SlideShare a Scribd company logo
Buy here:
http://theperfecthomework.com/cmit-321-quiz-3/
Question 1​ (5 points)
By default, where are the IIS logs recorded?
Question 1 options:
Inetpub/logs
%systemroot%logfiles
%systemroot%system32logfiles
Inetpubwwwlogs
Save
Question 2​ (5 points)
Which steps should be taken to increase web server security? (Select all that apply.)
Question 2 options:
Remove unused application mappings.
Enable remote administration.
Apply service packs and hotfixes.
Check for malicious input in forms and query strings.
Save
Question 3​ (5 points)
IP spoofing is not difficult and can be used in a variety of attacks. However, the attacker will
not see the packets that are returned to the spoofed IP address. In this case, the attacker
uses ______________ and then sniffs the traffic as it passes.
Question 3 options:
alternate data streams
source routing
session hijacking
a redirect
Save
Question 4​ (5 points)
Which of the following is the best countermeasure against hijacking? (Select all that apply.)
Question 4 options:
Use unpredictable sequence numbers.
Do not use the TCP protocol.
Use encryption.
Limit the unique sessions token to each browser’s instance.
Save
Question 5​ (5 points)
This IIS 7 component allows clients to publish, locks and manages resources on the web,
and should be disabled on a dedicated server.
Question 5 options:
WebDAV Publishing
Remote Administration
Active Server pages
Internet Data Connector
Save
Question 6​ (5 points)
Which of the following components help defend against session hijacking? (Select all that
apply.)
Question 6 options:
per-packet integrity checking
source routing
PPTP
SSL
Save
Question 7​ (5 points)
_____________ is the US government's repository of standards-based
vulnerability-management data that includes databases of security checklists,
security-related software flaws, misconfigurations, product names, and impact metrics.
Question 7 options:
National Vulnerability Database (NVD)
US Cyber Security Database
National SQL Database
US Vulnerability Database
Save
Question 8​ (5 points)
Which type of attack allows an attacker to change the DNS table of a server so that requests
for sites redirect to an IP address of the attacker's choosing?
Question 8 options:
cache redirect
buffer overflow
cache poisoning
Unicode directory traversal vulnerability
Save
Question 9​ (5 points)
An attacker sends packets to a target host using a spoofed IP address of a trusted host on a
different network. What kind of packets will be returned to the attacker?
Question 9 options:
ACK packets
RST packets
ISNs incremented by 1
No packets will be returned to the attacker.
Save
Question 10​ (5 points)
What tool could an attacker use to capture sequence and acknowledgment numbers from a
victim in order to track a network session?
Question 10 options:
Traceroute
Netstat
Network Sniffer
Nslookup
Save
Question 11​ (5 points)
Once an initial sequence number (ISN) has been agreed to, all the packets that follow will be
the ____________. This makes it possible to inject data into a communication stream.
Question 11 options:
ISN-1
ISN-2
ISN+1
ISN+2
Save
Question 12​ (5 points)
Which of the following tools automates and takes advantage of directory traversal exploits in
IIS?
Question 12 options:
Msw3prt IPP Vulnerability
IIS_Traversal
ServerMask
IIS Xploit
Save
Question 13​ (5 points)
The Privileged Command Execution Vulnerability is executed with _______________
permissions and allows an attacker to execute arbitrary code in a section of memory not
reserved for the particular application.
Question 13 options:
root
administrator
SYSTEM
guest
Save
Question 14​ (5 points)
At what layer of the TCP stack does the three-way handshake occur?
Question 14 options:
transport
network
application
data link
Save
Question 15​ (5 points)
An attacker successfully performs a Unicode directory traversal attack against a default IIS
installation running on a Windows 2000 server. What are the attacker’s current privileges?
Question 15 options:
IUSR_COMPUTERNAME
administrator
root
SYSTEM
Save
Question 16​ (5 points)
Which tool helps hackers hide their activities by removing IIS log entries based on the
attacker’s IP address?
Question 16 options:
ServerMask
Log Analyzer
IISLogCleaner
CleanIISLog
Save
Question 17​ (5 points)
This type of attack is usually the result of faulty programming practices. It allows an attacker
to place data into a buffer that is larger than the allocated size, resulting in an overflow,
overwriting, and corruption of adjacent data spaces.
Question 17 options:
Unicode directory traversal vulnerability
denial of service
ping of death
buffer overflow
Save
Question 18​ (5 points)
In _____________ hijacking, the attacker uses a packet-sniffer to capture the session IDs to
gain control of an existing session or to create a new unauthorized session.
Question 18 options:
UDP
blind
Internet-level
application-level
Save
Question 19​ (5 points)
The act of predicting TCP sequence numbers is called ______________________.
Question 19 options:
a brute-force attack
blind hijacking
application hijacking
spoofing
Save
Question 20​ (5 points)
At what layer of the TCP stack does web browsing take place?
Question 20 options:
network
application
Internet
data link

