Network Defense Chapter 6
False
A NetBIOS name does not need to be unique on a network. True False
Windows Server 2003
A well documented Window's OS vulnerability was null sessions. What Windows operating system was the first to disable null sessions by default? Windows Server 2012 Windows Server 2003 Windows 8.1 Windows Server 2008
False
All of the enumeration techniques that work with older Windows OSs still work with Windows Server 2019. True False
script scanning
If you do not have access to Nessus, what NMap procedure can be used to help you to gain information about remote *nix hosts? script analysis range ping script scanning snmp pinging
True
NBTscan is a utility that can be used for enumerating Windows OSs. True False
True
NTFS was implemented to replace FAT16 and FAT32 because of the difficulty in incorporating security in these file systems. True False
default
SNMPWalk is a tool useful in enumerating hosts running SNMP with what type of configuration? default advanced administrator open
NetBIOS
The computer names you assign to Windows systems are called which of the following? NetBIOS AD Names NetDDE IIS
True
The latest version of Nessus Server and Client can run on Windows, Mac OS X, FreeBSD, and most Linux distributions. True False
OpenVAS
The open-source descendant of Nessus is called which of the following? OpenVAS WinNessus WNessus NW
footprinting
To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used? footprinting port analysis mapping back scanning
GRUB
What boot loader will allow your computer or laptop to start in both Windows and Linux? X500 BIOS BASH GRUB
NetBIOS over TCP/IP
What does the "NBT" part of "NBTscan" stand for? NetBIOS over Transport NetBIOS Transfer NetBIOS Test NetBIOS over TCP/IP
DumpSec
What enumeration tool is extremely useful when working with Windows NT, 2000, and Windows XP systems? DumpWare DumpSec NetWare NetSec
SecureBoot
What feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, preventing rootkits? BIOS Check SecureBoot VGuard Windows Defender
Windows Containers
What feature implemented in Windows Server 2016 allows for application isolation to protect applications from one another? Windows Boxes Windows NT Windows Containers Windows VMs
enumeration
What process allows a security professional to extract valuable information, such as information about users and recent login times from a network? mapping back scanning port analysis enumeration
SmartScreen
What security feature was extended to the OS to alert the user when an application is launched on a Windows 8.1 computer? Windows Defender SmartScreen Data Execution Prevention LDAP
Domain Controller
What type of Windows Server is the most likely server to be targeted by a computer hacker? DHCP Server DNS Server Domain Controller File Server
null session
What type of unauthenticated connection is considered to be a significant vulnerability of NetBIOS systems? null system exit session null session net session
Server Message Block
What upper-level service is required to utilize file and printer sharing in Windows? Print Server App Server Message Block Server Message App File Message Block
Windows Server 2016
What version of Windows Server has completely eliminated the option for telnet server? Windows Server 2003 Windows Server 2016 Windows Server 2012 Windows Server 2008
Credential Guard
Which Windows 10 feature uses virtualization to protect access tokens from theft by attackers? VGuard Credential Guard Token Guard Device Check
Net view
Which of the following commands gives you a quick way to see if there are any shared resources on a computer or server? Nbtstat Netmon Agent NetDDE Net view
Nbtstat
Which of the following commands is a powerful enumeration tool included with Windows? NessusWX NetDDE Nbtstat Netmon Agent
NetBIOS
Which of the following is a Windows programming interface that allows computers to communicate across a local area network (LAN)? NetApp NetAPI BIOS NetBIOS
Finger utility
Which of the following is a useful enumeration tool that enables you to find out who is logged into a *nix system with one simple command? Nix utility Net utility Finger utility Point utility
Hyena
Which of the following is an excellent GUI tool for managing Windows OSs and is capable of displaying graphical representations of several areas? Hyena IIS NetDDE Zion
SNMP
Which one of the following is an older network management service that is useful for network administrators that want to view system statistics, version numbers, and other detailed host information remotely? FTP SSL TFTP SNMP
Authentication Silos
Windows Server 2012 introduced what protection feature to prevent pass-the-hash attacks? Authentication Silos Attack Surface AppLocker Containers