Ethical Hacking Test 4

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following mathematical operators in the C programming language increments the unary value by 1?

++

T or F. You must always add "//" at the end of comment text when using C language.

False

Early Windows OSs used which of the following programs loaded into memory to interact with a network resource or device?

NetBIOS

In the Perl programming language, comment lines begin with the which of the following character(s)"?

#

Which of the following statements in the C programming language is used to load libraries that hold the commands and functions used in your program?

#include

Which of the following takes you from one area of a program (a function) to another area?

Branching

The print command for Perl is almost identical to the print command used in which of the following programming languages?

C

In the C programming language, which variable type holds the value of a single letter?

Char

In the Perl programming language, variables begin with which of the following characters?

$

Which of the following logical operators in the C programming language is evaluated as true if both sides of the operator are true?

&&

To determine whether a system could be vulnerable to an RPC-related issue, which of the following tools can be used?

MBSA

When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?

Share-level security

Red Hat and Fedora Linux use what command to update and manage their RPM packages?

Yum

Ubuntu and Debian Linux use what command to update and manage their RPM packages?

apt-get

In the C programming language, which of the following show where a block of code begins and ends?

Braces

In object-oriented programming, which of the following are structures that hold pieces of data and functions?

Classless

If you want to know what the Perl print command does, you can use which of the following commands?

Perldoc -f print

What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT) file system?

no ACL support

Which of the following is considered to be the most critical SQL vulnerability?

null SA password

T or F. Most programming languages have a way to branch, loop, and test.

False

Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners?

HFNetChk

Which of the following is a common Linux rootkit?

Linux Rootkit 5

Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users?

Mandatory Access Control

What is the current file system that Windows utilizes that has strong security features?

NTFS

In a Perl program, to go from one function to another, you simply call the function by entering which of the following in your source code?

Name

Which of the following protocols does NetBios use to access a network resource?

NetBEUI

NetBIOS over TCP/IP is called which of the following in Windows Server 2003?

NetBT

Which of the following Window's utilities includes a suite of tools to help administrators deploy and manage servers and even allows for administrators to control mobile devices running Android, iOS, and Windows Mobile OS?

SCCM

Which of the following is an open-source implementation of CIFS?

Samba

When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password to access a specific resource?

User-Level Security

Which of the following is a Window's client/server technology designed to manage patching and updating systems software from the network?

WSUS

What critical component of any OS, that can be can be vulnerable to attacks, is used to store and manage information?

file system

You can use the syntax /* and */ to accomplish what function when working with large portions of text?

comment

NetBios is not available in Windows Vista, Server 2008, and later versions of Windows. However, NetBios should be understood by a security professional because it is used for which of the following?

Backward Compatability

In the C programming language, which statement tells the compiler to keep doing what is in the brackets over and over and over?

For(;;)

In HTML, each tag has a matching closing tag that is written with which of the following characters?

Forward slash (/)

Which of the following is a mini-program within a main program that carries out a task?

Function

Which of the following is a markup language rather than a programming language?

HTML

In object-oriented programming, a function contained in a class is called which of the following?

Member Function

T or F. The MSBA tool can quickly identify missing patches and misconfigurations.

True

Which of the following special characters is used with the printf() function in the C programming language to indicate a new line?

/n

Carelessly reviewing your program's code might result in having which of the following in your program code?

Bug

UNIX was first written in assembly language. However, it was soon rewritten in what programming language?

C

What programming languages are vulnerable to buffer overflow attacks?

C and C++

T or F. Windows 10, Windows 8, Windows Server 2016, and Windows Server 2012 have most services and features enabled by default.

False

Which of the following is the act of performing a task over and over?

Looping

Which of the following is a backdoor initiated from inside the target's network that makes it possible to take control of the target even when it's behind a firewall?

Reverse Shell

In the Perl programming language, which of the following keywords is used in front of function names?

Sub

SMB is used to share files and usually runs on top of NetBIOS, NetBEUI, or which of the following?

TCP/IP

T or F. Bugs are worse than syntax errors because a program can run successfully with a bug, but the output might be incorrect or inconsistent.

True

T or F. When a compiler finds errors, it usually indicates what they are so you can correct the code and compile the program again.

True

T or F. Windows Software Update Services (WSUS) is designed to manage patching and updating system software from the network.

True

Which of the following is an interprocess communication mechanism that allows a program running on one host to run code on a remote host?

RPC

Which of the following logical operators in the C programming language is used to compare the equality of two variables?

==

T or F. Samba is a proprietary implementation of CIFS.

False

For a Windows computer to be able to access a *nix resource, which of the following must be enabled on both systems?

CIFS

Which standardized remote file system protocol replaced SMB in Windows 2000 Server and later?

Common Internet File System

What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?

Domain controllers

T or F. Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs.

True

T or F. Security professionals often need to examine Web pages and recognize when something looks suspicious.

True


संबंधित स्टडी सेट्स

Chapter 48: Assessment and Management of Patients with Obesity

View Set

Chapter 35- Musculoskeletal Function

View Set

PN 131 Comprehensive Final NCLEX Questions

View Set

Istorie 17. Prima Jumătate de Secolul XX - Războaie, Unirea Mare, Perioada Interbelică

View Set

A & P - Saladin Skeletal System Ch 8

View Set

Chapter 5: Small Businesses, Entrepreneurship, and Franchises

View Set

ATI Musculoskeletal Problems Practice Questions

View Set

Obsessive-Compulsive-Ralated Disorders

View Set

independent, dependent variables, functions, domain, and range

View Set

Marketing Analytics Exam 2 - Google Analytics Key Terms

View Set