Ethical Hacking Quiz Chapter 9
Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device? -firmware -testware -middleware -fireware
firmware
Which of the following is considered to be the most critical SQL vulnerability? -null SA hash -null SA password -SQL password -SQL scanning
null SA password
What programming languages are vulnerable to buffer overflow attacks? -C and Python -C and C++ -Assembly and C++ -Perl and Python
C and C++
What type of viruses and code has been created by security researchers and attackers that could infect phones running Google's Android, Windows Mobile, and the Apple iPhone OS? -Python -C++ -Perl -Java-based
Java-based
A device that performs more than one function, such as printing and faxing is called which of the following? -MILS -ASA -RTOS -MFD
MFD
Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users? -Mandatory Access Control -SE Access Control -Access Control -Mandatory Control
Mandatory Access Control
Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources? -host -router -driver -rootkit
Router
When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password access a specific resource? -NT level security -Share-level security -User-level security -CIF level security
User-level security
Which of the following if often found within an embedded OS that can cause a potential vulnerability to an attack? -Web server -USB port -RAM -PCB
Web server
SCADA systems controlling critical infrastructure are usually completely separated from the internet by which of the following? -firewall -air gap -router -Vlan
air gap