More Related Content

DOCX
Network security interview questions & answers
PPT
Op Sy 03 Ch 61
PPT
Chapter 09
PDF
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
PDF
Accurately detecting source code of attacks that increase privilege
DOCX
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
PPTX
Hunting rootkit from dark corners of memory
Network security interview questions & answers
Op Sy 03 Ch 61
Chapter 09
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
Accurately detecting source code of attacks that increase privilege
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Hunting rootkit from dark corners of memory

What's hot (18)

PPTX
Dll preloading-attack
PPTX
Basic malware analysis
PPT
Digital Immunity -The Myths and Reality
PPTX
Buffer overflow attacks
PPTX
Return Address – The Silver Bullet
PDF
Automated defense from rootkit attacks
PPTX
Exploitation techniques and fuzzing
PPT
Cloud Security Summit (Boston) - Live Hack Demo
PDF
Pentesting with Metasploit
PPT
Lecture 3
PPTX
System hacking
 
PDF
CMIT 321 QUIZ 1
PDF
Intro2 malwareanalysisshort
PPTX
Reverse engineering malware
PDF
SANS Digital Forensics and Incident Response Poster 2012
PDF
Michelle K Webster: Malware - Cryptolocker Research Final
PPT
Freeware Security Tools You Need
PPTX
Hunting gh0st rat using memory forensics
Dll preloading-attack
Basic malware analysis
Digital Immunity -The Myths and Reality
Buffer overflow attacks
Return Address – The Silver Bullet
Automated defense from rootkit attacks
Exploitation techniques and fuzzing
Cloud Security Summit (Boston) - Live Hack Demo
Pentesting with Metasploit
Lecture 3
System hacking
 
CMIT 321 QUIZ 1
Intro2 malwareanalysisshort
Reverse engineering malware
SANS Digital Forensics and Incident Response Poster 2012
Michelle K Webster: Malware - Cryptolocker Research Final
Freeware Security Tools You Need
Hunting gh0st rat using memory forensics
Ad

Similar to CMIT 321 QUIZ 3 (20)

PDF
CMIT 321 WEEK 2 QUIZ
PDF
CMIT 321 QUIZ 4
PDF
CMIT 321 WEEK 2 QUIZ.
DOCX
CIS 312 Success Begins / snaptutorial.com
DOCX
CEH v9 cheat sheet notes Certified Ethical Hacker
PDF
Report PAPID 7
PDF
Отчет Audit report RAPID7
PPTX
G3t R00t at IUT
PPT
lec4.ppt system calls explained in detail
PPTX
Novetta Cyber Analytics
PPT
3.Network
PDF
Cis 329 wk 6 quiz 2
PPTX
Leverage the Network to Detect and Manage Threats
PPT
Detecting and Preventing Memory Attacks#
PPTX
How a Windows Password Filters Works
PPT
The Top 10/20 Internet Security Vulnerabilities – A Primer
PDF
Question 1 (1 point)SavedWhich of the following is used to ass.pdf
PDF
PyConline AU 2021 - Things might go wrong in a data-intensive application
PPT
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
CMIT 321 WEEK 2 QUIZ
CMIT 321 QUIZ 4
CMIT 321 WEEK 2 QUIZ.
CIS 312 Success Begins / snaptutorial.com
CEH v9 cheat sheet notes Certified Ethical Hacker
Report PAPID 7
Отчет Audit report RAPID7
G3t R00t at IUT
lec4.ppt system calls explained in detail
Novetta Cyber Analytics
3.Network
Cis 329 wk 6 quiz 2
Leverage the Network to Detect and Manage Threats
Detecting and Preventing Memory Attacks#
How a Windows Password Filters Works
The Top 10/20 Internet Security Vulnerabilities – A Primer
Question 1 (1 point)SavedWhich of the following is used to ass.pdf
PyConline AU 2021 - Things might go wrong in a data-intensive application
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Ad

