Ethical Hacking Quiz Chapter 8

¡Supera tus tareas y exámenes ahora con Quizwiz!

For a Windows computer to be able to access a *nix resource, CIFS must be enabled on both systems -NetBIOS -SMB -CIFS -NetBEUI

CIFS

Which standardized remote file system protocol replaced SMB in Windows 2000 Server and later? -Common Internet File System -Microsoft Knowledge System -Windows Help File -Windows On-line File System

Common Internet File System

Samba is a proprietary implementation of CIFS (T/F)

False

Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners? -MDAC -HFNetChk -MSXML -Mbsacli

HFNetChk

Which of the following is a common Linux rootkit -Back Orifice -Kill Trojans -Packet Storm Security -Linux Rootkit 5

Linux Rootkit 5

Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes,files, and users? -Mandatory Access Control -SE Access Control -Access Control -Mandatory Control

Mandatory Access Control

Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs. (T/F)

True

Windows Software Update Services (WSUS) is designed to manage patching and updating system software from the network. (T/F)

True

Ubuntu and Debian Linux use what command to update and manage their RPM packages -yum -get -dir -apt-get

apt-get

What is the most serious shortcoming of Microsoft's original File Allocation Table(FAT) file system? -no ACL support -no SUS support -no SMTP support -no LINUX support

no ACL support


Conjuntos de estudio relacionados

Pregnancy, Labour, Childbirth, Postpartum - Uncomplicated

View Set

CompTIA Linux+ XK0-005 - Practice Questions

View Set

Floriculture Test Questions 1-100

View Set

Chapter 37: The Experience of Loss, Death and Grief-Questions

View Set