SPC 2484: Quiz 5-8

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following logical operators in the C programming language is evaluated as true if both sides of the operator are true

&&

In the C programming language, which variable type holds the value of a single letter?

Char

Which Windows 10 features uses virtualization to protect access tokens from theft by attackers

Credential Guard

What enumeration tool is extremely useful when working with Windows NT, 2000, and Windows XP systems?

DumpSec

All of the enumeration techniques that work with older Windows OSs still work with Windows Server 2012

FALSE

Samba is a proprietary implementation of CIFS

FALSE

Windows 10, Windows 8, Windows Server 2016, and Windows Server 2012 have most services and features enabled by default.

FALSE

When a TCP 3-way handshake ends, both parties send what type of packet to end the connection?

FIN

An open port allows access to specific applications and cannot be vulnerable to attack

False

What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafter or otherwise modified IP-Packets into a network

Hping

To determine whether a system could be vulnerable to an RPC-related issue, which of the following tools can be used

MBSA

What command is a powerful enumeration tool included with Windows

Nbtstat

What protocol does NetBIOS use to access a network resource

NetBEUI

The computer names you assign to Windows systems are called

NetBIOS

What does "NBT" part of "NBTscan" stand for?

NetBIOS over TCP/IP

NetBIOS over TCP/IP is called which of the following in Windows Server 2003?

NetBT

In a normal TCP session, the sender sends a packet to another computer with which of the following flag sets

SYN flag (Synchronize)

What upper-level service is required to utilize file and printer sharing in Windows?

Server Message Block

Most programming languages have a way to branch, loop, and test

TRUE

NBTscan is a utility that can be used for enumerating Windows OSs.

TRUE

Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs

TRUE

The MSBA tool can quickly identify missing patches and misconfigurations.

TRUE

Attackers typically use ACK scans to get past a firewall or other filtering devices

True

Bugs are worse than syntax errors because a program can run successfully with a bug, but the output might be incorrect or inconsistent

True

NTFS was implemented to replace FAT16 and FAT32 because of the difficulty in incorporating security in these file systems.

True

Port Scanning is a method of finding out which services a host computer offers

True

Which of the following is a Window's client/server technology designed to manage patching and updating systems software from the network?

WSUS

What type of port scan has the FIN, PSH, and URG flags set?

XMAS scan

Which of the following special characters is used with the printf() function in the C programming language to indicate a new line

\n

You can use the syntax /* and */ to accomplish what function when working with large portions of text?

comment

What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access

domain controllers

When security professionals create a packet, they may choose to specifically set which of the following fields to help initiate a response from a target computer

flag

In the C programming language, which statement tells the complier to keep doing what is in the brackets over and over and over

for(;;)

In HTML, each tag has a matching closing tag that is written with which of the following characters

forward slash (/)

Which of the following is a mini-program within a main program that carries out a task

function

In a Perl program, to go from one function to another, you simply call the function by entering which of the following in your source code

name

What type of unauthenticated connection is considered to be a significant vulnerability of NetBIOS

null session

To verify if all the IP addresses of a network are being used by computers that are up and running, you can use a port scanner to preform what procedure on a range of IP addresses

ping

Some attackers want to be hidden from network devices of IDS that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect

stealth

Red Hat and Fedora Linux use what command to update and manage their RPM packages?

yum


Set pelajaran terkait

Quiz 1: Chapters 1 - 3 Nutrition

View Set

Question 9: Walter Benjamin and loss of authenticity

View Set

Social Psych chapter 11 - stereotyping prejudice and discrimination

View Set