HS 335 Quiz 3
A device that performs *more than one function*, such as printing and faxing is called which of the following?
MFD
SMB is used to share files and usually runs on top of NetBIOS, NetBEUI, or which of the following?
TCP/IP
What version of Windows Server has completely *eliminated* the option for *telnet* server?
Windows Server 2016
What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?
domain controllers
NBTscan is a utility that can be used for enumerating Windows OSs. (T/F)
true
Early Windows OSs used which of the following programs loaded into memory to interact with a network resource or device?
NetBIOS
The *computer names* you assign to Windows systems are called which of the following?
NetBIOS
Which of the following is a Windows programming interface that allows computers to communicate across a local area network (LAN)?
NetBIOS
Which on of the following is an *older network management service* that is useful for network administrators that want to view system statistics, version numbers, and other detailed host information remotely?
SNMP
Which of the following is an open-source implementation of CIFS?
Samba
What feature implemented in *Windows 8.1* prevents the execution of *non-trusted boot content*, preventing rootkits?
SecureBoot
Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?
Windows CE
What feature implemented in Windows Server 2016 allows for *application isolation* to protect applications from one another?
Windows Containers
What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?
enumeration
What critical component of any OS, that can be can be vulnerable to attacks, is used to store and manage information?
file system
Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?
firmware
What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT) file system?
no ACL support
Embedded OSs are usually designed to be small and efficient so they do not have some of the functions that general-purpose OSs have. (T/F)
true
NTFS was implemented to replace FAT16 and FAT32 because of the difficulty in incorporating security in these file systems. (T/F)
true
Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs. (T/F)
true
The MSBA tool can quickly identify missing patches and misconfigurations. (T/F)
true
Red Hat and Fedora Linux use what command to update and manage their RPM packages?
yum
Which of the following systems should be used when equipment monitoring and automation is critical?
SCADA
Which of the following if often found within an embedded OS that can cause a potential vulnerability to an attack?
Web server
SNMPWalk is a tool useful in enumerating hosts running SNMP with what type of configuration?
default
Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources?
router
SCADA systems controlling critical infrastructure are usually completely separated from the Internet by which of the following?
air gap
Ubuntu and Debian Linux use what command to update and manage their RPM packages?
apt-get
NetBios is not available in Windows Vista, Server 2008, and later versions of Windows. However, NetBios should be understood by a security professional because it is used for which of the following?
backward compatibility
Windows 10, Windows 8, Windows Server 2016, and Windows Server 2012 have most services and features enabled by default. (T/F)
false
To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used?
footprinting
Which of the following is considered to be the most critical SQL vulnerability?
null SA password
What type of *unauthenticated connection* is considered to be a significant *vulnerability of NetBIOS* systems?
null session
If you do *not have access to Nessus*, what NMap procedure can be used to help you to gain information about remote *nix hosts?
script scanning
What type of Windows Server is the *most likely* server to be *targeted by a computer hacker*?
Domain Controller
Which of the following commands gives you a quick way to see if there are any *shared resources* on a computer or server?
Net view
Which of the following protocols does NetBios use to access a network resource?
NetBEUI
What upper-level service is required to utilize file and printer sharing in Windows?
Server Message Block
When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?
Share-level security
A NetBIOS name does not need to be unique on a network. (T/F)
False
Which of the following is a useful enumeration tool that enables you to find out *who is logged into* a *nix system with one simple command?
Finger utility
What is the current file system that Windows utilizes that has strong security features?
NTFS
Which of the following commands is a powerful *enumeration tool* included with Windows?
Nbtstat
What security feature was extended to the OS to alert the user when an application is launched on a Windows 8.1 computer?
SmartScreen
The latest version of Nessus Server and Client can run on Windows, Mac OS X, FreeBSD, and most Linux distributions. (T/F)
True
A well documented Window's OS vulnerability was null sessions. What Windows operating system was the first to *disable null sessions by default*?
Windows Server 2003
All of the enumeration techniques that work with older Windows OSs still work with Windows Server 2012. (T/F)
False
Which of the following Window's utilities includes a suite of tools to help administrators deploy and manage servers and even allows for administrators to control mobile devices running Android, iOS, and Windows Mobile OS?
SCCM
What *boot loader* will allow your computer or laptop to start in both Windows and Linux?
GRUB
What type of viruses and code has been created by security researchers and attackers that could infect phones running Google's Android, Windows Mobile, and the Apple iPhone OS?
Java-based
To determine whether a system could be vulnerable to an RPC-related issue, which of the following tools can be used?
MBSA
NetBIOS over TCP/IP is called which of the following in Windows Server 2003?
NetBT
Windows Software Update Services (WSUS) is designed to manage patching and updating system software from the network. (T/F)
True
*Which Windows 10* feature uses virtualization to protect access tokens from *theft by attackers*?
Credential Guard
Samba is a proprietary implementation of CIFS. (T/F)
False
Which of the following is a common Linux rootkit?
Linux Rootkit 5
Which of the following is an interprocess communication mechanism that allows a program running on one host to run code on a remote host?
RPC
When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password to access a specific resource?
User-level security
Which of the following is a Window's client/server technology designed to manage patching and updating systems software from the network?
WSUS
What programming languages are vulnerable to buffer overflow attacks?
C and C++
Which of the following is an SELinux OS security mechanism that *enforces access rules* based on privileges for interactions between processes, files, and users?
Mandatory Access Control
What *enumeration tool* is extremely useful when working with Windows NT, 2000, and Windows XP systems?
DumpSec
Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners?
HFNetChk
The *open-source* descendant of *Nessus* is called which of the following?
OpenVAS
*Windows Server 2012* introduced what protection feature to prevent *pass-the-hash attacks*?
Authentication Silos
What type of malicious code could be installed in a system's flash memory to allow an attacker to access the system at a later date?
BIOS-based rootkit
For a Windows computer to be able to access a *nix resource, which of the following must be enabled on both systems?
CIFS
Which standardized remote file system protocol replaced SMB in Windows 2000 Server and later?
Common Internet File System
Which of the following is an excellent *GUI tool for managing Windows OSs* and is capable of displaying graphical representations of several areas?
Hyena
What does the "NBT" part of "NBTscan" stand for?
NetBIOS over TCP/IP