Exam 8: Desktop and Server Os Vulnerabilities

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

NetBIOS is not a protocol; it usually works with ____, a fast, efficient protocol that requires little configuration.

(Multiple Choice)
4.9/5
(35)

To perform MBSA-style scans you can run the tool from the command line by using ____________________.exe.

(Short Answer)
4.8/5
(37)

SMB usually runs on top of NetBIOS, NetBEUI, or ____.

(Multiple Choice)
4.8/5
(36)

Samba is as an closed-source implementation of CIFS.

(True/False)
4.9/5
(37)

Rootkits containing Trojan binary programs ready to be installed are more dangerous than typical Trojan programs.

(True/False)
4.8/5
(45)

____ is a client/server technology designed to manage patching and updating systems software from the network.

(Multiple Choice)
4.9/5
(42)

MATCHING Match each term with the correct statement below. -LDAP is associated with this port

(Multiple Choice)
4.8/5
(39)

NetBIOS over TCP/IP is called ____ in Windows 2000 Server.

(Multiple Choice)
4.8/5
(43)

MATCHING Match each term with the correct statement below. -to harden Microsoft systems, you should rename this account

(Multiple Choice)
4.9/5
(34)

MATCHING Match each term with the correct statement below. -to harden Microsoft systems, you should disable this account

(Multiple Choice)
5.0/5
(34)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)