Chapter 6 Flashcards

1
Q

Which of the following is a popular network management service for network administrators?

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Windows 10 feature uses virtualization to protect access tokens from theft by attackers?

A

Credential Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network?

A

Net view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an older network management service that is useful for network administrators that want to view system statistics, version numbers, and other detailed host information remotely?

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security testers conduct enumeration for which of the following reasons?

A

Gaining access to shares and network resources

Obtaining user logon names and group memberships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is an excellent GUI tool for managing Windows OSs and is capable of displaying graphical representations of several areas?

A

Hyena

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The latest version of Nessus Server and Client can run on Windows, Mac OS X, FreeBSD, and most Linux distributions.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used?

A

Footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If you do not have access to Nessus, what NMap procedure can be used to help you to gain information about remote *nix hosts?

A

Script Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following testing processes is the most intrusive?

A

Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following tools can be used to enumerate Windows systems?

A

Hyena

OpenVAS or Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Most NetBIOS enumeration tools connect to the target system by using which of the following?

A

Null sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A null session is enabled by default in all the following Windows versions except:

A

Windows Server 2008

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What version of Windows Server has completely eliminated the option for the telnet server?

A

Windows Server 2016

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?

A

Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is the vulnerability scanner from which OpenVAS was developed?

A

Nessus

17
Q

If you don’t have access to Nessus, which of the following can be used by an attacker to gain information about remote *nix Hosts?

A

NMAP

18
Q

What enumeration tool is exteremly useful when working with Windows NT, 2000, and Windows XP systems?

A

DumpSec

19
Q

Which of the following is a useful enumeration tool that enables you to find out who is logged into a *nix system with one simple command?

A

Finger utility

20
Q

Which of the follwoing commands should you use to determine whether there are any shared resources on aWinodws computer with the IP address 193.145.83.202?

A

nbtstat -a 193.145.85.202

21
Q

The computer names you assign to Windows systems are called which of the following?

A

NetBIOS

22
Q

What upper-level service is required to utilize file and printer sharing in Windows?

A

Server Message Block

23
Q

The open-source is descendant of Nessus is called which of the following?

A

OpenVAS

24
Q

A NetBIOS name does not need to be unique on a network.

A

False

25
Q

What does the “NBT” part of “NBTscan” stand for?

A

NetBIOS over TCP/IP

26
Q

What type of Windows Server is the most likely server to be targeted by a computer hacker?

A

Domain Controller

27
Q

What feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, preventing rootkits?

A

SecureBoot

28
Q

Which of the following commands gives you a quick way to see if there are any shared resources on a computer or server?

A

Net view

29
Q

The Windows Net use command is a quick way to discover any shared resources on a computer or server. True of False?

A

False

30
Q

Windows Server 2012 introducted what protection feature to prevent pass-the-hash attacks?

A

Authentication Silos

31
Q

Which of the following is a commonly used UNIX enumeration tool?

A

SNMPWalk

32
Q

To identify the NetBIOS names of systems on the 193.145.85.0 network, which of the following commands do you use?

A

nbtscan 193.145.85.0 /24

33
Q

Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network?

A

Net View

34
Q

Which port numbers indicate NetBIOS is in use on a remote Target?

A

135 to 139

35
Q

Enumeration of Windows systems can be more difficult if which port is filtered?

A

139/TCP

36
Q

A NetBIOS name can contain a maximum of how many characters?

A

15

37
Q

The nbtstat command is used to enumerate *nix systems. True of False?

A

False