quiz 6 Flashcards

1
Q

_ is a system process that runs on Windows OSs to facilitate the exchange of network data.

A

NetDDE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Net view command and how can you use it?

A

The Net view command is a built-in Windows tool that gives you a quick way to see whether there are any shared resources on a computer or server. To see the syntax for this command, type net view ? at the command prompt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The enumeration process for Windows Me is the same as for Windows 98.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NBTscan is a tool for enumerating Windows OSs.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__ is an enhancement to NDS (NetWare Directory Services).

A

eDirectory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

One of the biggest vulnerabilities of NetBIOS systems is a(n) ____, which is an unauthenticated connection to a Windows computer using no logon and password values.

A

null session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__ implemented Windows File Protection to prevent core system files from being overwritten.

A

Windows XP Professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Probably the biggest enhancement in Windows 95 was the ____________________, a database that stores information about the system’s hardware and software.

A

Registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NetBIOS names have a limit of ____ characters.

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

As a security professional, should you learn about the security issues in the NetWare OS? Why or why not?

A

Many security professionals assume that knowledge of just one operating system is enough, but focusing on Windows and ignoring *nix systems—or vice versa—can limit your career as a security professional. Similarly, some security professionals see Novell NetWare as a “dead” OS, but many corporations still rely on their faithful NetWare servers that keep plugging away.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LDAP (port ____) is the protocol used to access Novell’s eDirectory, Microsoft Active Directory, and Apple Open Directory.

A

389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Windows 98 introduced the ____ file system.

A

FAT32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does Windows 7 differ from its predecessors?

A

Windows 7 has an optional Windows XP Mode (XPM) that allows running older applications in a virtual Windows XP environment, because software incompatibility issues have prevented many companies from upgrading from Windows XP. However, XPM requires late-model processors that support virtualization extensions, and upgrading to Windows 7 from XP requires a complete reinstallation. Other improvements include faster startup, better overall performance, and refinements to the UAC feature, the desktop/taskbar user interface, and integration of peripheral devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To determine what resources or shares are on a network, security testers must first determine what _________________________ is being used via port scanning and footprinting.

A

OS
operating system
operating system (OS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why do hackers pay attention to NetBIOS computer name suffixes?

A

The NetBIOS name suffixes correspond to the services, or resource types, running on a computer. You don’t need to memorize all the suffixes, but several are critical because they identify the computer or server being enumerated as a standalone computer or a domain controller. Hackers often exert more effort attacking computers identified as domain controllers because they can offer more information, including logon names for user accounts and network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ____ command gives you a quick way to see whether there are any shared resources on a computer or server.

A

Net view

17
Q

The most recent version of Novell OS is called ____.

A

Novell Open Enterprise Server

18
Q

Nessus can be used to enumerate Windows OSs, as well as ____________________ systems.

A

NetWare

19
Q

With ____, you can have your desktop computer or laptop start in both Windows and Linux.

A

Grand Unified Bootloader

20
Q

Many password-guessing programs are available that can determine a password in a matter of seconds. One such program the Department of Defense uses is ________________

A

L0phtcrack

21
Q

The computer names you assign to Windows systems are called ____ names.

A

NetBIOS

22
Q

What is Hyena and what can it be used for?

A

Hyena is an excellent GUI product for managing and securing Microsoft OSs. The interface is easy to use and gives security professionals a wealth of information. With just a click,you can look at the shares and user logon names for Windows servers and domain controllers. If any domains or workgroups are on the network, this tool displays them, too. Hyena can also display a graphical representation of the following areas:

  • Microsoft Terminal Services
  • Microsoft Windows Network
  • Web Client Network
  • Find User/Group
23
Q

Windows NT 3.51 uses the ____ file system.

A

NTFS

24
Q

In NetWare 5.0, TCP/IP replaced ____ as the default protocol.

A

IPX/SPX

25
Q

NetWare’s ____ is a graphical Java utility for centralized network administration.

A

ConsoleOne

26
Q

The “NBT” part of “NBTscan” is an abbreviation for ____________________ over TCP/IP.

A

NetBIOS

27
Q

A NetBIOS name does not need to be unique on a network

A

False

28
Q

The Netmon Agent is a Linux network-monitoring tool.

A

False

29
Q

What is DumpSec and what can it be used for?

A

DumpSec is a popular enumeration tool for Windows systems. The information you can gather with this tool is astonishing. For example, after connecting to a Windows server, you can download—or, as it’s called in DumpSec, “dump”—the following information:

  • Permissions for shares
  • Permissions for printers
  • Permissions for the Registry
  • Users in column or table format
  • Policies (such as local, domain, or group policies)
  • Rights
  • Services
30
Q

The most popular enumeration tool for security testers and hackers alike is the ____ utility, which enables you to find out who is logged in to a *nix system with one simple command.

A

Finger

31
Q

The open-source descendant of Nessus is called ____.

A

OpenVAS

32
Q

Why is enumeration a more intrusive process than port scanning or footprinting?

A

Enumeration is more intrusive because you’re not just identifying a resource; you’re attempting to access it. It goes beyond passive scanning of a network to find open ports. Sometimes this process entails guessing passwords after determining a user name.

33
Q

___ is an excellent GUI tool for managing Windows OSs and is capable of displaying graphical representations of several areas.

A

Hyena