Exam 9: Embedded Operating Systems: the Hidden Threat
Why should a systems administrator disable unused services and filtering ports?
Disabling unneeded services and deleting unnecessary applications or scripts make sense because they give intruders a potential point of entry into a network.If you have a Windows Server 2016 system acting as a file server,you certainly don't need DNS services running on it; doing so leaves port 53 TCP/UDP open and vulnerable to attack.Open only what needs to be open,and close everything else.
What is Samba used for?
Samba is an open-source implementation of CIFS; with Samba,*nix servers can share resources with Windows clients,and Windows clients can access a *nix resource without realizing that the resource is on a *nix computer.Samba has been ported to non-*nix systems,too,including OpenVMS,NetWare,and AmigaOS.Samba is very useful because many companies have a mixed environment of Windows and *nix systems.
What is the Common Internet File System (CIFS)protocol?
Common Internet File System (CIFS)is a standardized protocol that replaced SMB in Windows 2000 Server and later,but to allow backward compatibility,the original SMB is still used.CIFS is a remote file system protocol that enables computers to share network resources over the Internet.In other words,files,folders,printers,and other resources can be made available to users throughout a network.For sharing to occur,there must be an infrastructure that allows placing these resources on the network and a method to control access to resources.
Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?
Match each item with a statement below.
-A standardized protocol that replaced SMB in Windows 2000 Server and later
Match each item with a statement below.
-A cryptographic firmware boot-check processor installed on many new computer systems
Match each item with a statement below.
-Devices on an organization's network performing more than one function,such as printers,scanners,and copiers
What type of viruses and code has been created by security researchers and attackers that could infect phones running Google's Android,Windows Mobile,and the Apple iPhone OS?
Match each item with a statement below.
-An open-source embedded OS used in space systems because it supports processors designed specifically to operate in space
When using the Common Internet File System (CIFS),which security model will require network users to have a user name and password to access a specific resource?
Which one of the following,if compromised might allow attackers the ability to gain complete access to network resources?
Which of the following is considered to be the most critical SQL vulnerability?
In Windows Server 2003 and 2008,how does a domain controller locate resources in a domain?
Match each item with a statement below.
-An open-source implementation of CIFS
Ubuntu and Debian Linux use what command to update and manage their RPM packages?
Why should you review logs regularly,and how should you manage this task?
Match each item with a statement below.
-Software residing on a chip
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)