Exam 4: Operating Systems and Applications

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Zachery remembers someone mentioning a tool called "Bastille Linux" that he could use for hardening the configuration of his system after install. Which of the other tools is also an option?

(Multiple Choice)
4.9/5
(37)

The IT manager of a large corporation is a bit reluctant to allow the use of Linux systems on users systems because he has been told they come with many hacking tools that are either pre-installed or easy to obtain. For example he cites tools like ettercap that can create havoc on a local network. Which of the following can also be used for a session hijack or arp poisoning attack?

(Multiple Choice)
4.9/5
(41)

Peter is worried about the possibility of software on his system being vulnerable to "stack smashing" attacks. He always compiles from source. What other precaution can he take?

(Multiple Choice)
4.9/5
(37)

USB Hacksaw is a tool that can be used to:

(Multiple Choice)
4.9/5
(40)

What does the following command do? Hping2 -I eth0 -a 2.2.2.2 -s 1020 -p 22 --syn -c 1 -d 0xF00 -setseq 0x0000000F 192.168.100.2

(Multiple Choice)
4.9/5
(42)

William wants to check his Linux system for rootkits, which of the following tools can he use? (Choose Two)

(Multiple Choice)
4.9/5
(39)

Cedric is troubleshooting his Linux system because a hardware component has stopped working properly. He wonders if another admin has installed a non approved LKM. He runs a check and is relieved to find that at least is not what is wrong. What command did he run?

(Multiple Choice)
4.9/5
(27)

Which of the following allows a safe environment for developers that wish to work on code using normal permissions but ensure they are still isolated from the rest of the system?

(Multiple Choice)
4.8/5
(35)

Kalyna implements a strong system to protect her network communications. It involves DSA (Digital Signature Algorithm) but uses Eliptic Curve Cryptography to enhance the efficiency of the system. What is this technology called?

(Multiple Choice)
5.0/5
(37)

What is the feature supported by all NTFS volumes that allows forked data to be associated with a file in a way that will not affect the size of the original data?

(Multiple Choice)
4.8/5
(39)

Blair receives permission to audit the passwords on a critical server. The server is joined to a domain and is therefore "Kerberized" but Blair decides to try the simplest approach first anyway. He uses pwdump to successfully obtain the hashes and john the ripper to crack them. Blair's supervisor is stunned. He says "I made sure every password was at least 10 characters long" Why did the audit fail?

(Multiple Choice)
4.8/5
(42)

Programs such as NetNanny can be installed to monitor and control the Internet use on a computer, including keeping logs of chats. To prevent the sites themselves from knowing who visited them, a different tool is used. Which of the following will accomplish this purpose?

(Multiple Choice)
5.0/5
(39)

Which of the following Linux tools can be used for not only detecting port scans but taking action to prevent them?

(Multiple Choice)
4.8/5
(26)

Viruses can be described as having three parts: Replicator, Concealer, and Payload. In the payload portion, there is a trigger mechanism and destructive code. When the trigger is based on events such as keystrokes, what class of malware is that considered:

(Multiple Choice)
4.8/5
(35)

Which of the following are best practices when securing a mail relay so it is not "open"? (Choose 2)

(Multiple Choice)
4.8/5
(51)

Password hashes are stored on a Windows machine in several locations. Sometimes only the system account has access, but because this is data at rest booting to an alternate OS or remotely access via a call with system rights could work. Where could password hashes be stored on a Windows host? (choose four)

(Multiple Choice)
4.8/5
(43)

From the following log entries, what are the affected user accounts? Mkdir - p /etc/x11/applnk/internet/.etc Touch -macr /etc/x11/applnk/internet/.etc Mkdir - p /etc/x11/applnk/internet/.etcpasswd Touch -macr /etc/x11/applnk/internet/.etcpasswd Adduser dns -d /bin -s /bin/bash -u 0 -g 0 Passwd nobody -d Passwd dns -d

(Multiple Choice)
4.8/5
(33)

Curtis is looking over a SAM file he captured using PWDump3v2. He is looking at the LM hashes for a password he might be able to crack rather quickly. Which of the following users has a password that is less than 7 characters?

(Multiple Choice)
4.9/5
(37)

At any given time there are thousands of free proxy servers available on the Internet that can be used to keep certain activities anonymous. What protocol has been designed to allow the chaining together of proxy servers?

(Multiple Choice)
4.8/5
(44)

Your father just purchased a new computer and brings it to you for a lookover. He wants to make sure he can safely use the internet and a few other applications. You show him the necessary steps to preparing a Windows computer fresh out of the box. What did you teach your father to do (Choose 3)?

(Multiple Choice)
4.8/5
(30)
Showing 41 - 60 of 63
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)