Final Examination
This timed final exam will consist of 100 multiple-choice questions, and you will have four hours to complete it. Carefully note the information provided in the yellow box below.
An error occurred while attempting to insert your grade into the WebTycho Gradebook. Your instructor has been notified to insert the grade manually. No further action is required on your part.
Your answers to this activity have been submitted to your instructor. You may review your submitted answers at any time through the My Submissions link in the left menu.
1. __________ is a method in which a sniffer is used to track down a conversation between two users. a. A man-in-the-middle (MITM) attack b. Session hijacking c. IP spoofing d. Network tapping
2. __________ reconnaissance is a hacker's attempt to scout for or survey potential targets and then investigate the target using publicly available information. a. Active b. Passive c. Public d. Open
3. __________ is a portable, battery-powered device that mediates interactions between RFID readers and RFID tags. a. RSA blocker tag b. RFID Firewall c. RFID Guardian d. Kill switch
4. __________ is a Microsoft-proprietary protocol that authenticates users and computers based on an authentication challenge and response. a. LMLAN b. Kerberos c. NTLM d. NTLAN
5. __________ is a simple form of attack aimed directly at the application's business logic. a. Authentication hijacking b. Parameter tampering c. Cookie poisoning d. Session poisoning
6. A __________ attack occurs when an attacker sends an oversized ping packet to a victim's device. a. BlueSmacking b. Blueprinting c. BTVoiceBugging d. Bluesnarfing
7. __________ allow attackers to pass malicious code to different systems via a web application. a. SQL injection attacks b. XSS vulnerabilities c. Authentication hijacking attacks d. Command injection flaws
8. In the TCP/IP stack, the