Exam 16: Windows Vulnerabilities
Exam 1: Ethics of Hacking and Cracking18 Questions
Exam 2: Reconnaissance17 Questions
Exam 3: Scanning Tools18 Questions
Exam 4: Sniffers18 Questions
Exam 5: TCP/IP Vulnerabilities18 Questions
Exam 6: Encryption and Password Cracking18 Questions
Exam 7: Spoofing18 Questions
Exam 8: Session Hijacking18 Questions
Exam 9: Hacking Network Devices18 Questions
Exam 10: Trojan Horses18 Questions
Exam 11: Denial-Of-Service Attacks18 Questions
Exam 12: Buffer Overflows18 Questions
Exam 13: Programming Exploits18 Questions
Exam 14: Mail Vulnerabilities18 Questions
Exam 15: Web Application Vulnerabilities18 Questions
Exam 16: Windows Vulnerabilities18 Questions
Exam 17: Unix/Linux Vulnerabilities18 Questions
Exam 18: Incident Handling19 Questions
Select questions type
The __________ service of Windows operating systems does not validate inputs that are submitted to it for processing.
Free
(Short Answer)
4.8/5
(30)
Correct Answer:
Remote Procedure Call (RPC)
Remote Procedure Call
RPC
The NTFS file system is more secure than the FAT32 file system.
Free
(True/False)
4.9/5
(30)
Correct Answer:
True
Windows 2000 and later applications store passwords in the form of hash values in a database called ______________________________.
Free
(Short Answer)
4.8/5
(40)
Correct Answer:
Security Accounts Manager (SAM)
Security Accounts Manager
SAM
Windows XP is a multitasking operating system based on Windows 2010.
(True/False)
4.8/5
(30)
Changing settings in the registry without understanding the effects can easily render a Windows installation inoperable.
(True/False)
4.9/5
(37)
The Microsoft utility ____________________ safeguards passwords from cracking activities. This utility encrypts passwords with a 128-bit algorithm, making it very difficult to crack.
(Short Answer)
4.9/5
(27)
The most widely used operating systems on larger servers is one of the many versions of ____.
(Multiple Choice)
5.0/5
(33)
____ allows the authenticated users of a Windows domain to access resources on another domain, without being authenticated by it.
(Multiple Choice)
4.8/5
(44)
____ is a multiuser, multitasking operating system based on Windows 2000.
(Multiple Choice)
4.9/5
(31)
____________________ was the first version of Windows to use a registry, though it was not the source of all its system settings.
(Short Answer)
4.8/5
(36)
______________________________ was built along the continuum of increased security features that began in 2002 when Bill Gates announced his Trusted Computing Initiative (TCI) in response to calls from customers for greater attention to security.
(Short Answer)
4.7/5
(41)
The easiest way to break password security on a Windows 2000 or later machine is to use a ____ program which can set the administrator password to a blank.
(Multiple Choice)
4.9/5
(42)
The most frequently discovered vulnerabilities in modern Windows operating systems are those related to obtaining ______________.
(Multiple Choice)
4.8/5
(30)
There are several vulnerabilities in Windows Server 2008, XP, Vista, 7, and 8.
(True/False)
4.9/5
(32)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)