Deck 8: Desktop and Server Os Vulnerabilities
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 8: Desktop and Server Os Vulnerabilities
1
NetBIOS is not a protocol; it usually works with ____, a fast, efficient protocol that requires little configuration.
A)TCP/IP
B)NBT
C)NetBT
D)NetBEUI
A)TCP/IP
B)NBT
C)NetBT
D)NetBEUI
D
2
Windows Server 2003 and 2008 ____ are used to authenticate user accounts, so they contain much of the information that attackers want to access.
A)SMB controllers
B)domain controllers
C)CIFS servers
D)file servers
A)SMB controllers
B)domain controllers
C)CIFS servers
D)file servers
B
3
SMB usually runs on top of NetBIOS, NetBEUI, or ____.
A)Winsock
B)CIFS
C)TCP/IP
D)IPX/SPX
A)Winsock
B)CIFS
C)TCP/IP
D)IPX/SPX
C
4
NetBIOS over TCP/IP is called ____ in Windows 2000 Server.
A)NBT
B)NetBEUI
C)NetBT
D)NetTCP/IP
A)NBT
B)NetBEUI
C)NetBT
D)NetTCP/IP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Complete instructions for MBSA are available from the MBSA Help interface or the ____ site.
A)Microsoft Security Tools Web
B)Microsoft Knowledge Base
C)Windows Help
D)Windows On-line Help
A)Microsoft Security Tools Web
B)Microsoft Knowledge Base
C)Windows Help
D)Windows On-line Help
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
____ is a client/server technology designed to manage patching and updating systems software from the network.
A)Systems Management Server (SMS)
B)Software Update Services (SUS)
C)Automatic Update
D)Patch Manager
A)Systems Management Server (SMS)
B)Software Update Services (SUS)
C)Automatic Update
D)Patch Manager
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The Conficker worm took advantage of a vulnerability in ____ to run arbitrary code on susceptible hosts.
A)SQL Server
B)RPC
C)Windows Registry
D)NetBIOS
A)SQL Server
B)RPC
C)Windows Registry
D)NetBIOS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The MBSA can check for missing security updates.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The best way to protect a network from SMB attacks is to make sure routers filter out ports 137 to 139 and ____.
A)135
B)389
C)445
D)636
A)135
B)389
C)445
D)636
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Rootkits containing Trojan binary programs ready to be installed are more dangerous than typical Trojan programs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
____ is an open-source implementation of CIFS.
A)Samba
B)GNUCIFS
C)GCIFS
D)OpenCIFS
A)Samba
B)GNUCIFS
C)GCIFS
D)OpenCIFS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
NetBIOS over TCP/IP is called ____ in Windows Server 2003.
A)NBT
B)NetBEUI
C)NetBT
D)NetTCP/IP
A)NBT
B)NetBEUI
C)NetBT
D)NetTCP/IP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
To determine whether a system is vulnerable to an RPC-related issue, the best tool is ____.
A)Nessus
B)Winfingerprint
C)MBSA
D)Unicornscan
A)Nessus
B)Winfingerprint
C)MBSA
D)Unicornscan
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Samba is as an closed-source implementation of CIFS.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Red Hat and Fedora Linux use the ____ command to update and manage RPM packages.
A)yum
B)get
C)dir
D)alert
A)yum
B)get
C)dir
D)alert
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
____ is an interprocess communication mechanism that allows a program running on one host to run code on a remote host.
A)RPC
B)NetBIOS
C)Winsock
D)NetBEUI
A)RPC
B)NetBIOS
C)Winsock
D)NetBEUI
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
The MBSA can check for user account passwords that have dictionary words in them.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Early Windows OSs communicated with each other by using ____.
A)Microsoft RPC
B)IPX/SPX
C)Winsock
D)NetBIOS
A)Microsoft RPC
B)IPX/SPX
C)Winsock
D)NetBIOS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Microsoft's Systems Management Server (SMS) can manage security patches for all computers on a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
MBSA has its origins in the ____ scanner.
A)MDAC
B)HFNetChk
C)MSXML
D)Mbsacli
A)MDAC
B)HFNetChk
C)MSXML
D)Mbsacli
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
to harden Microsoft systems, you should disable this account
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
to harden Microsoft systems, you should disable this account
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
You can use _____________________________________________ information when testing Linux computers for known vulnerabilities.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Trusted Computer Solutions____ program is used to tighten Linux system security configuration by using templates.
A)OpenVAS
B)MBSA
C)SQL Server
D)Security Blanket
A)OpenVAS
B)MBSA
C)SQL Server
D)Security Blanket
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
SELinux contains several features and modules that use ____, an OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users.
A)Mandatory Access Control (MAC)
B)Server Message Block (SMB)
C)Common Internet File System (CIFS)
D)Microsoft Baseline Security Analyzer (MBSA)
A)Mandatory Access Control (MAC)
B)Server Message Block (SMB)
C)Common Internet File System (CIFS)
D)Microsoft Baseline Security Analyzer (MBSA)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
HTTP is associated with this port
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
HTTP is associated with this port
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
In Microsoft systems, an excellent resource for finding configuration errors, missing patches, and so on is the ________________________________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
almost useless if it isn't updated regularly
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
almost useless if it isn't updated regularly
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
gives an intruder a potential point of entry into a network
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
gives an intruder a potential point of entry into a network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The Trojan program called Sheepshank makes HTTP GET requests over port ____.
A)25
B)80
C)129
D)139
A)25
B)80
C)129
D)139
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
If the LRK5 rootkit is installed on a Linux computer, entering the Trojaned ____ command allows the attacker's processes to continue running, even though the Linux administrator thinks all processes were killed.
A)Killall
B)Get
C)target
D)Dir
A)Killall
B)Get
C)target
D)Dir
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
DNS is associated with this port
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
DNS is associated with this port
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
HTTPS is associated with this port
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
HTTPS is associated with this port
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
LDAP is associated with this port
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
LDAP is associated with this port
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
SMB stands for _________________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
A common Linux rootkit is ____.
A)Back Orfice
B)Kill Trojans
C)Packet Storm Security
D)Linux Rootkit 5
A)Back Orfice
B)Kill Trojans
C)Packet Storm Security
D)Linux Rootkit 5
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
to harden Microsoft systems, you should rename this account
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
to harden Microsoft systems, you should rename this account
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
MATCHING
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
no account should have this type of password
Match each term with the correct statement below.
a.antivirus software
f.port 80
b.port 389
g.unused services
c.Guest
h.Administrator
d.port 53
i.blank
e.port 443
no account should have this type of password
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
For a Windows computer to be able to access a *nix resource, ____ must be enabled on both systems.
A)NetBIOS
B)SMB
C)CIFS
D)NetBEUI
A)NetBIOS
B)SMB
C)CIFS
D)NetBEUI
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
RPC stands for ________________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
To perform MBSA-style scans you can run the tool from the command line by using ____________________.exe.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What functions do most Trojan programs perform?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Why is NetBIOS still used sometimes?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What is the purpose of a file system?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What is Server Message Block (SMB) used for in Windows? Can hacking tools still damage a network using SMB?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What is Samba used for?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What is the Common Internet File System (CIFS) protocol?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What should a password policy include?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What can a security tester using enumeration tools do?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
In Windows Server 2003 and 2008, how does a domain controller locate resources in a domain?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Why should you review logs regularly? How should you accomplish this task?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck