Chapter 8 Flashcards

1
Q

Which of the following is considered to be the most critical SQL vulnerability?

A

null SA password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which standardized remote file system protocol replaced SMB in Windows 2000 Server and later?

A

Common Internet File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following programs includes several buffer overflow exploit plug-ins?

A

Metasploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users?

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password to access a specific resource?

A

User-level security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In Windows Server 2016, the administrator must enable IIS manually to use it. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a well-known SMB hacking tool? (Choose all that apply.)

A

SMBRelay

L0phtcrack’s SMB Packet Capture utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An interprocess communication mechanism that allows a program running on one host to run code on a remote host is known as which of the following?

A

remote procedure call (RPC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NetBios is not available in Windows Vista, Server 2008, and later versions of Windows. However, NetBios should be understood by a security professional because it is used for which of the following?

A

backward compatibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the most efficient way to determine which OS a company is using?

A

Call the company and ask.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SMB is used to share files and usually runs on top of NetBIOS, NetBEUI, or which of the following?

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the current file system that Windows utilizes that has strong security features?

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MBSA performs which of the following security checks? (Choose all that apply.)

A

Security update checks

IIS checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NetBIOS over TCP/IP is called which of the following in Windows Server 2003?

A

NetBT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Windows 10, Windows 8, Windows Server 2016, and Windows Server 2012 have most services and features enabled by default.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following are more difficult to detect today because programmers develop them to make legitimate calls on outbound ports that an IDS or firewall wouldn’t detect?

A

Trojan programs

17
Q

Which of the following commands would you enter from the directory you want to analyze to display any alternate data streams?

A

dir /r

18
Q

Which program can detect rootkits on *nix systems?

A

chkrootkit

19
Q

A good password policy should include which of the following? (Choose all that apply.)

A

Mandates password complexity

Specifies a minimum password length

20
Q

Ubuntu and Debian Linux use what command to update and manage their RPM packages?

A

apt-get

21
Q

Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users?

A

Mandatory Access Control

22
Q

Which of the following is an interprocess communication mechanism that allows a program running on one host to run code on a remote host?

A

RPC

23
Q

SMB2 was released with which version of Windows?

A

Windows Vista

24
Q

Which organization offers free benchmark tools for Windows and Linux?

A

Center for Internet Security

25
Q

Which of the following is a Window’s client/server technology designed to manage patching and updating systems software from the network?

A

WSUS

26
Q

When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?

A

Share-level security

27
Q

Red Hat and Fedora Linux use what command to update and manage their RPM packages?

A

yum

28
Q

The MSBA tool can quickly identify missing patches and misconfigurations.

A

True

29
Q

Which of the following is a common Linux rootkit?

A

Linux Rootkit 5

30
Q

Which of the following is an open-source implementation of CIFS?

A

Samba