Module 6 Quiz Flashcards

1
Q

Which Windows 10 feature uses virtualization to protect access tokens from theft by attackers?

A

Credential Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The latest version of Nessus Server and Client can run on Windows, Mac OS X, FreeBSD, and most Linux distributions. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following commands gives you a quick way to see if there are any shared resources on a computer or server?

A

Net View

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The computer names you assign to Windows systems are called which of the following?

A

NetBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the “NBT” part of “NBTscan” stand for?

A

NetBIOS over TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Windows Server 2012 introduced what protection feature to prevent pass-the-hash attacks?

A

Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The open-source descendant of Nessus is called which of the following?

A

OpenVAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is an excellent GUI tool for managing Windows OSs and is capable of displaying graphical representations of several areas?

A

Hyena

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

All of the enumeration techniques that work with older Windows OSs still work with Windows Server 2012. (TRUE or FALSE)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What security feature was extended to the OS to alert the user when an application is launched on a Windows 8.1 computer?

A

LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?

A

enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What enumeration tool is extremely useful when working with Windows NT, 2000, and Windows XP systems?

A

DumpSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used?

A

Footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A NetBIOS name does not need to be unique on a network. (TRUE or FALSE)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NTFS was implemented to replace FAT16 and FAT32 because of the difficulty in incorporating security in these file systems. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What boot loader will allow your computer or laptop to start in both Windows and Linux?

A

GRUB

17
Q

A well documented Window’s OS vulnerability was null sessions. What Windows operating system was the first to disable null sessions by default?

A

Windows Server 2003

18
Q

What boot loader will allow your computer or laptop to start in both Windows and Linux?

A

GRUB

19
Q

SNMPWalk is a tool useful in enumerating hosts running SNMP with what type of configuration?

A

default

20
Q

What type of unauthenticated connection is considered to be a significant vulnerability of NetBIOS systems?

A

null session

21
Q

What type of Windows Server is the most likely server to be targeted by a computer hacker?

A

Domain Controller

22
Q

What feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, preventing rootkits?

A

SecureBoot

23
Q

Which of the following is a Windows programming interface that allows computers to communicate across a local area network (LAN)?

A

NetBIOS

24
Q

Which of the following is a Windows programming interface that allows computers to communicate across a local area network (LAN)?

A

NetBIOS

25
Q

What feature implemented in Windows Server 2016 allows for application isolation to protect applications from one another?

A

Windows Containers

26
Q

What feature implemented in Windows Server 2016 allows for application isolation to protect applications from one another?

A

Windows Containers

27
Q

Which of the following commands is a powerful enumeration tool included with Windows?

A

Nbtstat

28
Q

What version of Windows Server has completely eliminated the option for telnet server?

A

Windows Server 2016

29
Q

Which of the following is a useful enumeration tool that enables you to find out who is logged into a *nix system with one simple command?

A

Finger Utility

30
Q

If you do not have access to Nessus, what NMap procedure can be used to help you to gain information about remote *nix hosts?

A

Script Scanning

31
Q

Which one of the following is an older network management service that is useful for network administrators that want to view system statistics, version numbers, and other detailed host information remotely?

A

SNMP

32
Q

What upper-level service is required to utilize file and printer sharing in Windows?

A

Server Message Block

33
Q

Which one of the following is an older network management service that is useful for network administrators that want to view system statistics, version numbers, and other detailed host information remotely?

A

SNMP

34
Q

What upper-level service is required to utilize file and printer sharing in Windows?

A

Server Message Block

35
Q

NBTscan is a utility that can be used for enumerating Windows OSs. (True or False)

A

True