Incident Threats Week 3

.docx

School

Grand Rapids Community College *

*We aren’t endorsed by this school

Course

CYBER SECU

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

4

Uploaded by ConstableWildcatMaster401

Report
Congratulations! You passed! Grade received 100% Latest Submission Grade 100% To pass 80% or higher Go to next item 1. Question 1 Which of these is identified by a basic port scanner? 1 / 1 point MAC addresses IP addressess OSI Layer 1 data Open ports Correct Correct! 2. Question 2 Port numbers 0 through 1023 are known as what? 1 / 1 point Registered Ports Dynamic and Private Ports Virtual Ports Well known ports Correct Correct! 3. Question 3 If a port is blocked, what response will be sent to the port scanner? 1 / 1 point There will be no response A "this port is blocked" message will be sent A challenge message will be sent requestion appropriate authorization codes A reply will be sent containing the next higher port number that is open. Correct Correct! 4. Question 4 Which type of scan notes the connection but leaves the target hanging, i.e. does not reveal any information to the target about the host that initiated the scan? 1 / 1 point Ping (ICMP Echo Request) Stealth scan UDP port scan TCP/Half Open Scan (aka a SYN scan) TCP Connect Correct Correct! 5. Question 5 Which two (2) of these are other names for a protocol analyzer? (Select 2) 1 / 1 point
Domain analyzer Sniffer Correct Partially correct! Gateway analyzer Traffic analyzer Correct Partially correct! 6. Question 6 True or False. Packet sniffers are used by hackers but have no legitimate place in legitimate network management. 1 / 1 point True False Correct Correct! 7. Question 7 Which component of a vulnerability scanner provides high-level graphs and trend reports for executive leadership? 1 / 1 point Database Engine Scanner User Interface Report Module Correct Correct! 8. Question 8 How does a vulnerability scanner detect external threats? 1 / 1 point By scanning commonly access external hosts from within the network By reviewing incident data retrieved from a SIEM system By scanning hosts By scanning internet facing hosts from the Internet Correct Correct! 9. Question 9 What are the three (3) components that make up the overall Common Vulnerability Score (CVSS)? (Select 3) 1 / 1 point Environmental Correct Partially correct! Temporal Correct Partially correct! Internal External Base
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help