Ethical Hacking Quiz Chapter 8
For a Windows computer to be able to access a *nix resource, CIFS must be enabled on both systems -NetBIOS -SMB -CIFS -NetBEUI
CIFS
Which standardized remote file system protocol replaced SMB in Windows 2000 Server and later? -Common Internet File System -Microsoft Knowledge System -Windows Help File -Windows On-line File System
Common Internet File System
Samba is a proprietary implementation of CIFS (T/F)
False
Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners? -MDAC -HFNetChk -MSXML -Mbsacli
HFNetChk
Which of the following is a common Linux rootkit -Back Orifice -Kill Trojans -Packet Storm Security -Linux Rootkit 5
Linux Rootkit 5
Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes,files, and users? -Mandatory Access Control -SE Access Control -Access Control -Mandatory Control
Mandatory Access Control
Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs. (T/F)
True
Windows Software Update Services (WSUS) is designed to manage patching and updating system software from the network. (T/F)
True
Ubuntu and Debian Linux use what command to update and manage their RPM packages -yum -get -dir -apt-get
apt-get
What is the most serious shortcoming of Microsoft's original File Allocation Table(FAT) file system? -no ACL support -no SUS support -no SMTP support -no LINUX support
no ACL support