Chapter 8 Flashcards

1
Q

Which of the following is considered to be the most critical SQL vulnerability?

A

null SA password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which standardized remote file system protocol replaced SMB in Windows 2000 Server and later?

A

Common Internet File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following programs includes several buffer overflow exploit plug-ins?

A

Metasploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users?

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password to access a specific resource?

A

User-level security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In Windows Server 2016, the administrator must enable IIS manually to use it. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a well-known SMB hacking tool? (Choose all that apply.)

A

SMBRelay

L0phtcrack’s SMB Packet Capture utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An interprocess communication mechanism that allows a program running on one host to run code on a remote host is known as which of the following?

A

remote procedure call (RPC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NetBios is not available in Windows Vista, Server 2008, and later versions of Windows. However, NetBios should be understood by a security professional because it is used for which of the following?

A

backward compatibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the most efficient way to determine which OS a company is using?

A

Call the company and ask.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SMB is used to share files and usually runs on top of NetBIOS, NetBEUI, or which of the following?

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the current file system that Windows utilizes that has strong security features?

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MBSA performs which of the following security checks? (Choose all that apply.)

A

Security update checks

IIS checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NetBIOS over TCP/IP is called which of the following in Windows Server 2003?

A

NetBT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Windows 10, Windows 8, Windows Server 2016, and Windows Server 2012 have most services and features enabled by default.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following are more difficult to detect today because programmers develop them to make legitimate calls on outbound ports that an IDS or firewall wouldn’t detect?

A

Trojan programs

17
Q

Which of the following commands would you enter from the directory you want to analyze to display any alternate data streams?

18
Q

Which program can detect rootkits on *nix systems?

A

chkrootkit

19
Q

A good password policy should include which of the following? (Choose all that apply.)

A

Mandates password complexity

Specifies a minimum password length

20
Q

Ubuntu and Debian Linux use what command to update and manage their RPM packages?

21
Q

Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users?

A

Mandatory Access Control

22
Q

Which of the following is an interprocess communication mechanism that allows a program running on one host to run code on a remote host?

23
Q

SMB2 was released with which version of Windows?

A

Windows Vista

24
Q

Which organization offers free benchmark tools for Windows and Linux?

A

Center for Internet Security

25
Which of the following is a Window's client/server technology designed to manage patching and updating systems software from the network?
WSUS
26
When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?
Share-level security
27
Red Hat and Fedora Linux use what command to update and manage their RPM packages?
yum
28
The MSBA tool can quickly identify missing patches and misconfigurations.
True
29
Which of the following is a common Linux rootkit?
Linux Rootkit 5
30
Which of the following is an open-source implementation of CIFS?
Samba