Exam 8: Desktop and Server Os Vulnerabilities

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

NetBios is not available in Windows Vista,Server 2008,and later versions of Windows.However,NetBios should be understood by a security professional because it is used for which of the following?

Free
(Multiple Choice)
4.7/5
(28)
Correct Answer:
Verified

A

What programming languages are vulnerable to buffer overflow attacks?

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

B

What should a password policy include?

Free
(Essay)
4.8/5
(35)
Correct Answer:
Verified

A comprehensive password policy is critical,as a user name and password are often all that stands between an attacker and access.A password policy should include the following:
- Change passwords regularly on system-level accounts
- Require users to change their passwords regularly
- Require a minimum password length of at least eight characters
- Require complex passwords
- Passwords can't be common words,words found in the dictionary,or slang,jargon,or dialect
- Passwords must not be identified with a particular user
- Never write a password down or store it online or in a file on the user's computer
- Don't hint at or reveal a password to anyone over the phone,in e-mail,or in person
- Use caution when logging on to make sure no one sees you entering your password
- Limit reuse of old passwords

What is the current file system that Windows utilizes that has strong security features?

(Multiple Choice)
5.0/5
(32)

Windows 10,Windows 8,Windows Server 2016,and Windows Server 2012 have most services and features enabled by default.

(True/False)
4.8/5
(38)

In Windows Server 2003 and 2008,how does a domain controller locate resources in a domain?

(Essay)
4.9/5
(27)

Match each item with a statement below. -An OS security mechanism that enforces access rules based on privileges for interactions between processes,files,and users

(Multiple Choice)
4.9/5
(35)

Early Windows OSs used which of the following programs loaded into memory to interact with a network resource or device?

(Multiple Choice)
4.8/5
(44)

Red Hat and Fedora Linux use what command to update and manage their RPM packages?

(Multiple Choice)
4.8/5
(26)

Match each item with a statement below. -Used to share files and usually runs on top of NetBIOS,NetBEUI,or TCP/IP

(Multiple Choice)
5.0/5
(34)

Which of the following is an open-source implementation of CIFS?

(Multiple Choice)
4.8/5
(41)

What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT)file system?

(Multiple Choice)
4.9/5
(29)

Which of the following is an interprocess communication mechanism that allows a program running on one host to run code on a remote host?

(Multiple Choice)
4.9/5
(33)

Which of the following Window's utilities includes a suite of tools to help administrators deploy and manage servers and even allows for administrators to control mobile devices running Android,iOS,and Windows Mobile OS?

(Multiple Choice)
4.8/5
(39)

Match each item with a statement below. -In 2007 became Windows new standard to deploy and manage servers alongside updated patch-management functionality

(Multiple Choice)
4.8/5
(39)

What critical component of any OS,that can be can be vulnerable to attacks,is used to store and manage information?

(Multiple Choice)
4.9/5
(33)

What is the Common Internet File System (CIFS)protocol?

(Essay)
4.9/5
(28)

Match each item with a statement below. -A Windows client/server technology introduced in 2005 used to manage patching and updating system software from the network

(Multiple Choice)
4.8/5
(41)

What functions do most Trojan programs perform?

(Essay)
4.7/5
(33)

Why should a systems administrator disable unused services and filtering ports?

(Essay)
4.8/5
(29)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)