Module 6 Quiz Flashcards
Which Windows 10 feature uses virtualization to protect access tokens from theft by attackers?
Credential Guard
The latest version of Nessus Server and Client can run on Windows, Mac OS X, FreeBSD, and most Linux distributions. (True or False)
True
Which of the following commands gives you a quick way to see if there are any shared resources on a computer or server?
Net View
The computer names you assign to Windows systems are called which of the following?
NetBIOS
What does the “NBT” part of “NBTscan” stand for?
NetBIOS over TCP/IP
Windows Server 2012 introduced what protection feature to prevent pass-the-hash attacks?
Attack Surface
The open-source descendant of Nessus is called which of the following?
OpenVAS
Which of the following is an excellent GUI tool for managing Windows OSs and is capable of displaying graphical representations of several areas?
Hyena
All of the enumeration techniques that work with older Windows OSs still work with Windows Server 2012. (TRUE or FALSE)
False
What security feature was extended to the OS to alert the user when an application is launched on a Windows 8.1 computer?
LDAP
What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?
enumeration
What enumeration tool is extremely useful when working with Windows NT, 2000, and Windows XP systems?
DumpSec
To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used?
Footprinting
A NetBIOS name does not need to be unique on a network. (TRUE or FALSE)
False
NTFS was implemented to replace FAT16 and FAT32 because of the difficulty in incorporating security in these file systems. (True or False)
True