Final Flashcards

1
Q

Name 5 types of problems when your Windows software is being attacked

A
Leaks of sensitive info
Password cracks
Systems taken down DDOS
Remote control being obtained
Databases copied or deleted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What types of attacks are there?

A
Password 
DDOS
Port Penetration
SQL Injection
Session Hijacking
Man-in-the-middle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What commands are built into Windows?

A

Nbtstat
Netstat
Net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you hide a shared folder?

A

Append the $ character at the end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPC$

A

Anonymous connection - A well known vulnerability in Windows (null session)

net use \host name or IP address\ipc$ “” “/user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you scan your Windows network shares folder?

A

Softperfect network scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Missing patches are the easiest way to find a vulnerability. Some tools to discover what’s available for exploitation include?

A

Nexpose

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can Win10 enhance that Win7 and Win8 don’t have?

A
Enterprise patch management
Scheduled restarts for Windows patches
Bitlocker
Better malware protection w/built in Windows defender 
User Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When you employ physical security what are you protecting against?

A

Internal malicious user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which Windows vulnerabilities also translate to Linux?

A

Leaks of sensitive info
Cracked passwords
Corrupted or deleted databases
Systems taken offline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you prevent people from scanning your ports?

A

Firewall

Don’t let them gain access via wall jack or Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you prevent people from scanning your network?

A
Secure WiFi with strong password
Firewalls
Intrusion prevention systems 
Disable unneeded services
Software updates are installed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Common security weaknesses include?

A

Anonymous FTP
Telnet and FTP
Old versions of send mail
Rservices such as rlogin, rdist, rexecd, rsh and rcp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can you prevent people from booting into safemode?

A

bcdedit/deletevalue {current} safe boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is FTP and what is Telnet?

A

FTP is one of the most widely used file transfer protocols. Harden it by enabling password compliance policies, require strong encryption ciphers, enforce IP access rules and implement multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name two email attack types and what kind of damage they cause.

A

Email bombs create denial of service conditions and take up large amounts of bandwidth.
Attachments create an attachment overload which sends hundreds of emails to one or more recipients on your network