SPC 2484: Quiz 5-8
Which of the following logical operators in the C programming language is evaluated as true if both sides of the operator are true
&&
In the C programming language, which variable type holds the value of a single letter?
Char
Which Windows 10 features uses virtualization to protect access tokens from theft by attackers
Credential Guard
What enumeration tool is extremely useful when working with Windows NT, 2000, and Windows XP systems?
DumpSec
All of the enumeration techniques that work with older Windows OSs still work with Windows Server 2012
FALSE
Samba is a proprietary implementation of CIFS
FALSE
Windows 10, Windows 8, Windows Server 2016, and Windows Server 2012 have most services and features enabled by default.
FALSE
When a TCP 3-way handshake ends, both parties send what type of packet to end the connection?
FIN
An open port allows access to specific applications and cannot be vulnerable to attack
False
What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafter or otherwise modified IP-Packets into a network
Hping
To determine whether a system could be vulnerable to an RPC-related issue, which of the following tools can be used
MBSA
What command is a powerful enumeration tool included with Windows
Nbtstat
What protocol does NetBIOS use to access a network resource
NetBEUI
The computer names you assign to Windows systems are called
NetBIOS
What does "NBT" part of "NBTscan" stand for?
NetBIOS over TCP/IP
NetBIOS over TCP/IP is called which of the following in Windows Server 2003?
NetBT
In a normal TCP session, the sender sends a packet to another computer with which of the following flag sets
SYN flag (Synchronize)
What upper-level service is required to utilize file and printer sharing in Windows?
Server Message Block
Most programming languages have a way to branch, loop, and test
TRUE
NBTscan is a utility that can be used for enumerating Windows OSs.
TRUE
Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs
TRUE
The MSBA tool can quickly identify missing patches and misconfigurations.
TRUE
Attackers typically use ACK scans to get past a firewall or other filtering devices
True
Bugs are worse than syntax errors because a program can run successfully with a bug, but the output might be incorrect or inconsistent
True
NTFS was implemented to replace FAT16 and FAT32 because of the difficulty in incorporating security in these file systems.
True
Port Scanning is a method of finding out which services a host computer offers
True
Which of the following is a Window's client/server technology designed to manage patching and updating systems software from the network?
WSUS
What type of port scan has the FIN, PSH, and URG flags set?
XMAS scan
Which of the following special characters is used with the printf() function in the C programming language to indicate a new line
\n
You can use the syntax /* and */ to accomplish what function when working with large portions of text?
comment
What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access
domain controllers
When security professionals create a packet, they may choose to specifically set which of the following fields to help initiate a response from a target computer
flag
In the C programming language, which statement tells the complier to keep doing what is in the brackets over and over and over
for(;;)
In HTML, each tag has a matching closing tag that is written with which of the following characters
forward slash (/)
Which of the following is a mini-program within a main program that carries out a task
function
In a Perl program, to go from one function to another, you simply call the function by entering which of the following in your source code
name
What type of unauthenticated connection is considered to be a significant vulnerability of NetBIOS
null session
To verify if all the IP addresses of a network are being used by computers that are up and running, you can use a port scanner to preform what procedure on a range of IP addresses
ping
Some attackers want to be hidden from network devices of IDS that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect
stealth
Red Hat and Fedora Linux use what command to update and manage their RPM packages?
yum