Exam 8: Desktop and Server Os Vulnerabilities

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs.

(True/False)
4.9/5
(37)

Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners?

(Multiple Choice)
4.9/5
(26)

The MSBA tool can quickly identify missing patches and misconfigurations.

(True/False)
4.9/5
(30)

Which standardized remote file system protocol replaced SMB in Windows 2000 Server and later?

(Multiple Choice)
5.0/5
(42)

NetBIOS over TCP/IP is called which of the following in Windows Server 2003?

(Multiple Choice)
4.8/5
(38)

Match each item with a statement below. -Amount of code a computer system exposes to unauthenticated outsiders

(Multiple Choice)
4.8/5
(35)

Ubuntu and Debian Linux use what command to update and manage their RPM packages?

(Multiple Choice)
4.9/5
(36)

Why is NetBIOS still used in Windows Operating Systems?

(Essay)
4.9/5
(35)

Which of the following protocols does NetBios use to access a network resource?

(Multiple Choice)
4.8/5
(35)

Match each item with a statement below. -Microsoft's standard for managing Windows security patches on multiple computers in a network between 1994 and 2005

(Multiple Choice)
4.8/5
(30)

SMB is used to share files and usually runs on top of NetBIOS,NetBEUI,or which of the following?

(Multiple Choice)
4.9/5
(36)

Match each item with a statement below. -An open-source implementation of CIFS

(Multiple Choice)
4.8/5
(24)

Which of the following is a common Linux rootkit?

(Multiple Choice)
4.9/5
(41)

To determine whether a system could be vulnerable to an RPC-related issue,which of the following tools can be used?

(Multiple Choice)
4.8/5
(32)

Which of the following is considered to be the most critical SQL vulnerability?

(Multiple Choice)
4.8/5
(35)

What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?

(Multiple Choice)
4.8/5
(38)

Which of the following is a Window's client/server technology designed to manage patching and updating systems software from the network?

(Multiple Choice)
4.9/5
(33)

Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes,files,and users?

(Multiple Choice)
4.8/5
(34)

Match each item with a statement below. -A fast and efficient protocol that requires little configuration and allows transmitting NetBIOS packets over TCP/IP

(Multiple Choice)
4.9/5
(46)

Match each item with a statement below. -A standardized protocol that replaced SMB in Windows 2000 Server and later

(Multiple Choice)
4.9/5
(36)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)