Chapter 8 Flashcards
Which of the following is considered to be the most critical SQL vulnerability?
null SA password
Which standardized remote file system protocol replaced SMB in Windows 2000 Server and later?
Common Internet File System
Which of the following programs includes several buffer overflow exploit plug-ins?
Metasploit
Which of the following is an OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users?
Mandatory Access Control
When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password to access a specific resource?
User-level security
In Windows Server 2016, the administrator must enable IIS manually to use it. True or False?
True
Which of the following is a well-known SMB hacking tool? (Choose all that apply.)
SMBRelay
L0phtcrack’s SMB Packet Capture utility
An interprocess communication mechanism that allows a program running on one host to run code on a remote host is known as which of the following?
remote procedure call (RPC)
NetBios is not available in Windows Vista, Server 2008, and later versions of Windows. However, NetBios should be understood by a security professional because it is used for which of the following?
backward compatibility
Which of the following is the most efficient way to determine which OS a company is using?
Call the company and ask.
SMB is used to share files and usually runs on top of NetBIOS, NetBEUI, or which of the following?
TCP/IP
What is the current file system that Windows utilizes that has strong security features?
NTFS
MBSA performs which of the following security checks? (Choose all that apply.)
Security update checks
IIS checks
NetBIOS over TCP/IP is called which of the following in Windows Server 2003?
NetBT
Windows 10, Windows 8, Windows Server 2016, and Windows Server 2012 have most services and features enabled by default.
False