Network DEFENSE and CNTRMEAS Exam2 ch5-7

Ace your homework & exams now with Quizwiz!

In the Perl programming language, variables begin with which of the following characters?

$

In the C programming language, which statement tells the compiler to keep doing what is in the brackets over and over and over?

(;;)

Which of the following special characters is used with the printf() function in the C programming language to indicate a new line?

(not/t)

Which of the following mathematical operators in the C programming language increments the unary value by 1?

+ +

The print command for Perl is almost identical to the print command used in which of the following programming languages?

C

Which vi command deletes the current line?

Dd

What type of Windows Server is the most likely server to be targeted by a computer hacker?

Domain Controller

A NetBIOS name does not need to be unique on a network. True or False

False

You must always add "//" at the end of comment text when using C language. true or flase

False

What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafted or otherwise modified IP-packets into a network?

Hping

Which of the following commands is a powerful enumeration tool included with Windows?

Nbtstat

The computer names you assign to Windows systems are called which of the following?

NetBios

What open source port-scanning tool is considered to be the standard port-scanning tool for security professionals?

Nmap

In a normal TCP session, the sender sends a packet to another computer with which of the following flags set? !?!?!?!?!?!?

Not SYN/ACK flag

The open-source descendant of Nessus is called which of the following?

OpenVAS

What open-source network utility allows you to use plug-ins to run test programs (scripts) that can be selected from the client interface?

OpenVAS

Which on of the following is an older network management service that is useful for network administrators that want to view system statistics, version numbers, and other detailed host information remotely?

SNMP

What feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, preventing rootkits?

SecureBoot

In the Perl programming language, which of the following keywords is used in front of function names?

Sub

In an ACK scan, if the attacked port returns an RST packet the attacked port is considered to be operating in what state?

Unfiltered

What type of port scan has the FIN, PSH, and URG flags set?

Xmas scan

In any *NIX system, after saving a script named "script_name," you need to make it executable so that you can run it. Which command will accomplish this task from the command line?

chmod +x script_name

You can use the syntax /* and */ to accomplish what function when working with large portions of text?

comment

SNMPWalk is a tool useful in enumerating hosts running SNMP with what type of configuration?

default

What process allows a security professional to extract valuable information, such as information about users and recent login times from a network?

enumeration

All of the enumeration techniques that work with older Windows OSs still work with Windows Server 2012. true or false

false

An open port allows access to specific applications and cannot be vulnerable to attack. true or false

false

To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used?

footprinting

In object-oriented programming, a function contained in a class is called which of the following?

member function

When using a port-scanner, what procedure can be conducted to identify which IP addresses belong to active hosts?

ping sweep

Which of the following is a backdoor initiated from inside the target's network that makes it possible to take control of the target even when it's behind a firewall?

reverse shell

What security feature was extended to the OS to alert the user when an application is launched on a Windows 8.1 computer?

smart screen

Attackers typically use ACK scans to get past a firewall or other filtering devices. True or false

true

In the Perl programming language, comment lines begin with the which of the following character(s)?

#

UNIX was first written in assembly language. However, it was soon rewritten in what programming language?

C

Which Windows 10 feature uses virtualization to protect access tokens from theft by attackers?

Credential Guard

Bugs are worse than syntax errors because a program can run successfully with a bug, but the output might be incorrect or inconsistent. true or false

True

If you want to know what the Perl print command does, you can use which of the following commands?

perldoc -f print

Most programming languages have a way to branch, loop, and test. true or false

true

You can search for vulnerabilities in a host computer by using a port-scanning tool. true or false

true

When writing a script which statement allows you to avoid creating an endless loop in your script?

while

When a TCP three-way handshake ends, both parties send what type of packet to end the connection?

FIN

What upper-level service is required to utilize file and printer sharing in Windows?

Server message block

Which statement is where the script performs its main task?

do

If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?

limit their scan speeds

Which of the following is the act of performing a task over and over?

looping

In a Perl program, to go from one function to another, you simply call the function by entering which of the following in your source code?

name

What feature implemented in Windows Server 2016 allows for application isolation to protect applications from one another?

not Windows VM

When using the text editor vim what command appends text after the insertion point? ?!?!?!?!?!?

not X

What type of unauthenticated connection is considered to be a significant vulnerability of NetBIOS systems?

null session

One of the limitations when using "ping sweeps" is that many network administrators configure nodes not to respond to ICMP Echo Requests. What type of ICMP Echo message is being disabled by these administrators?

reply

Which of the following describes a text file containing multiple commands that would usually be entered manually at the command prompt?

script

NBTscan is a utility that can be used for enumerating Windows OSs. true or false

true

The latest version of Nessus Server and Client can run on Windows, Mac OS X, FreeBSD, and most Linux distributions. True or false

true


Related study sets

AP Gov UNIT 4 and 5 College Board

View Set

Nursing Concepts Behaviors/Addiction Part 3

View Set

Econ 101: Unit Quizzes & Lab Unit 6 Questions (In class True/False Quizzes)

View Set

Personal Auto Policy Uninsured Motorists (PAP) Part C

View Set

Chapter 2 International Supply Chain Management

View Set