Deck 8: Desktop and Server Os Vulnerabilities

Full screen (f)
exit full mode
Question
NetBIOS is not a protocol; it usually works with ____, a fast, efficient protocol that requires little configuration.

A)TCP/IP
B)NBT
C)NetBT
D)NetBEUI
Use Space or
up arrow
down arrow
to flip the card.
Question
Windows Server 2003 and 2008 ____ are used to authenticate user accounts, so they contain much of the information that attackers want to access.

A)SMB controllers
B)domain controllers
C)CIFS servers
D)file servers
Question
SMB usually runs on top of NetBIOS, NetBEUI, or ____.

A)Winsock
B)CIFS
C)TCP/IP
D)IPX/SPX
Question
NetBIOS over TCP/IP is called ____ in Windows 2000 Server.

A)NBT
B)NetBEUI
C)NetBT
D)NetTCP/IP
Question
Complete instructions for MBSA are available from the MBSA Help interface or the ____ site.

A)Microsoft Security Tools Web
B)Microsoft Knowledge Base
C)Windows Help
D)Windows On-line Help
Question
____ is a client/server technology designed to manage patching and updating systems software from the network.

A)Systems Management Server (SMS)
B)Software Update Services (SUS)
C)Automatic Update
D)Patch Manager
Question
The Conficker worm took advantage of a vulnerability in ____ to run arbitrary code on susceptible hosts.

A)SQL Server
B)RPC
C)Windows Registry
D)NetBIOS
Question
The MBSA can check for missing security updates.
Question
The best way to protect a network from SMB attacks is to make sure routers filter out ports 137 to 139 and ____.

A)135
B)389
C)445
D)636
Question
Rootkits containing Trojan binary programs ready to be installed are more dangerous than typical Trojan programs.
Question
____ is an open-source implementation of CIFS.

A)Samba
B)GNUCIFS
C)GCIFS
D)OpenCIFS
Question
NetBIOS over TCP/IP is called ____ in Windows Server 2003.

A)NBT
B)NetBEUI
C)NetBT
D)NetTCP/IP
Question
To determine whether a system is vulnerable to an RPC-related issue, the best tool is ____.

A)Nessus
B)Winfingerprint
C)MBSA
D)Unicornscan
Question
Samba is as an closed-source implementation of CIFS.
Question
Red Hat and Fedora Linux use the ____ command to update and manage RPM packages.

A)yum
B)get
C)dir
D)alert
Question
____ is an interprocess communication mechanism that allows a program running on one host to run code on a remote host.

A)RPC
B)NetBIOS
C)Winsock
D)NetBEUI
Question
The MBSA can check for user account passwords that have dictionary words in them.
Question
Early Windows OSs communicated with each other by using ____.

A)Microsoft RPC
B)IPX/SPX
C)Winsock
D)NetBIOS
Question
Microsoft's Systems Management Server (SMS) can manage security patches for all computers on a network.
Question
MBSA has its origins in the ____ scanner.

A)MDAC
B)HFNetChk
C)MSXML
D)Mbsacli
Question
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
to harden Microsoft systems, you should disable this account
Question
You can use _____________________________________________ information when testing Linux computers for known vulnerabilities.
Question
Trusted Computer Solutions____ program is used to tighten Linux system security configuration by using templates.

A)OpenVAS
B)MBSA
C)SQL Server
D)Security Blanket
Question
SELinux contains several features and modules that use ____, an OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users.

A)Mandatory Access Control (MAC)
B)Server Message Block (SMB)
C)Common Internet File System (CIFS)
D)Microsoft Baseline Security Analyzer (MBSA)
Question
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
HTTP is associated with this port
Question
In Microsoft systems, an excellent resource for finding configuration errors, missing patches, and so on is the ________________________________________.
Question
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
almost useless if it isn't updated regularly
Question
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
gives an intruder a potential point of entry into a network
Question
The Trojan program called Sheepshank makes HTTP GET requests over port ____.

A)25
B)80
C)129
D)139
Question
If the LRK5 rootkit is installed on a Linux computer, entering the Trojaned ____ command allows the attacker's processes to continue running, even though the Linux administrator thinks all processes were killed.

A)Killall
B)Get
C)target
D)Dir
Question
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
DNS is associated with this port
Question
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
HTTPS is associated with this port
Question
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
LDAP is associated with this port
Question
SMB stands for _________________________.
Question
A common Linux rootkit is ____.

A)Back Orfice
B)Kill Trojans
C)Packet Storm Security
D)Linux Rootkit 5
Question
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
to harden Microsoft systems, you should rename this account
Question
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
no account should have this type of password
Question
For a Windows computer to be able to access a *nix resource, ____ must be enabled on both systems.

A)NetBIOS
B)SMB
C)CIFS
D)NetBEUI
Question
RPC stands for ________________________.
Question
To perform MBSA-style scans you can run the tool from the command line by using ____________________.exe.
Question
What functions do most Trojan programs perform?
Question
Why is NetBIOS still used sometimes?
Question
What is the purpose of a file system?
Question
What is Server Message Block (SMB) used for in Windows? Can hacking tools still damage a network using SMB?
Question
What is Samba used for?
Question
What is the Common Internet File System (CIFS) protocol?
Question
What should a password policy include?
Question
What can a security tester using enumeration tools do?
Question
In Windows Server 2003 and 2008, how does a domain controller locate resources in a domain?
Question
Why should you review logs regularly? How should you accomplish this task?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Desktop and Server Os Vulnerabilities
1
NetBIOS is not a protocol; it usually works with ____, a fast, efficient protocol that requires little configuration.

