Exam 8: Desktop and Server Os Vulnerabilities
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs.
(True/False)
4.9/5
(37)
Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners?
(Multiple Choice)
4.9/5
(26)
The MSBA tool can quickly identify missing patches and misconfigurations.
(True/False)
4.9/5
(30)
Which standardized remote file system protocol replaced SMB in Windows 2000 Server and later?
(Multiple Choice)
5.0/5
(42)
NetBIOS over TCP/IP is called which of the following in Windows Server 2003?
(Multiple Choice)
4.8/5
(38)
Match each item with a statement below.
-Amount of code a computer system exposes to unauthenticated outsiders
(Multiple Choice)
4.8/5
(35)
Ubuntu and Debian Linux use what command to update and manage their RPM packages?
(Multiple Choice)
4.9/5
(36)
Which of the following protocols does NetBios use to access a network resource?
(Multiple Choice)
4.8/5
(35)
Match each item with a statement below.
-Microsoft's standard for managing Windows security patches on multiple computers in a network between 1994 and 2005
(Multiple Choice)
4.8/5
(30)
SMB is used to share files and usually runs on top of NetBIOS,NetBEUI,or which of the following?
(Multiple Choice)
4.9/5
(36)
Match each item with a statement below.
-An open-source implementation of CIFS
(Multiple Choice)
4.8/5
(24)
To determine whether a system could be vulnerable to an RPC-related issue,which of the following tools can be used?
(Multiple Choice)
4.8/5
(32)
Which of the following is considered to be the most critical SQL vulnerability?
(Multiple Choice)
4.8/5
(35)
What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?
(Multiple Choice)
4.8/5
(38)
Which of the following is a Window's client/server technology designed to manage patching and updating systems software from the network?
(Multiple Choice)
4.9/5
(33)
Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes,files,and users?
(Multiple Choice)
4.8/5
(34)
Match each item with a statement below.
-A fast and efficient protocol that requires little configuration and allows transmitting NetBIOS packets over TCP/IP
(Multiple Choice)
4.9/5
(46)
Match each item with a statement below.
-A standardized protocol that replaced SMB in Windows 2000 Server and later
(Multiple Choice)
4.9/5
(36)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)