Apply: Module 8 Reviewing the Basics Quiz
Which ports should be filtered out to protect a network from SMB attacks?
137 to 139 and 445
Which of the following is the most efficient way to determine which OS a company is using?
Call the company and ask.
Which organization offers free benchmark tools for Windows and Linux?
Center for Internet Security
What protocol replaced SMB in Windows 2000 Server and later?
Common Internet File System (CIFS)
Employees should be able to install programs on their company computers as long as the programs aren't copyrighted. True or False?
False
For a Windows computer to be able to access a *nix resource, CIFS must be enabled on at least one of the systems. True or False?
False
Linux antivirus software can't detect backdoor Trojans. True or False?
False
Which of the following is an OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users?
Mandatory Access Control
Which of the following programs includes several buffer overflow exploit plug-ins?
Metasploit
Windows OSs are vulnerable to the Conficker worm because of which of the following?
RPC vulnerability
Which of the following are more difficult to detect today because programmers develop them to make legitimate calls on outbound ports that an IDS or firewall wouldn't detect?
Trojan programs
In Windows Server 2016, the administrator must enable IIS manually to use it. True or False?
True
SMB2 was released with which version of Windows?
Windows Vista
Which program can detect rootkits on *nix systems?
chkrootkit
Which of the following commands would you enter from the directory you want to analyze to display any alternate data streams?
dir /r
An interprocess communication mechanism that allows a program running on one host to run code on a remote host is known as which of the following?
remote procedure call (RPC)