Exam 16: Windows Vulnerabilities

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The __________ service of Windows operating systems does not validate inputs that are submitted to it for processing.

Free
(Short Answer)
4.8/5
(30)
Correct Answer:
Verified

Remote Procedure Call (RPC)
Remote Procedure Call
RPC

The NTFS file system is more secure than the FAT32 file system.

Free
(True/False)
4.9/5
(30)
Correct Answer:
Verified

True

Windows 2000 and later applications store passwords in the form of hash values in a database called ______________________________.

Free
(Short Answer)
4.8/5
(40)
Correct Answer:
Verified

Security Accounts Manager (SAM)
Security Accounts Manager
SAM

Windows XP is a multitasking operating system based on Windows 2010.

(True/False)
4.8/5
(30)

Changing settings in the registry without understanding the effects can easily render a Windows installation inoperable.

(True/False)
4.9/5
(37)

The Microsoft utility ____________________ safeguards passwords from cracking activities. This utility encrypts passwords with a 128-bit algorithm, making it very difficult to crack.

(Short Answer)
4.9/5
(27)

Describe the main characteristics of Windows Server 2008.

(Essay)
5.0/5
(41)

RDP stands for Remote Desktop Protocol.

(True/False)
4.9/5
(26)

The most widely used operating systems on larger servers is one of the many versions of ____.

(Multiple Choice)
5.0/5
(33)

____ allows the authenticated users of a Windows domain to access resources on another domain, without being authenticated by it.

(Multiple Choice)
4.8/5
(44)

What are the most important Windows operating systems?

(Essay)
4.9/5
(35)

____ is a multiuser, multitasking operating system based on Windows 2000.

(Multiple Choice)
4.9/5
(31)

____________________ was the first version of Windows to use a registry, though it was not the source of all its system settings.

(Short Answer)
4.8/5
(36)

______________________________ was built along the continuum of increased security features that began in 2002 when Bill Gates announced his Trusted Computing Initiative (TCI) in response to calls from customers for greater attention to security.

(Short Answer)
4.7/5
(41)

Briefly describe the main characteristics of Windows Vista.

(Essay)
4.8/5
(35)

The easiest way to break password security on a Windows 2000 or later machine is to use a ____ program which can set the administrator password to a blank.

(Multiple Choice)
4.9/5
(42)

The most frequently discovered vulnerabilities in modern Windows operating systems are those related to obtaining ______________.

(Multiple Choice)
4.8/5
(30)

There are several vulnerabilities in Windows Server 2008, XP, Vista, 7, and 8.

(True/False)
4.9/5
(32)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)