A)TCP/IP
B)NBT
C)NetBT
D)NetBEUI
D
2
Windows Server 2003 and 2008 ____ are used to authenticate user accounts, so they contain much of the information that attackers want to access.

A)SMB controllers
B)domain controllers
C)CIFS servers
D)file servers
B
3
SMB usually runs on top of NetBIOS, NetBEUI, or ____.

A)Winsock
B)CIFS
C)TCP/IP
D)IPX/SPX
C
4
NetBIOS over TCP/IP is called ____ in Windows 2000 Server.

A)NBT
B)NetBEUI
C)NetBT
D)NetTCP/IP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Complete instructions for MBSA are available from the MBSA Help interface or the ____ site.

A)Microsoft Security Tools Web
B)Microsoft Knowledge Base
C)Windows Help
D)Windows On-line Help
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
____ is a client/server technology designed to manage patching and updating systems software from the network.

A)Systems Management Server (SMS)
B)Software Update Services (SUS)
C)Automatic Update
D)Patch Manager
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The Conficker worm took advantage of a vulnerability in ____ to run arbitrary code on susceptible hosts.

A)SQL Server
B)RPC
C)Windows Registry
D)NetBIOS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The MBSA can check for missing security updates.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The best way to protect a network from SMB attacks is to make sure routers filter out ports 137 to 139 and ____.

A)135
B)389
C)445
D)636
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Rootkits containing Trojan binary programs ready to be installed are more dangerous than typical Trojan programs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
____ is an open-source implementation of CIFS.

A)Samba
B)GNUCIFS
C)GCIFS
D)OpenCIFS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
NetBIOS over TCP/IP is called ____ in Windows Server 2003.

A)NBT
B)NetBEUI
C)NetBT
D)NetTCP/IP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
To determine whether a system is vulnerable to an RPC-related issue, the best tool is ____.

A)Nessus
B)Winfingerprint
C)MBSA
D)Unicornscan
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Samba is as an closed-source implementation of CIFS.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Red Hat and Fedora Linux use the ____ command to update and manage RPM packages.

A)yum
B)get
C)dir
D)alert
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
____ is an interprocess communication mechanism that allows a program running on one host to run code on a remote host.

A)RPC
B)NetBIOS
C)Winsock
D)NetBEUI
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
The MBSA can check for user account passwords that have dictionary words in them.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Early Windows OSs communicated with each other by using ____.

A)Microsoft RPC
B)IPX/SPX
C)Winsock
D)NetBIOS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Microsoft's Systems Management Server (SMS) can manage security patches for all computers on a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
MBSA has its origins in the ____ scanner.

A)MDAC
B)HFNetChk
C)MSXML
D)Mbsacli
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
to harden Microsoft systems, you should disable this account
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
You can use _____________________________________________ information when testing Linux computers for known vulnerabilities.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Trusted Computer Solutions____ program is used to tighten Linux system security configuration by using templates.

A)OpenVAS
B)MBSA
C)SQL Server
D)Security Blanket
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
SELinux contains several features and modules that use ____, an OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users.

A)Mandatory Access Control (MAC)
B)Server Message Block (SMB)
C)Common Internet File System (CIFS)
D)Microsoft Baseline Security Analyzer (MBSA)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
HTTP is associated with this port
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
In Microsoft systems, an excellent resource for finding configuration errors, missing patches, and so on is the ________________________________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
almost useless if it isn't updated regularly
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
gives an intruder a potential point of entry into a network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The Trojan program called Sheepshank makes HTTP GET requests over port ____.

A)25
B)80
C)129
D)139
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
If the LRK5 rootkit is installed on a Linux computer, entering the Trojaned ____ command allows the attacker's processes to continue running, even though the Linux administrator thinks all processes were killed.

A)Killall
B)Get
C)target
D)Dir
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
DNS is associated with this port
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
HTTPS is associated with this port
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
LDAP is associated with this port
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
SMB stands for _________________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
A common Linux rootkit is ____.

A)Back Orfice
B)Kill Trojans
C)Packet Storm Security
D)Linux Rootkit 5
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
to harden Microsoft systems, you should rename this account
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
no account should have this type of password
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
For a Windows computer to be able to access a *nix resource, ____ must be enabled on both systems.

A)NetBIOS
B)SMB
C)CIFS
D)NetBEUI
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
RPC stands for ________________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
To perform MBSA-style scans you can run the tool from the command line by using ____________________.exe.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What functions do most Trojan programs perform?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Why is NetBIOS still used sometimes?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What is the purpose of a file system?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What is Server Message Block (SMB) used for in Windows? Can hacking tools still damage a network using SMB?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What is Samba used for?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What is the Common Internet File System (CIFS) protocol?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What should a password policy include?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What can a security tester using enumeration tools do?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
In Windows Server 2003 and 2008, how does a domain controller locate resources in a domain?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Why should you review logs regularly? How should you accomplish this task?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.