More from HamesKellor (20)

PDF
CMST 290 FINAL EXAM
PDF
CMST 301 PROJECT 1 CASE STUDY
PDF
CMSC 350 PROJECT 3
PDF
CMSC 350 PROJECT 4
PDF
CMSC 350 PROJECT 4
PDF
CMSC 350 PROJECT 1
PDF
CMSC 350 FINAL PROJECT
PDF
CMSC 350 HOMEWORK 2
PDF
CMSC 350 HOMEWORK 3
PDF
CMSC 350 HOMEWORK 1
PDF
CMSC 335 HOMEWORK 3
PDF
CMSC 330 PROJECT 1
PDF
CMSC 335 FINAL PROJECT
PDF
CMSC 330 QUIZ 4
PDF
CMIT 425 RISK ASSESSMENT PAPER
PDF
CMIT 391 LINUX IMPLEMENTATION PROPOSAL
PDF
CMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSAL
PDF
CMIT 370 FINAL EXAM
PDF
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
PDF
CMIT 321 QUIZ 7
CMST 290 FINAL EXAM
CMST 301 PROJECT 1 CASE STUDY
CMSC 350 PROJECT 3
CMSC 350 PROJECT 4
CMSC 350 PROJECT 4
CMSC 350 PROJECT 1
CMSC 350 FINAL PROJECT
CMSC 350 HOMEWORK 2
CMSC 350 HOMEWORK 3
CMSC 350 HOMEWORK 1
CMSC 335 HOMEWORK 3
CMSC 330 PROJECT 1
CMSC 335 FINAL PROJECT
CMSC 330 QUIZ 4
CMIT 425 RISK ASSESSMENT PAPER
CMIT 391 LINUX IMPLEMENTATION PROPOSAL
CMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSAL
CMIT 370 FINAL EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 321 QUIZ 7

Recently uploaded (20)

PDF
Unit 1 Cost Accounting - Cost sheet
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
Types of control:Qualitative vs Quantitative
PDF
Training And Development of Employee .pdf
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PDF
IFRS Notes in your pocket for study all the time
DOCX
Euro SEO Services 1st 3 General Updates.docx
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PPTX
HR Introduction Slide (1).pptx on hr intro
PPTX
5 Stages of group development guide.pptx
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
MSPs in 10 Words - Created by US MSP Network
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
Unit 1 Cost Accounting - Cost sheet
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Types of control:Qualitative vs Quantitative
Training And Development of Employee .pdf
340036916-American-Literature-Literary-Period-Overview.ppt
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
IFRS Notes in your pocket for study all the time
Euro SEO Services 1st 3 General Updates.docx
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
HR Introduction Slide (1).pptx on hr intro
5 Stages of group development guide.pptx
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
MSPs in 10 Words - Created by US MSP Network
Nidhal Samdaie CV - International Business Consultant
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf

CMIT 321 QUIZ 3

  • 1. Buy here: http://theperfecthomework.com/cmit-321-quiz-3/ Question 1​ (5 points) By default, where are the IIS logs recorded? Question 1 options: Inetpub/logs %systemroot%logfiles %systemroot%system32logfiles Inetpubwwwlogs Save Question 2​ (5 points) Which steps should be taken to increase web server security? (Select all that apply.) Question 2 options: Remove unused application mappings. Enable remote administration.
  • 2. Apply service packs and hotfixes. Check for malicious input in forms and query strings. Save Question 3​ (5 points) IP spoofing is not difficult and can be used in a variety of attacks. However, the attacker will not see the packets that are returned to the spoofed IP address. In this case, the attacker uses ______________ and then sniffs the traffic as it passes. Question 3 options: alternate data streams source routing session hijacking a redirect Save Question 4​ (5 points) Which of the following is the best countermeasure against hijacking? (Select all that apply.) Question 4 options:
  • 3. Use unpredictable sequence numbers. Do not use the TCP protocol. Use encryption. Limit the unique sessions token to each browser’s instance. Save Question 5​ (5 points) This IIS 7 component allows clients to publish, locks and manages resources on the web, and should be disabled on a dedicated server. Question 5 options: WebDAV Publishing Remote Administration Active Server pages Internet Data Connector Save Question 6​ (5 points)
  • 4. Which of the following components help defend against session hijacking? (Select all that apply.) Question 6 options: per-packet integrity checking source routing PPTP SSL Save Question 7​ (5 points) _____________ is the US government's repository of standards-based vulnerability-management data that includes databases of security checklists, security-related software flaws, misconfigurations, product names, and impact metrics. Question 7 options: National Vulnerability Database (NVD) US Cyber Security Database National SQL Database US Vulnerability Database
  • 5. Save Question 8​ (5 points) Which type of attack allows an attacker to change the DNS table of a server so that requests for sites redirect to an IP address of the attacker's choosing? Question 8 options: cache redirect buffer overflow cache poisoning Unicode directory traversal vulnerability Save Question 9​ (5 points) An attacker sends packets to a target host using a spoofed IP address of a trusted host on a different network. What kind of packets will be returned to the attacker? Question 9 options: ACK packets RST packets
  • 6. ISNs incremented by 1 No packets will be returned to the attacker. Save Question 10​ (5 points) What tool could an attacker use to capture sequence and acknowledgment numbers from a victim in order to track a network session? Question 10 options: Traceroute Netstat Network Sniffer Nslookup Save Question 11​ (5 points) Once an initial sequence number (ISN) has been agreed to, all the packets that follow will be the ____________. This makes it possible to inject data into a communication stream. Question 11 options:
  • 7. ISN-1 ISN-2 ISN+1 ISN+2 Save Question 12​ (5 points) Which of the following tools automates and takes advantage of directory traversal exploits in IIS? Question 12 options: Msw3prt IPP Vulnerability IIS_Traversal ServerMask IIS Xploit Save Question 13​ (5 points)
  • 8. The Privileged Command Execution Vulnerability is executed with _______________ permissions and allows an attacker to execute arbitrary code in a section of memory not reserved for the particular application. Question 13 options: root administrator SYSTEM guest Save Question 14​ (5 points) At what layer of the TCP stack does the three-way handshake occur? Question 14 options: transport network application data link Save
  • 9. Question 15​ (5 points) An attacker successfully performs a Unicode directory traversal attack against a default IIS installation running on a Windows 2000 server. What are the attacker’s current privileges? Question 15 options: IUSR_COMPUTERNAME administrator root SYSTEM Save Question 16​ (5 points) Which tool helps hackers hide their activities by removing IIS log entries based on the attacker’s IP address? Question 16 options: ServerMask Log Analyzer IISLogCleaner
  • 10. CleanIISLog Save Question 17​ (5 points) This type of attack is usually the result of faulty programming practices. It allows an attacker to place data into a buffer that is larger than the allocated size, resulting in an overflow, overwriting, and corruption of adjacent data spaces. Question 17 options: Unicode directory traversal vulnerability denial of service ping of death buffer overflow Save Question 18​ (5 points) In _____________ hijacking, the attacker uses a packet-sniffer to capture the session IDs to gain control of an existing session or to create a new unauthorized session. Question 18 options: UDP
  • 11. blind Internet-level application-level Save Question 19​ (5 points) The act of predicting TCP sequence numbers is called ______________________. Question 19 options: a brute-force attack blind hijacking application hijacking spoofing Save Question 20​ (5 points) At what layer of the TCP stack does web browsing take place? Question 20 options: