Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Hands On Ethical Hacking
Quiz 8: Desktop and Server Os Vulnerabilities
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
MATCHING Match each term with the correct statement below. -to harden Microsoft systems, you should disable this account
Question 22
Essay
You can use _____________________________________________ information when testing Linux computers for known vulnerabilities.
Question 23
Multiple Choice
Trusted Computer Solutions____ program is used to tighten Linux system security configuration by using templates.
Question 24
Multiple Choice
SELinux contains several features and modules that use ____, an OS security mechanism that enforces access rules based on privileges for interactions between processes, files, and users.
Question 25
Multiple Choice
MATCHING Match each term with the correct statement below. -HTTP is associated with this port
Question 26
Essay
In Microsoft systems, an excellent resource for finding configuration errors, missing patches, and so on is the ________________________________________.
Question 27
Multiple Choice
MATCHING Match each term with the correct statement below. -almost useless if it isn't updated regularly
Question 28
Multiple Choice
MATCHING Match each term with the correct statement below. -gives an intruder a potential point of entry into a network
Question 29
Multiple Choice
The Trojan program called Sheepshank makes HTTP GET requests over port ____.
Question 30
Multiple Choice
If the LRK5 rootkit is installed on a Linux computer, entering the Trojaned ____ command allows the attacker's processes to continue running, even though the Linux administrator thinks all processes were killed.