8-3 Flashcards
a branch contains all of your file association types, OLE information, and shrotcut data
HKEY_CLASSES_ROOT
THis branch links to the section of HKEY_USERS appropriate for user currently logged on to the PC
HKEY_CURRENT_USER
This branch contains computer-specific information about the types of hardware, software, and other individual preferences on a given PC
HKEY_LOCAL_MACHINE
this branch contains individual preferences for each user of the computer
HKEY_USERS
This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardwareconfig.
HKEY_CURRENT_CONFIG
reistry settings can change in different versions of ______
windows
a significant weakness that can be exploited through the various shares that are on the computer. A _________ is way of designating anonymous connections
null sessions
modify null sessionaccess to shares on the computer by adding _____________a registry value that toggles null session shares on or off to determine whether the server service restricts access to clients logged on to the system account without username or password authentication
RestrictNullSessAccess
restricting such ___________ access helps prevent unauthorized access over the netowrk
null session
the anonymous access registry setting allows anonymous users to list domain user names and ____________names. this should be turned off.
enumerate share
a number of registry settings affect how the TCP/IP stack handles incoming packets. setting these properly can help reduce your vulnerability toDOS attacks. this process is known as _____________
stack tweaking
remote access to the registry is also another potential for hackers. Windows ___ registry enable remote access by default , but only admin should have remote access to registry.
XP
a program that runs without direct intervention by the computer user
service
in a unix/linux enviurment a service is called a _____________
daemon
any running service is a potential starting point for a ________
hacker