CMIT 321 Final Exam
Latest uploads at CMIT 321 Final Exam. Looking for notes at CMIT 321 Final Exam? We have lots of notes, study guides and study notes available for your school.
-
3
- 0
- 0
All courses for CMIT 321 Final Exam
-
CMIT 321 Final Exam CMIT 321 Final Ex 3
Latest notes & summaries CMIT 321 Final Exam
Final Exam 
Question 1 1 / 1 point 
__________ is a worm for Windows XP that downloads and executes malicious files on the 
compromised computer and spreads through removable storage devices. 
a. HTTP W32.Drom 
b. W32/VBAut-B 
c. W32/QQRob-ADN 
d. W32/SillyFDC-BK 
View Feedback 
Question 2 1 / 1 point 
__________ monitors and audits databases for security issues in real time. 
a. Selective Audit 
b. AppDetective 
c. AppRadar 
d. FlexTracer 
View Feedback 
Question 3 1 / 1 pointWhich of the follo...
- Exam (elaborations)
- • 64 pages's •
-
CMIT 321 Final Exam•CMIT 321 Final Exam
Preview 4 out of 64 pages
Final Exam 
Question 1 1 / 1 point 
__________ is a worm for Windows XP that downloads and executes malicious files on the 
compromised computer and spreads through removable storage devices. 
a. HTTP W32.Drom 
b. W32/VBAut-B 
c. W32/QQRob-ADN 
d. W32/SillyFDC-BK 
View Feedback 
Question 2 1 / 1 point 
__________ monitors and audits databases for security issues in real time. 
a. Selective Audit 
b. AppDetective 
c. AppRadar 
d. FlexTracer 
View Feedback 
Question 3 1 / 1 pointWhich of the follo...
Question 1 1 / 1 point
__________ is the exploitation of an organization’s telephone, dial, and private branch exchange (PBX) system to infiltrate the internal network in order to abuse computing resources.
 War driving
 Line dialing
 PBX driving
 War dialing
View Feedback
Question 2 1 / 1 point
__________ cryptography is the most common method on the Internet for authenticating a message sender or encrypting a message.
 Symmetric
 Hash-based
 ...
- Exam (elaborations)
- • 46 pages's •
-
CMIT 321 Final Exam•CMIT 321 Final Exam
Preview 1 out of 46 pages
Question 1 1 / 1 point
__________ is the exploitation of an organization’s telephone, dial, and private branch exchange (PBX) system to infiltrate the internal network in order to abuse computing resources.
 War driving
 Line dialing
 PBX driving
 War dialing
View Feedback
Question 2 1 / 1 point
__________ cryptography is the most common method on the Internet for authenticating a message sender or encrypting a message.
 Symmetric
 Hash-based
 ...
Question 1 1 / 1 point
__________ is the exploitation of an organization’s telephone, dial, and private branch exchange (PBX) system to infiltrate the internal network in order to abuse computing resources.
 War driving
 Line dialing
 PBX driving
 War dialing
View Feedback
Question 2 1 / 1 point
__________ cryptography is the most common method on the Internet for authenticating a message sender or encrypting a message.
 Symmetric
 Hash-based
 ...
- Exam (elaborations)
- • 32 pages's •
-
CMIT 321 Final Exam•CMIT 321 Final Exam
Preview 2 out of 32 pages
Question 1 1 / 1 point
__________ is the exploitation of an organization’s telephone, dial, and private branch exchange (PBX) system to infiltrate the internal network in order to abuse computing resources.
 War driving
 Line dialing
 PBX driving
 War dialing
View Feedback
Question 2 1 / 1 point
__________ cryptography is the most common method on the Internet for authenticating a message sender or encrypting a message.
 Symmetric
 Hash-based
 ...