Deck 8: Desktop and Server Os Vulnerabilities

ملء الشاشة (f)
exit full mode
سؤال
What critical component of any OS,that can be can be vulnerable to attacks,is used to store and manage information?

A) SQL database
B) file system
C) WSUS
D) NetBIOS
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Windows Software Update Services (WSUS)is designed to manage patching and updating system software from the network.
سؤال
Which standardized remote file system protocol replaced SMB in Windows 2000 Server and later?

A) Common Internet File System
B) Microsoft Knowledge System
C) Windows Help File
D) Windows On-line File System
سؤال
SMB is used to share files and usually runs on top of NetBIOS,NetBEUI,or which of the following?

A) Winsock
B) CIFS
C) TCP/IP
D) IPX/SPX
سؤال
Which of the following Window's utilities includes a suite of tools to help administrators deploy and manage servers and even allows for administrators to control mobile devices running Android,iOS,and Windows Mobile OS?

A) AUS
B) WSUS
C) SCCM
D) SMS
سؤال
Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners?

A) MDAC
B) HFNetChk
C) MSXML
D) Mbsacli
سؤال
Red Hat and Fedora Linux use what command to update and manage their RPM packages?

A) yum
B) get
C) dir
D) apt-get
سؤال
Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs.
سؤال
To determine whether a system could be vulnerable to an RPC-related issue,which of the following tools can be used?

A) Nessus
B) WSUS
C) MBSA
D) Unicornscan
سؤال
Which of the following is an interprocess communication mechanism that allows a program running on one host to run code on a remote host?

A) RPC
B) NetBIOS
C) Winsock
D) NetBEUI
سؤال
Windows 10,Windows 8,Windows Server 2016,and Windows Server 2012 have most services and features enabled by default.
سؤال
Which of the following is a Window's client/server technology designed to manage patching and updating systems software from the network?

A) AUS
B) WSUS
C) Automatic Update
D) Patch Management Server
سؤال
The MSBA tool can quickly identify missing patches and misconfigurations.
سؤال
Which of the following is an open-source implementation of CIFS?

A) Samba
B) GNUCIF
C) GCIF
D) OpenCIFS
سؤال
NetBios is not available in Windows Vista,Server 2008,and later versions of Windows.However,NetBios should be understood by a security professional because it is used for which of the following?

A) backward compatibility
B) Windows upgrades
C) virus scanning
D) RPC
سؤال
What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?

A) SMB controllers
B) domain controllers
C) CIFS servers
D) file servers
سؤال
Early Windows OSs used which of the following programs loaded into memory to interact with a network resource or device?

A) Microsoft RPC
B) IPX/SPX
C) Winsock
D) NetBIOS
سؤال
NetBIOS over TCP/IP is called which of the following in Windows Server 2003?

A) NBT
B) NetBEUI
C) NetBT
D) NetTCP/IP
سؤال
Samba is a proprietary implementation of CIFS.
سؤال
Which of the following protocols does NetBios use to access a network resource?

A) TCP/IP
B) NBT
C) NetBT
D) NetBEUI
سؤال
Which of the following is a common Linux rootkit?

A) Back Orifice
B) Kill Trojans
C) Packet Storm Security
D) Linux Rootkit 5
سؤال
In Windows Server 2003 and 2008,how does a domain controller locate resources in a domain?
سؤال
What is Server Message Block (SMB)used for in Windows and can a hacker still damage a network using SMB?
سؤال
Which of the following is considered to be the most critical SQL vulnerability?

A) null SA hash
B) null SA password
C) SQL password
D) SQL scanning
سؤال
What is the Common Internet File System (CIFS)protocol?
سؤال
What should a password policy include?
سؤال
What is the current file system that Windows utilizes that has strong security features?

A) FAT
B) ADS
C) FAT32
D) NTFS
سؤال
What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT)file system?

A) no ACL support
B) no SUS support
C) no SMTP support
D) no Linux support
سؤال
What programming languages are vulnerable to buffer overflow attacks?

