Ethical Hacking Chapter 9

¡Supera tus tareas y exámenes ahora con Quizwiz!

Trusted Platform Module

A cryptographic firmware boot-check processor installed on many computer systems

MFD

A device that performs more than one function, such as printing and faxing is called which of the following?

NetBEUI

A fast and efficient protocol that requires little configuration and allows transmitting NetBIOS packets over TCP/IP

embedded operating system

A small program developed specifically for use with embedded systems

RTOS

A specialized embedded OS used in devices such as programmable thermostats, appliances controls, and even spacecraft

Common Internet File System

A standardized protocol that replaced SMB in Windows 2000 Server and later

Windows Software Update server

A windows client/server technology introduced in 295 used to manage patching and updating system software from the network

attack surface

Amount of code a computer system exposed to unauthenticated outsiders

RTLinux

An OS microkernel extension developed for Linux

Mandatory Access Control

An OS security mechanism that enforces access rules based on privileges from interactions between processes, files, and users

MILS

An embedded OS certified to run multiple levels of classification on the same CPU without leakage between levels

Remote Procedure Call

An interprocess communication mechanism that allows a program running on one host to run code on a remote host

RTEMS

An open-source embedded OS used in space systems because it supports processors designed specifically to operate in space

Samba

An open-source implementation of CIFS

embedded system

Any computer system that is not a general purpose PC or server

multifunction devices

Devices on a organization's network performing more than one function, such as printers, scanners, and copiers

True

Embedded OSs are usually designed to be small and efficient so they do not have some of the functions that general-purpose OSs have

System Center Configuration Manager

In 2007 became Windows new standard to deploy and manage servers alongside updated patch-management functionality

Systems Management Server

Microsoft's standard for managing Windows security patches on multiple computers in a network between 1994 and 2005

firmware

Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?

air gap

SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?

firmware

Software residing on a chip

SCADA

Systems used for equipment monitoring in large industries, such as public works and utilities, power, generators and dams

apt-get

Ubuntu and debian Linux use what command to update and manage their RPM packages?

Server Message Block

Used to share files and usually runs on top of NetBIOS, NetBEUI, or TCP/IP

NTFS

What is the current file system that Windows utilizes that has strong security features?

no ACL support

What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT) file system?

C and C++

What programming languages are vulnerable to buffer overflow attacks?

BIOS-based rootkit

What type of malicious code could be installed in a system's flash memory to allow an attacker to access the system at a later date?

Java-based

What type of viruses and code has been created by security researchers and attackers that could infect phones running Google's Android, Windows Mobile, and the Apple iPhone OS

Share-level security

When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?

User-level security

When using the Common Internet File System (CIFS), which security model will require network users to have name and password to access a specific resource?

Linux Rootkit 5

Which of the following is a common linux rootkit?

Mandatory Access Control

Which of the following is an SELinux OS security mechanism that enforces acces rules base on privileges for interactions between processes, files, users?

null SA password

Which of the following is considered to be the most critical SQL vulnerability?

Web server

Which of the following is often found within an embedded OS that can cause a potential vulnerability to an attack?

Windows Embedded 8

Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?

SCADA

Which of the following systems can be used when equipment monitoring and automation is critical?

router

Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources?


Conjuntos de estudio relacionados

Chapter 4- States Of Consciousness Quiz Review

View Set

Chapter 6: Table 6-1 - Warning Signs of Melanoma

View Set

Concepts of clinical decision making module 3 - Urinary

View Set

Sadlier-Oxford Vocabulary Workshop Level E

View Set

System Software (Operating System)

View Set