Exam 8: Desktop and Server Os Vulnerabilities
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
Why should you review logs regularly? How should you accomplish this task?
(Essay)
4.8/5
(40)
What is Server Message Block (SMB) used for in Windows? Can hacking tools still damage a network using SMB?
(Essay)
4.8/5
(38)
The Trojan program called Sheepshank makes HTTP GET requests over port ____.
(Multiple Choice)
4.7/5
(28)
MATCHING
Match each term with the correct statement below.
-almost useless if it isn't updated regularly
(Multiple Choice)
4.7/5
(35)
The Conficker worm took advantage of a vulnerability in ____ to run arbitrary code on susceptible hosts.
(Multiple Choice)
4.8/5
(27)
Microsoft's Systems Management Server (SMS) can manage security patches for all computers on a network.
(True/False)
4.9/5
(38)
The best way to protect a network from SMB attacks is to make sure routers filter out ports 137 to 139 and ____.
(Multiple Choice)
4.8/5
(29)
MATCHING
Match each term with the correct statement below.
-HTTP is associated with this port
(Multiple Choice)
4.8/5
(40)
Windows Server 2003 and 2008 ____ are used to authenticate user accounts, so they contain much of the information that attackers want to access.
(Multiple Choice)
4.8/5
(29)
Early Windows OSs communicated with each other by using ____.
(Multiple Choice)
4.9/5
(37)
For a Windows computer to be able to access a *nix resource, ____ must be enabled on both systems.
(Multiple Choice)
4.8/5
(24)
MATCHING
Match each term with the correct statement below.
-HTTPS is associated with this port
(Multiple Choice)
4.8/5
(27)
In Microsoft systems, an excellent resource for finding configuration errors, missing patches, and so on is the ________________________________________.
(Essay)
4.8/5
(32)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)