Network Defense Chapter 8

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

False

Samba is a proprietary implementation of CIFS. True False

True

The MSBA tool can quickly identify missing patches and misconfigurations. True False

Share-level security

When using the Common Internet File System (CIFS), which security model *does not require a password to be set for the file share*? User-level security NT level security Share-level security CIF level security

User-level security

When using the Common Internet File System (CIFS), which security model will *require network users to have a user name and password to access a specific resource*? Share-level security NT level security User-level security CIF level security

SCCM

Which of the following Window's utilities includes a suite of tools to help administrators deploy and manage servers and even allows for administrators to control mobile devices running Android, iOS, and Windows Mobile OS? SCCM AUS WSUS SMS

Mandatory Access Control

Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users? SE Access Control Mandatory Access Control Mandatory Control Access Control

Samba

Which of the following is an open-source implementation of CIFS? Samba GCIF OpenCIFS GNUCIF

NTFS

What is the current file system that Windows utilizes that has strong security features? ADS NTFS FAT FAT32

NetBEUI

Which of the following protocols does NetBios use to access a network resource? NBT NetBEUI NetBT TCP/IP

True

Windows Software Update Services (WSUS) is designed to manage patching and updating system software from the network. True False

CIFS

For a Windows computer to be able to access a *nix resource, which of the following must be enabled on both systems? NetBEUI SMB NetBIOS CIFS

HFNetChk

Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners? MDAC MSXML HFNetChk Mbsacli

yum

Red Hat and Fedora Linux use what command to update and manage their RPM packages? dir yum apt-get get

TCP/IP

SMB is used to share files and usually runs on top of NetBIOS, NetBEUI, or which of the following? TCP/IP IPX/SPX Winsock CIFS

WSUS

Which of the following is a Window's client/server technology designed to manage patching and updating systems software from the network? WSUS AUS Automatic Update Patch Management Server

Linux Rootkit 5

Which of the following is a common Linux rootkit? Back Orifice Kill Trojans Packet Storm Security Linux Rootkit 5

Common Internet File System

Which standardized remote file system protocol replaced SMB in Windows 2000 Server and later? Windows On-line File System Common Internet File System Microsoft Knowledge System Windows Help File

NetBIOS

Early Windows OSs used which of the following programs loaded into memory to interact with a network resource or device? Microsoft RPC NetBIOS Winsock IPX/SPX

backward compatibility

NetBios is not available in Windows Vista, Server 2008, and later versions of Windows. However, NetBios should be understood by a security professional because it is used for which of the following? virus scanning backward compatibility Windows upgrades RPC

True

Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs. True False

False

Windows 10, Windows 8, Windows Server 2016, and Windows Server 2012 have most services and features enabled by default. True False

NetBT

NetBIOS over TCP/IP is called which of the following in Windows Server 2003? NetBEUI NetBT NetTCP/IP NBT

MBSA

To determine whether a system could be vulnerable to an RPC-related issue, which of the following tools can be used? MBSA Unicornscan WSUS Nessus

apt-get

Ubuntu and Debian Linux use what command to update and manage their RPM packages? get yum dir apt-get

file system

What critical component of any OS, that can be can be vulnerable to attacks, is used to store and manage information? file system WSUS NetBIOS SQL database

no ACL support

What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT) file system? no ACL support no SMTP support no SUS support no Linux support

C and C++

What programming languages are vulnerable to buffer overflow attacks? C and Python C and C++ Assembly and C++ Perl and Python

domain controllers

What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access? domain controllers SMB controllers file servers CIFS servers

RPC

Which of the following is an interprocess communication mechanism that allows a program running on one host to run code on a remote host? Winsock NetBIOS RPC NetBEUI

null SA password

Which of the following is considered to be the most critical SQL vulnerability? SQL password null SA hash null SA password SQL scanning


संबंधित स्टडी सेट्स

citi training and belmont report

View Set

Oxford Placement Test 2 Grammar Part 2

View Set