Exam 8: Desktop and Server Os Vulnerabilities
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
What can a security tester using enumeration tools do?
Free
(Essay)
4.8/5
(36)
Correct Answer:
A security tester using enumeration tools can do the following:
-Identify a computer on the network by using port scanning and zone transfers
-Identify the OS the computer is using by conducting port scanning and enumeration
-Identify via enumeration any logon accounts and passwords configured on the computer
-Learn the names of shared folders by using enumeration
-Identify services running on the computer
The MBSA can check for user account passwords that have dictionary words in them.
Free
(True/False)
4.9/5
(35)
Correct Answer:
False
If the LRK5 rootkit is installed on a Linux computer, entering the Trojaned ____ command allows the attacker's processes to continue running, even though the Linux administrator thinks all processes were killed.
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
A
____ is an interprocess communication mechanism that allows a program running on one host to run code on a remote host.
(Multiple Choice)
4.8/5
(32)
SELinux contains several features and modules that use ____, an OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users.
(Multiple Choice)
4.8/5
(38)
Complete instructions for MBSA are available from the MBSA Help interface or the ____ site.
(Multiple Choice)
4.9/5
(30)
MATCHING
Match each term with the correct statement below.
-gives an intruder a potential point of entry into a network
(Multiple Choice)
4.8/5
(36)
MATCHING
Match each term with the correct statement below.
-DNS is associated with this port
(Multiple Choice)
4.7/5
(31)
MATCHING
Match each term with the correct statement below.
-no account should have this type of password
(Multiple Choice)
4.7/5
(35)
In Windows Server 2003 and 2008, how does a domain controller locate resources in a domain?
(Essay)
4.8/5
(43)
Trusted Computer Solutions____ program is used to tighten Linux system security configuration by using templates.
(Multiple Choice)
4.8/5
(46)
To determine whether a system is vulnerable to an RPC-related issue, the best tool is ____.
(Multiple Choice)
4.7/5
(32)
You can use _____________________________________________ information when testing Linux computers for known vulnerabilities.
(Essay)
4.8/5
(34)
Red Hat and Fedora Linux use the ____ command to update and manage RPM packages.
(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)