Issc362 week 5 quiz | Computer Science homework help

 

 

ISSC362 Week 5 Quiz

 

Question 1 of 20

 

5.0 Points

 

Which of the following tools allows database password cracking, ARP poisoning, enumeration, and sniffing?

 

A.Wireshark B.Nemesis C.Etherape D.Cain

 

 

 

 

Question 2 of 20

 

Which sniffer tool is designed to intercept and reveal passwords?

 

A.Windump B.Dsniff C.Wireshark D.All of the above

 

 

 

 

Question 3 of 20

 

Which of the following is a tool used for sniffing?

 

A.Hunt B.Tcpdump C.Nemesis D.SMAC

 

 

 

 

Question 4 of 20

 

Sniffing can be used to ___________.

 

A.troubleshoot connections B.investigate malware C.detect abnormal behavior D.All of the above

 

 

 

 

Question 5 of 20

 

5.0 Points

 

Which of the following attacks generally involves one computer targeting another, seeking to shut it down and deny legitimate use of its services?

 

A.Passive session hijacking B.Active session hijacking C.Denial of Service D.Covert channel

 

 

 

 

Question 6 of 20

 

5.0 Points

 

Which of the following attacks sends out bogus requests to any requesting device and the switch?

 

 

 

A.Spoofing B.Flooding C.Poisoning D.Hijacking

 

 

 

 

Question 7 of 20

 

Which of the following protocols is not easily sniffed?

 

A.SMTP B.HTTP C.SSH D.Telnet

 

 

 

 

Question 8 of 20

 

5.0 Points

 

Which of the following is an attack that actively injects packets into the network with the goal of disrupting and taking over an existing session on the network?

 

A.Sniffing B.Hijacking C.Denial of service D.Covert channel

 

 

 

 

Question 9 of 20

 

5.0 Points

 

Which of the following takes place on networks such as those that have a hub as the connectivity device?

 

 

 

A.Passive sniffing B.Promiscuous sniffing C.Active sniffing D.Switched sniffing

 

 

 

 

Question 10 of 20

 

5.0 Points

 

Which attack sends packets to a victim system with the same source and destination address and port, resulting in a system crash?

 

A.Fraggle B.Smurf C.Land D.Teardrop

 

 

 

 

Question 11 of 20

 

Who originally designed and created Linux?

 

A.Bill Gates B.Linus Torvalds

 

C.Steve Jobs D.Joseph Linux

 

 

 

 

Question 12 of 20

 

Which of the following is an application-level scanner?

 

A.Flawfinder B.SARA C.VLAD D.Nikto Simple

 

 

 

 

Question 13 of 20

 

5.0 Points

 

Which of the following is an early Linux firewall technology that controls traffic by checking packets?

 

 

 

A.ipchains B.iptables C.ipconfig D.ip host

 

 

 

 

Question 14 of 20

 

5.0 Points

 

In order to view the permissions assigned to each type of user for all the files located in a directory, which of the following Linux commands is issued?

A.dir/p B.ls -l C.cp -v D.rm -al

 

 

 

 

Question 15 of 20

 

5.0 Points

 

Which of the following Linux directories is considered to be similar to the Windows folder in the Microsoft operating system?

 

A./dev B./etc C./bin D./var

 

 

 

 

Question 16 of 20

 

5.0 Points

 

Which of the following Linux directories is the location of files that dictates access between hardware and the operating system?

 

A./dev B./etc C./bin D./var

 

 

 

 

Question 17 of 20

 

5.0 Points

 

Most versions of Linux make their source code available through which of the following methods?

 

A.General Public License (GPL)B.Business Software Alliance (BSA) agreement C.K Desktop Environment (KDE)D.UNIX

 

 

 

 

Question 18 of 20

 

The core component of every operating system is which of the following?

 

A.Kernel B.ShellC.User interface D.BIOS

 

 

 

 

Question 19 of 20

 

In Linux, which of the following correctly denotes a hard drive in a machine?

 

A.mount_hda1 B.c:/drive1/ C./dev/hda1/ D./mnt/drive1/

 

 

 

Question 20 of 20

 

Approximately how many distributions of Linux are available in different forms and formats?

 

A.100 B.200 C.1,000 D.2,000

 

 

 

 

 

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more