The Conficker worm took advantage of a vulnerability in ____ to run arbitrary code on susceptible hosts.
A) SQL Server
B) RPC
C) Windows Registry
D) NetBIOS
Correct Answer:
Verified
Q2: Windows Server 2003 and 2008 _ are
Q3: SMB usually runs on top of NetBIOS,
Q4: NetBIOS over TCP/IP is called _ in
Q5: Complete instructions for MBSA are available from
Q6: _ is a client/server technology designed to
Q8: The MBSA can check for missing security
Q9: The best way to protect a network
Q10: Rootkits containing Trojan binary programs ready to
Q11: _ is an open-source implementation of CIFS.
A)Samba
B)GNUCIFS
C)GCIFS
D)OpenCIFS
Q12: NetBIOS over TCP/IP is called _ in
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents