8-3 Flashcards

1
Q

a branch contains all of your file association types, OLE information, and shrotcut data

A

HKEY_CLASSES_ROOT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

THis branch links to the section of HKEY_USERS appropriate for user currently logged on to the PC

A

HKEY_CURRENT_USER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This branch contains computer-specific information about the types of hardware, software, and other individual preferences on a given PC

A

HKEY_LOCAL_MACHINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

this branch contains individual preferences for each user of the computer

A

HKEY_USERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardwareconfig.

A

HKEY_CURRENT_CONFIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

reistry settings can change in different versions of ______

A

windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a significant weakness that can be exploited through the various shares that are on the computer. A _________ is way of designating anonymous connections

A

null sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

modify null sessionaccess to shares on the computer by adding _____________a registry value that toggles null session shares on or off to determine whether the server service restricts access to clients logged on to the system account without username or password authentication

A

RestrictNullSessAccess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

restricting such ___________ access helps prevent unauthorized access over the netowrk

A

null session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the anonymous access registry setting allows anonymous users to list domain user names and ____________names. this should be turned off.

A

enumerate share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a number of registry settings affect how the TCP/IP stack handles incoming packets. setting these properly can help reduce your vulnerability toDOS attacks. this process is known as _____________

A

stack tweaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

remote access to the registry is also another potential for hackers. Windows ___ registry enable remote access by default , but only admin should have remote access to registry.

A

XP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a program that runs without direct intervention by the computer user

A

service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

in a unix/linux enviurment a service is called a _____________

A

daemon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

any running service is a potential starting point for a ________

A

hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly