Exam 8: Desktop and Server Os Vulnerabilities

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What can a security tester using enumeration tools do?

Free
(Essay)
4.8/5
(36)
Correct Answer:
Verified

A security tester using enumeration tools can do the following:
-Identify a computer on the network by using port scanning and zone transfers
-Identify the OS the computer is using by conducting port scanning and enumeration
-Identify via enumeration any logon accounts and passwords configured on the computer
-Learn the names of shared folders by using enumeration
-Identify services running on the computer

The MBSA can check for user account passwords that have dictionary words in them.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

False

If the LRK5 rootkit is installed on a Linux computer, entering the Trojaned ____ command allows the attacker's processes to continue running, even though the Linux administrator thinks all processes were killed.

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

A

____ is an interprocess communication mechanism that allows a program running on one host to run code on a remote host.

(Multiple Choice)
4.8/5
(32)

SMB stands for _________________________.

(Short Answer)
4.7/5
(30)

SELinux contains several features and modules that use ____, an OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users.

(Multiple Choice)
4.8/5
(38)

NetBIOS over TCP/IP is called ____ in Windows Server 2003.

(Multiple Choice)
4.9/5
(32)

Complete instructions for MBSA are available from the MBSA Help interface or the ____ site.

(Multiple Choice)
4.9/5
(30)

MATCHING Match each term with the correct statement below. -gives an intruder a potential point of entry into a network

(Multiple Choice)
4.8/5
(36)

What is Samba used for?

(Essay)
4.8/5
(31)

MATCHING Match each term with the correct statement below. -DNS is associated with this port

(Multiple Choice)
4.7/5
(31)

What is the Common Internet File System (CIFS) protocol?

(Essay)
4.8/5
(43)

A common Linux rootkit is ____.

(Multiple Choice)
4.9/5
(41)

MATCHING Match each term with the correct statement below. -no account should have this type of password

(Multiple Choice)
4.7/5
(35)

In Windows Server 2003 and 2008, how does a domain controller locate resources in a domain?

(Essay)
4.8/5
(43)

Trusted Computer Solutions____ program is used to tighten Linux system security configuration by using templates.

(Multiple Choice)
4.8/5
(46)

To determine whether a system is vulnerable to an RPC-related issue, the best tool is ____.

(Multiple Choice)
4.7/5
(32)

RPC stands for ________________________.

(Short Answer)
4.9/5
(33)

You can use _____________________________________________ information when testing Linux computers for known vulnerabilities.

(Essay)
4.8/5
(34)

Red Hat and Fedora Linux use the ____ command to update and manage RPM packages.

(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)