is supported in IPv6:

Question 3 options:
    False
    True
Save

Question 4 (5 points)
  

Sending an email with a link to a malicious website is called _____?

Question 4 options:
    Hacking
    Phishing
    Impersonation
    Enumeration
Save

Question 5 (5 points)
  

The SMTP Protocol provides 3 built in commands. What are they?

Question 5 options:
    EXPN
    FINGER
    RCPT TO
    VRFY
Save

Question 6 (5 points)
  

Attackers attempt to enumerate ______

Question 6 options:
    Domain Name System
    Routing Tables
    Application Banners
    All of the above
    B and C only
Save

Question 7 (5 points)
  

Typically SMB over TCP uses this port for transmission:

Question 7 options:
    161
    137
    139
    445
Save

What are some characteristics that make LM hashes vulnerable to offline attacks? (Select all that apply.)
Question 3 options:
     They are short.
     They are converted to lower case.
     They are converted to upper case.
     If the password is 10 characters long, it is split into a password of six variable characters and another hash of four characters
Save
Previous PageNext Page

In this type of password attack, the attacker has some information about the password. For example, the attacker knows the password contains a two- or three-digit number.
Question 5 options:
     hybrid
     nontechnical
     rule-based
     precomputed hashes
Which of the following Windows Utilities can be utilized to enumerate hosts?
Question 6 options:
     net Use
     net view
     net view
     net stop
______________ has a unique process for discovering and fixing security holes. The entire methodology is controlled through an efficient administrative tool that enables you to compress settings to manipulate a network or conduct a full-hammer assault.
Question 7 options:
     Found Scan
     AppScan
     CyberCop Scanner
     Hackshield
SNMP uses ___________________ to define the information that a managed system offers.
Question 8 options:
     a)     Management Information Bases (MIBs)

     b)     Simple Network Management Protocol

     c)     SNMPUTIL

     d)     object identifiers

Which of the following Management Information Base (MIB) files contains information about server services :
Question 9 options:
     DCHP.MIB
     HOSTMIB.MIB
     WINS.MIB
     LNMIB2.MIB
What hidden share can be tested for evidence of null-session vulnerabilities?
Question 10 options:
     ADMIN$
     NULL$
     C$
     IPC$
Network Time Protocol (NTP) enumeration commands include (Choose 3)?
Question 11 options:
     Net time
     ntpdate
     ntptrace
     ntpq
Which one of the following makes the SNMP protocol a target used by hackers to gather useful information about target hosts?
Question 12 options:
     It uses the UDP protocol.
     It transmits its community string in clear text.
     It comes configured by default on all devices.
     It cannot be disabled.
The SMTP Protocol provides 3 built in commands, including:
Question 13 options:
     VRFY
     EXPN
     RCPT TO
     FINGER
Save
Previous PageNext Page
The SMTP Protocol provides 3 built in commands, including:
Question 13 options:
     VRFY
     EXPN
     RCPT TO
     FINGER
Save
Previous PageNext Page


This tool uses the command line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).
Question 20 options:
     DumpSec
     Net View
     Nbtstat
     enum
Save
Previous PageNext Page

________________ has a unique process for discovering and fixing security holes. The entire methodology is controlled through an efficient administrative tool that enables you to compress settings to manipulate a network or conduct a full-hammer assault.
Question 7 options:
     Found Scan
     AppScan
     CyberCop Scanner
     HackshieldSNMP uses ___________________ to define the information that a managed system offers.
Question 8 options:
SNMP uses ___________________ to define the information that a managed system offers.
Question 8 options:
     a)     Management Information Bases (MIBs)

     b)     Simple Network Management Protocol

     c)     SNMPUTIL

     d)     object identifiers

Save
Previous PageNext Page

Which of the following Management Information Base (MIB) files contains information about server services :
Question 9 options:
     DCHP.MIB
     HOSTMIB.MIB
     WINS.MIB
     LNMIB2.MIB
What hidden share can be tested for evidence of null-session vulnerabilities?
Question 10 options:
     ADMIN$
     NULL$
     C$
     IPC$
Network Time Protocol (NTP) enumeration commands include (Choose 3)?
Question 11 options:
     Net time
     ntpdate
     ntptrace
     ntpq

Which one of the following makes the SNMP protocol a target used by hackers to gather useful information about target hosts?
Question 12 options:
     It uses the UDP protocol.
     It transmits its community string in clear text.
     It comes configured by default on all devices.
     It cannot be disabled.

 

Dot Image
Tutorials for this Question
  1. Tutorial # 00790925 Posted By: dr.tony Posted on: 01/28/2021 09:41 AM
    Puchased By: 2
    Tutorial Preview
    The solution of CMIT 321 quiz 2 -  IP Network Browser can determine this on a Cisco...
    Attachments
    CMIT_321_quiz_2_-_ IP_Network_Browser_can_determine_this_on_a_Cisco.ZIP (18.96 KB)

Great! We have found the solution of this question!

Whatsapp Lisa