Chapter 7 & 8 Ethical Hacking
In the Perl programming language, variables begin with which of the following characters?
$
Which of the following takes you from one area of a program (a function) to another area?
Branching
For a Windows computer to be able to access a *nix resource, which of the following must be enabled on both systems?
CIFS
Which standardized remote file system protocol replaced SMB in Windows 2000 Server and later?
Common Internet File System
Which of the following is a common Linux rootkit?
Linux Rootkit 5
Which of the following is the act of performing a task over and over?
Looping
To determine whether a system could be vulnerable to an RPC-related issue, which of the following tools can be used?
MBSA
What is the current file system that Windows utilizes that has strong security features?
NTFS
Carelessly reviewing your program's code might result in having which of the following in your program code?
bug
In object-oriented programming, a function contained in a class is called which of the following?
member function
Which of the following is considered to be the most critical SQL vulnerability?
null SA password
If you want to know what the Perl print command does, you can use which of the following commands?
perldoc -f print
NetBIOS over TCP/IP is called which of the following in Windows Server 2003?
NetBT
When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?
Share-level security