Ethical Hacking Quiz 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Function

A mini program within a main program that carries out a task is known as

RPC

An interprocess communication mechanism that allows a program running on one host to run code on a remote host is

True

Biggest vulnerabilities of NetBIOS is null session

Syntax

Instead of grammatical errors, programmers must deal with what type of errors

%

Module symbol

True

Only AT&T can use the name UNIX

True

T/F A typical Linux distro has thousands of packages developed by many contributors around the world

True

T/F Branching takes you from one area of a program (a function) to another area

True

T/F The purpose of any FILE SYSTEM, regardless of the OS, is to store and manage information

False

T/F We can use NetBIOS tools against Windows 8.1

False

T/F [NBTSTAT] command is a powerful enumeration tool for *nix machines

Samba

To address the issue of interoperability, what was created as an open-source implementation of CIFS

MAC

What feature is an OS security mechanism that enforce access rules based on privileges

help

What is the common command-line tag used to provide a list of parameters to be used with the commands

CIFS

Which protocol replaced SMB for Windows 2000 server and later

Pseudocode

a high-level description of the actions of a program or algorithm, using a mixture of English and informal programming language syntax

Special Characters, password generate, different passwords, long and complex, generators

How to improve password policy

Open

If a SYN packet is sent, and a SYN/ACK packet was replied, the port is

classes

In object-oriented programming, what are the structures that hold pieces of data and functions called

Footprinting

In order to determine the OS of the target devices, security testers uses "Port Scanning" and

Ping Sweep

What is the way to identify which IP addresses belong to active hosts

Looping

What programming term is used to describe the act of performing a task over and over

SYN scan

What type of scan is stealthy, and is considered to be the default, and most popular scanning mode

Router IP address

Which components isn't needed in order to craft a packet

Rootkit

Which is a dangerous vulnerability containing Trojan binary programs ready to be installed by someone with root access

To test, only need to scan well-known ports

Which isn't true about the port scanning

SNMP

Which of the following for admin, is the tool to see system statistics, version numbers, and other detailed host info

NetBIOS

Which of the following is a Windows programming interface that allows computers to communicate across a LAN

Node()

Which of these is a possible FUNCTIONS name

NMAP

Which port scanning tool was the most popular and widely-used

Finger

Which tool is used to find out who's logged into a *nix system

NULL scan

Which type of port scan sent a packet with no flags in the ICMP

True

T/F DOS's .BAT file is a type of scripting program

True

T/F Enumeration involves connecting to a system, not just identifying that a system is present on a network

False

T/F NetBIOS is a network protocol

False

T/F OpenVas can only be used to enumerate Winows OS's

True

T/F Perl is the next language of choice after C, for both hackers and security progessionals

True

T/F Port Scanning is also referred to as "Service Scanning"

True

T/F Scripting saves time


Ensembles d'études connexes

Anatomy Basic Concepts (Knowledge)

View Set

MEDSURG II: Prioritization Ch 4 Respiratory Management

View Set

El Medio Ambiente- Pistas y Definiciones

View Set

Chapter 12 - Keyboarding and Computer Applications

View Set

North Carolina Regulations for Life

View Set

Stalin's Russia - Collectivisation and Purging the Kulaks

View Set