A) C and Python
B) C and C++
C) Assembly and C++
D) Perl and Python
سؤال
Ubuntu and Debian Linux use what command to update and manage their RPM packages?

A) yum
B) get
C) dir
D) apt-get
سؤال
Why should a systems administrator disable unused services and filtering ports?
سؤال
When using the Common Internet File System (CIFS),which security model will require network users to have a user name and password to access a specific resource?

A) NT level security
B) Share-level security
C) User-level security
D) CIF level security
سؤال
For a Windows computer to be able to access a *nix resource,which of the following must be enabled on both systems?

A) NetBIOS
B) SMB
C) CIFS
D) NetBEUI
سؤال
What functions do most Trojan programs perform?
سؤال
What is Samba used for?
سؤال
What is the purpose of a file system?
سؤال
Why should you review logs regularly,and how should you manage this task?
سؤال
Why is NetBIOS still used in Windows Operating Systems?
سؤال
Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes,files,and users?

A) Mandatory Access Control
B) SE Access Control
C) Access Control
D) Mandatory Control
سؤال
When using the Common Internet File System (CIFS),which security model does not require a password to be set for the file share?

A) NT level security
B) Share-level security
C) User-level security
D) CIF level security
سؤال
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
A standardized protocol that replaced SMB in Windows 2000 Server and later
سؤال
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
In 2007 became Windows new standard to deploy and manage servers alongside updated patch-management functionality
سؤال
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
Microsoft's standard for managing Windows security patches on multiple computers in a network between 1994 and 2005
سؤال
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
An open-source implementation of CIFS
سؤال
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
An interprocess communication mechanism that allows a program running on one host to run code on a remote host
سؤال
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
A Windows client/server technology introduced in 2005 used to manage patching and updating system software from the network
سؤال
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
Used to share files and usually runs on top of NetBIOS,NetBEUI,or TCP/IP
سؤال
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
An OS security mechanism that enforces access rules based on privileges for interactions between processes,files,and users
سؤال
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
Amount of code a computer system exposes to unauthenticated outsiders
سؤال
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
A fast and efficient protocol that requires little configuration and allows transmitting NetBIOS packets over TCP/IP
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Desktop and Server Os Vulnerabilities
1
What critical component of any OS,that can be can be vulnerable to attacks,is used to store and manage information?

A) SQL database
B) file system
C) WSUS
D) NetBIOS
B
2
Windows Software Update Services (WSUS)is designed to manage patching and updating system software from the network.
True
3
Which standardized remote file system protocol replaced SMB in Windows 2000 Server and later?

A) Common Internet File System
B) Microsoft Knowledge System
C) Windows Help File
D) Windows On-line File System
A
4
SMB is used to share files and usually runs on top of NetBIOS,NetBEUI,or which of the following?

A) Winsock
B) CIFS
C) TCP/IP
D) IPX/SPX
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following Window's utilities includes a suite of tools to help administrators deploy and manage servers and even allows for administrators to control mobile devices running Android,iOS,and Windows Mobile OS?

A) AUS
B) WSUS
C) SCCM
D) SMS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Microsoft Baseline Security Analyzer has its origins in which of the following command line scanners?

A) MDAC
B) HFNetChk
C) MSXML
D) Mbsacli
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Red Hat and Fedora Linux use what command to update and manage their RPM packages?

A) yum
B) get
C) dir
D) apt-get
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
To determine whether a system could be vulnerable to an RPC-related issue,which of the following tools can be used?

A) Nessus
B) WSUS
C) MBSA
D) Unicornscan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is an interprocess communication mechanism that allows a program running on one host to run code on a remote host?

A) RPC
B) NetBIOS
C) Winsock
D) NetBEUI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Windows 10,Windows 8,Windows Server 2016,and Windows Server 2012 have most services and features enabled by default.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is a Window's client/server technology designed to manage patching and updating systems software from the network?

A) AUS
B) WSUS
C) Automatic Update
D) Patch Management Server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
The MSBA tool can quickly identify missing patches and misconfigurations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is an open-source implementation of CIFS?

A) Samba
B) GNUCIF
C) GCIF
D) OpenCIFS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
NetBios is not available in Windows Vista,Server 2008,and later versions of Windows.However,NetBios should be understood by a security professional because it is used for which of the following?

A) backward compatibility
B) Windows upgrades
C) virus scanning
D) RPC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access?

A) SMB controllers
B) domain controllers
C) CIFS servers
D) file servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Early Windows OSs used which of the following programs loaded into memory to interact with a network resource or device?

A) Microsoft RPC
B) IPX/SPX
C) Winsock
D) NetBIOS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
NetBIOS over TCP/IP is called which of the following in Windows Server 2003?

A) NBT
B) NetBEUI
C) NetBT
D) NetTCP/IP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Samba is a proprietary implementation of CIFS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following protocols does NetBios use to access a network resource?

A) TCP/IP
B) NBT
C) NetBT
D) NetBEUI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following is a common Linux rootkit?

A) Back Orifice
B) Kill Trojans
C) Packet Storm Security
D) Linux Rootkit 5
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
In Windows Server 2003 and 2008,how does a domain controller locate resources in a domain?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
What is Server Message Block (SMB)used for in Windows and can a hacker still damage a network using SMB?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following is considered to be the most critical SQL vulnerability?

A) null SA hash
B) null SA password
C) SQL password
D) SQL scanning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
What is the Common Internet File System (CIFS)protocol?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
What should a password policy include?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
What is the current file system that Windows utilizes that has strong security features?

A) FAT
B) ADS
C) FAT32
D) NTFS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
What is the most serious shortcoming of Microsoft's original File Allocation Table (FAT)file system?

A) no ACL support
B) no SUS support
C) no SMTP support
D) no Linux support
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
What programming languages are vulnerable to buffer overflow attacks?

A) C and Python
B) C and C++
C) Assembly and C++
D) Perl and Python
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Ubuntu and Debian Linux use what command to update and manage their RPM packages?

A) yum
B) get
C) dir
D) apt-get
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Why should a systems administrator disable unused services and filtering ports?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
When using the Common Internet File System (CIFS),which security model will require network users to have a user name and password to access a specific resource?

A) NT level security
B) Share-level security
C) User-level security
D) CIF level security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
For a Windows computer to be able to access a *nix resource,which of the following must be enabled on both systems?

A) NetBIOS
B) SMB
C) CIFS
D) NetBEUI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
What functions do most Trojan programs perform?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
What is Samba used for?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
What is the purpose of a file system?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Why should you review logs regularly,and how should you manage this task?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Why is NetBIOS still used in Windows Operating Systems?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following is an SELinux OS security mechanism that enforces access rules based on privileges for interactions between processes,files,and users?

A) Mandatory Access Control
B) SE Access Control
C) Access Control
D) Mandatory Control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
When using the Common Internet File System (CIFS),which security model does not require a password to be set for the file share?

A) NT level security
B) Share-level security
C) User-level security
D) CIF level security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
A standardized protocol that replaced SMB in Windows 2000 Server and later
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
In 2007 became Windows new standard to deploy and manage servers alongside updated patch-management functionality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
Microsoft's standard for managing Windows security patches on multiple computers in a network between 1994 and 2005
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
An open-source implementation of CIFS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
An interprocess communication mechanism that allows a program running on one host to run code on a remote host
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
A Windows client/server technology introduced in 2005 used to manage patching and updating system software from the network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
Used to share files and usually runs on top of NetBIOS,NetBEUI,or TCP/IP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
An OS security mechanism that enforces access rules based on privileges for interactions between processes,files,and users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
Amount of code a computer system exposes to unauthenticated outsiders
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Match each item with a statement below.a.attack surface
b.Windows Software Update Services
c.Systems Management Server
d.Server Message Block
e.NetBEUI
f.Mandatory Access Control
g.Common Internet File System
h.System Center Configuration Manager
i.Remote Procedure Call
j.Samba
A fast and efficient protocol that requires little configuration and allows transmitting NetBIOS packets over TCP/IP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.