Ethical Hacking Quiz 2
Function
A mini program within a main program that carries out a task is known as
RPC
An interprocess communication mechanism that allows a program running on one host to run code on a remote host is
True
Biggest vulnerabilities of NetBIOS is null session
Syntax
Instead of grammatical errors, programmers must deal with what type of errors
%
Module symbol
True
Only AT&T can use the name UNIX
True
T/F A typical Linux distro has thousands of packages developed by many contributors around the world
True
T/F Branching takes you from one area of a program (a function) to another area
True
T/F The purpose of any FILE SYSTEM, regardless of the OS, is to store and manage information
False
T/F We can use NetBIOS tools against Windows 8.1
False
T/F [NBTSTAT] command is a powerful enumeration tool for *nix machines
Samba
To address the issue of interoperability, what was created as an open-source implementation of CIFS
MAC
What feature is an OS security mechanism that enforce access rules based on privileges
help
What is the common command-line tag used to provide a list of parameters to be used with the commands
CIFS
Which protocol replaced SMB for Windows 2000 server and later
Pseudocode
a high-level description of the actions of a program or algorithm, using a mixture of English and informal programming language syntax
Special Characters, password generate, different passwords, long and complex, generators
How to improve password policy
Open
If a SYN packet is sent, and a SYN/ACK packet was replied, the port is
classes
In object-oriented programming, what are the structures that hold pieces of data and functions called
Footprinting
In order to determine the OS of the target devices, security testers uses "Port Scanning" and
Ping Sweep
What is the way to identify which IP addresses belong to active hosts
Looping
What programming term is used to describe the act of performing a task over and over
SYN scan
What type of scan is stealthy, and is considered to be the default, and most popular scanning mode
Router IP address
Which components isn't needed in order to craft a packet
Rootkit
Which is a dangerous vulnerability containing Trojan binary programs ready to be installed by someone with root access
To test, only need to scan well-known ports
Which isn't true about the port scanning
SNMP
Which of the following for admin, is the tool to see system statistics, version numbers, and other detailed host info
NetBIOS
Which of the following is a Windows programming interface that allows computers to communicate across a LAN
Node()
Which of these is a possible FUNCTIONS name
NMAP
Which port scanning tool was the most popular and widely-used
Finger
Which tool is used to find out who's logged into a *nix system
NULL scan
Which type of port scan sent a packet with no flags in the ICMP
True
T/F DOS's .BAT file is a type of scripting program
True
T/F Enumeration involves connecting to a system, not just identifying that a system is present on a network
False
T/F NetBIOS is a network protocol
False
T/F OpenVas can only be used to enumerate Winows OS's
True
T/F Perl is the next language of choice after C, for both hackers and security progessionals
True
T/F Port Scanning is also referred to as "Service Scanning"
True
T/F Scripting saves time