Essay Quiz

 

Quiz Instructions
Learning Objectives Covered
• CO1: Understand Ethics and Legal Issues in IT/IS Security
• CO2: Utilize and interpret Footprinting to enhance IT/IS Security
• CO3: Perform Scanning for IT/IS Security tasks
• CO4: Understand issues related to Enumeration
• CO5: Detect, prevent and mitigate System Hacking
Students will have 240 min (4 hours) to complete 7 essay questions (at least 50 – 100 words per question PLUS resource reference if/when used)

Note: this is a timed quiz. You may check the remaining time you have at any point while taking the quiz by pressing the keyboard combination SHIFT, ALT, and T… Again: SHIFT, ALT, and T…

Flag this Question
Question 1 10 pts
Describe how to use Web tools for footprinting, provide at least 4 examples.
HTML Editor Keyboard Shortcuts
p
0 words

Flag this Question
Question 2 10 pts
Describe how to conduct intelligence based on footprinting.
Give example/explain how to use and interpret “Whois”
HTML Editor Keyboard Shortcuts
p
0 words

Flag this Question
Question 3 10 pts
Describe what you can’t do as an ethical hacker
HTML Editor Keyboard Shortcuts
p
»
span
»
span
»
span
»
span
0 words

Flag this Question
Question 4 10 pts
Describe port scanning and types of port scans.
HTML Editor Keyboard Shortcuts
p
0 words

Flag this Question
Question 5 10 pts
Describe the role of an ethical hacker.
HTML Editor Keyboard Shortcuts
p
0 words

Flag this Question
Question 6 10 pts
Port-scanning tools can be complex, so you need to devote time to learning their strengths and weaknesses and understanding how and when you should use these tools.

Describe port-scanning tools
What are port scanning tools? Describe, at least two out of the list below:
• Nmap
• Unicornscan
• Nessus
• OpenVAS
HTML Editor Keyboard Shortcuts
p
0 words

Flag this Question
Question 7 10 pts
Describe DNS zone transfers and explain their importance in footprinting
HTML Editor Keyboard Shortcuts
p

Sample Solution

ACED ESSAYS