Ethical Hacking 8,9,11,13

Ace your homework & exams now with Quizwiz!

Ad-hoc network

A WLAN that doesn't rely on an AP for connectivity; instead, independent stations connect to each other in a decentralized fashion.

Windows software update service

A Windows client/server technology introduced in 2005 used to manage patching and updating system software from the network.

Trusted platform module

A cryptographic firmware boot-check processor installed on many new computer systems.

NetBEUI

A fast and efficient protocol that requires little configuration and allows transmitting NetBIOS packets over TCP/IP.

Access point

A radio transceiver that connects to a network via an Ethernet cable and bridges a wireless LAN (WLAN) with a wired network.

Common internet file system

A remote file system protocol that enables computers to share network resources over the Internet. It replaced SMB in Windows 2000 Server and later.

Embedded operating system

A small program developed specifically for use with embedded systems.

RTOS (real time operating system)

A specialized embedded OS used in devices such as programmable thermostats, appliance controls, and even spacecraft.

802.1x

A standard that addresses the issue of authentication.

Narrowband

A technology that uses microwave radio band frequencies to transmit data. The most common uses of this technology are cordless phones and garage door openers.

User mode

Administrator can perform basic troubleshooting tests and list information stored on the router.

Privileged mode

Administrator can perform full router configuration tasks.

Attack surface

Amount of code a computer system exposes to unauthenticated outsiders.

Wired equivalent privacy

An 802.11b standard developed to encrypt data traversing a wireless network. Gave many users a false sense of security that data traversing the WLAN was protected.

RTLinux

An OS microkernel extension developed for Linux.

Mandatory access control

An OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users.

Multiple independent levels of security

An embedded OS certified to run multiple levels of classification on the same CPU without leakage between levels.

Extensible authentication protocol

An enhancement to PPP, that was designed to allow a company to select its authentication method.

Microsoft baseline security analyzer

An excellent tool for determining whether a system is vulnerable because of an RPC-related issue. Can quickly identify missing patches and misconfigurations.

Remote procedure call

An interprocess communication mechanism that allows a program running on one host to run code on a remote host.

RTEMS

An open-source embedded OS used in space systems because it supports processors designed specifically to operate in space.

Samba

An open-source implementation of CIFS.

Embedded system

Any computer system that is not a general-purpose PC or server.

False

CSMA/CD (carrier sense multiple access/collision detection) is implemented at the data link layer on wireless networks.

Frequency hopping spread spectrum

Data hops to other frequencies to avoid interference that might occur over a frequency band.

Spread spectrum

Data is spread across a large-frequency bandwidth instead of traveling across just one frequency band.

Direct sequence spread spectrum

Data packets are spread simultaneously over multiple frequencies instead of hopping to other frequencies.

Modulation

Defines how data is placed on a carrier signal.

Multifunction devices

Devices on an organization's network performing more than one function, such as printers, scanners, and copiers.

Stateless packet filter

Handle each packet separately and are not resistant to spoofing or DoS attacks.

Active system

IDS systems log events and send alerts, but they can also interoperate with routers and firewalls to stop an attack.

Passive systems

IDS systems that don't take any action to stop or prevent an activity.

System center configuration

In 2007 became Windows new standard to deploy and manage servers alongside updated patch-management functionality.

Indicators of compromise

Indicates that a system or network has been hacked.

Application aware firewall

Inspects network traffic at a higher level in the OSI model than a traditional stateful packet inspection.

Network address translation

Internal private IP addresses are mapped to public external IP addresses hiding the internal infrastructure.

True

It is possible to have a wireless network that does not connect to a wired network.

Systems management server

Microsoft's standard for managing Windows security patches on multiple computers in a network between 1994 and 2005.

Stateful packet filter

Records session-specific information about a network connection, including the ports a client uses.

Demilitarized zone

Small network containing resources that a company wants to make available to Internet users and helps maintain security.

Firmware

Software residing on a chip.

SCADA (Supervisory control and data acquisition)

Systems used for equipment monitoring in large industries, such as public works and utilities, power generators and dams.

Infrared

Technology is restricted to a single room or line of sight because this light spectrum cannot penetrate walls.

SSID

The name used to identify a WLAN.

True

There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people located in the facility.

Wireless network interface cards

Transmit and receive wireless signals, and access points (APs), which are the bridge between wired and wireless networks.

apt-get

Ubuntu and Debian Linux use what command to update and manage their RPM packages?

Server message block

Used to share files and usually runs on top of NetBIOS, NetBEUI, or TCP/IP.

Samba

What is a proprietary implementation of CIFS?

New technology file system

What is the current file system that Windows utilizes that has strong security features?

No ACL support

What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT) file system?

Windows 10, Windows 8, Windows Server 2016, and Windows Server 2012

Which Windows OS have most services and features enabled by default?

Linux Rootkit 5

Which of the following is a common Linux rootkit?


Related study sets

Biology Test 1-MCC-STUDY FOR FINAL

View Set

CH 1 : Small Groups as the Heart of Society

View Set

Nursing Application: Antivirals: Non-HIV

View Set

Wound Care Pass Point + Oxygenation

View Set

English 9 | Module 1 | Lesson 10: Quiz "Author's Viewpoint and Purpose"

View Set

AOA Foundations for Living Unit 4

View Set

Illinois Accident and Health Producer General Exam SIMULATOR

View Set