quiz 6 Flashcards
_ is a system process that runs on Windows OSs to facilitate the exchange of network data.
NetDDE
What is the Net view command and how can you use it?
The Net view command is a built-in Windows tool that gives you a quick way to see whether there are any shared resources on a computer or server. To see the syntax for this command, type net view ? at the command prompt.
The enumeration process for Windows Me is the same as for Windows 98.
True
NBTscan is a tool for enumerating Windows OSs.
True
__ is an enhancement to NDS (NetWare Directory Services).
eDirectory
One of the biggest vulnerabilities of NetBIOS systems is a(n) ____, which is an unauthenticated connection to a Windows computer using no logon and password values.
null session
__ implemented Windows File Protection to prevent core system files from being overwritten.
Windows XP Professional
Probably the biggest enhancement in Windows 95 was the ____________________, a database that stores information about the system’s hardware and software.
Registry
NetBIOS names have a limit of ____ characters.
16
As a security professional, should you learn about the security issues in the NetWare OS? Why or why not?
Many security professionals assume that knowledge of just one operating system is enough, but focusing on Windows and ignoring *nix systems—or vice versa—can limit your career as a security professional. Similarly, some security professionals see Novell NetWare as a “dead” OS, but many corporations still rely on their faithful NetWare servers that keep plugging away.
LDAP (port ____) is the protocol used to access Novell’s eDirectory, Microsoft Active Directory, and Apple Open Directory.
389
Windows 98 introduced the ____ file system.
FAT32
How does Windows 7 differ from its predecessors?
Windows 7 has an optional Windows XP Mode (XPM) that allows running older applications in a virtual Windows XP environment, because software incompatibility issues have prevented many companies from upgrading from Windows XP. However, XPM requires late-model processors that support virtualization extensions, and upgrading to Windows 7 from XP requires a complete reinstallation. Other improvements include faster startup, better overall performance, and refinements to the UAC feature, the desktop/taskbar user interface, and integration of peripheral devices.
To determine what resources or shares are on a network, security testers must first determine what _________________________ is being used via port scanning and footprinting.
OS
operating system
operating system (OS)
Why do hackers pay attention to NetBIOS computer name suffixes?
The NetBIOS name suffixes correspond to the services, or resource types, running on a computer. You don’t need to memorize all the suffixes, but several are critical because they identify the computer or server being enumerated as a standalone computer or a domain controller. Hackers often exert more effort attacking computers identified as domain controllers because they can offer more information, including logon names for user accounts and network resources.