Which of the following is a windows client server technology designed to manage patching and updating systems software from the network?

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  1. Science
  2. Computer Science

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (40)

Windows Software Update Services is designed to manager patching and updating system software from the network

true

Samba is proprietary implementation of CIFS

false

Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs

true

What critical component of any OS that can be can be vulnerable to attacks is used to store and manage information?

file System

Which of the following protocols does NetBios use to access a network resources

NBT,TCP/IP,NetBeui

SMB is used to share files and usually runs on top of NetBios, netBEUI, or which of the following?

TCP/IP

Which standarized remote file system protocol replaced SMB in Windows 2000 server and later

Common internet file system

Microsoft Baseline security Analyzer has its orgins in which of the following command line scanners?

HPNETChk

Which of the following is a window's client/server technology designed to manage patching and updating system software from the network?

WSUS

Which of the following is an open-source implementation of CIFS?

samba

Ubuntu and Debian Linux use what command to update and manage their RPM packages?

apt-get

What is the most seious shortcoming of Microsoft's orginal File Allocation Table (FAT) file system?

no ACL support

What is the current file system that windows utilizes that has strong security features?

NTFS

Which of the following is considered to be the most critical SQL vulnerability?

null SA password

Which of the following is an SELinux os security mechanism that enforces access rules based on privileges for interactions between process, files and users?

Mandatory Access control

What programing languages are vulnerable to buffer overflow attacks?

C and C++

Embedded OSs are usually designed to be smalll and efficient so they do not have some of the function that general - purpose OSs have

true

Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources?

router

A device that performs more than one function, such as printing and faxing is called which of the following?

MFD

What type of malicious code could be installed in a system's flash memory to allow an attacker t access they system at a later date?

BIOS-based rootkid

What type of viruses and code has been created by security researchers and attackers that could infect phones running google's Android, windows mobile and the apple iPhone OS?

Java-based

Which of teh following if often found within an embedded OS that can a potential vulnerability to an attack?

Web server

Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?

windows ce

CGI programs can be written in many different programming and scripting languages, such as C/C++ , Perl, UNIX shells, Visual Basic and FORTRAN

true

A user can view the source code of PHP file by using their Web browser's tool

false

JavaScript is a server-side scriptign language that is embedded in an html Web page

false

OLE DB relies on connection strings that enable the application to access that data stored on an external device

true

To check whether a CGI program works, you can test the Url in your WEb browser. Which of the following directories should you should you save the program to on you Web server before you check the URL in your Web browser?

cgi-bin

Which of the following programming languages was originally used primarily on UNIX SYstem, but is more widely now on many platforms such as Macintosh and windwos?

JScript,VBScript,PHP

Adobe System's ColdFUsion uses its proprietary tags, which are written in which of the following languages?

CFML

Which of the followign interfaces is a standard database access method, developed by SQl, Acess Group , that allows an application to access data stored in a database managment system(DBMS)?

OLE,ODBC,ADO

Which of the following is a programming interface for connection a Web application to a database and defines technologies that allow application such as Word or Excel, to interact with the Web?

ADO

Which of the following is an alternative term used when refering to Application Security

AppSec

Which of the following cross-site scripting vulnerabilities types is especially harmful because it can be delivered to subsequent users of the application?

reflected,injected,Stored

Which type of vulnerabilites can result from a server accepting untrusted, unvaildated input?

redirection, spoofing, injection

Which of the following results from poorly configured technologies that a Web application runs on top of?

Security misconfigurations

What is the specific act of checking user's privilages to understand if they should or should not have access to a page, field, resource, or action in an application?

authroization

What is the specfic act filtering, rejecting, or santizing a user's untrusted input before the application process it?

input validation

Which of the following refers to the flow a user in expected to follow is an application to accomplish a goal?

business logic

What type of useful tools can a security tester find available in both Firefox and Chrome Web browser?

Developer tools

Recommended textbook solutions

Which of the following is a windows client server technology designed to manage patching and updating systems software from the network?

Introduction to the Theory of Computation

3rd EditionMichael Sipser

389 solutions

Which of the following is a windows client server technology designed to manage patching and updating systems software from the network?

Engineering Electromagnetics

8th EditionJohn Buck, William Hayt

483 solutions

Which of the following is a windows client server technology designed to manage patching and updating systems software from the network?

Starting Out with C++: From Control Structures through Objects

8th EditionTony Gaddis

1,294 solutions

Which of the following is a windows client server technology designed to manage patching and updating systems software from the network?

Numerical Analysis

2nd EditionTimothy Sauer

385 solutions

Sets with similar terms

Ethical Hacking Test 5

49 terms

jobymcintire

Network and Defense Exam 3 Ch. 8-10

36 terms

cory_wilson4

ITEC 472 Entire Final

93 terms

DJFATWILL

Linux Final Exam

469 terms

dustin_sochacki

Sets found in the same folder

Ethical hacking final part 2

55 terms

Jonathan_France

Ethical hacking final exam flashcards part 1

68 terms

Jonathan_France

Ethical Hacking Exam 2

91 terms

ty_wickline

Ethical Hacking Test #1

90 terms

Logan_Dunlap

Other sets by this creator

Chapter 28

5 terms

Jonathan_France

Chapter 26 english terms

11 terms

Jonathan_France

Chapter 24/25 english terms

14 terms

Jonathan_France

Chapter 12/13/14 terms

18 terms

Jonathan_France

Verified questions

COMPUTER SCIENCE

What advantages does a vector offer over an array?

Verified answer

COMPUTER SCIENCE

Write a program that uses nested loops to collect data and calculate the average rainfall over a period of years. The program should first ask for the number of years. The outer loop will iterate once for each year. The inner loop will iterate twelve times, once for each month. Each iteration of the inner loop will ask the user for the inches of rainfall for that month. After all iterations, the program should display the number of months, the total inches of rainfall, and the average rainfall per month for the entire period. Input Validation: Do not accept a number less than 1 for the number of years. Do not accept negative numbers for the monthly rainfall.

Verified answer

COMPUTER SCIENCE

How does the NTFS directory structure differ from the directory structure used in UNIX operating systems?

Verified answer

COMPUTER SCIENCE

Can you think of a good reason to avoid writing statements in a class member function that use cout or cin ?

Verified answer

Other Quizlet sets

Community Final

188 terms

bekah634

Final Exam

52 terms

Chelsea_Dax22

Ch. 16 Anti inflammatory, Anti arthritis, and Rela…

28 terms

bryant_marles

Colonial America and the American Revolu…

32 terms

Comma_Here_OftenTEACHER

Related questions

QUESTION

Which command will remotely transfer the archive file /tmp/kerberos.tar to the directory /tmp on serverb? Specify /home/dba1/.ssh/review3_key as the private key of the SSH key pair?

2 answers

QUESTION

Users may list, open, add, delete and modify documents and folders. They can also modify share permissions.

2 answers

QUESTION

To configure clients to download updates from the WSUS server, which policy must be enabled?

2 answers

QUESTION

You have just installed Windows 8.1 and now attempt to install your favorite game that worked fine under Windows 7. When you attempt the installation, you get an error. What is your best next step?

8 answers

Which of the following is a Windows programming interface that allows computers to communicate across a local area network LAN )?

NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN).

What type of firewall inspects network traffic at a higher level in the OSI model?

A stateful inspection firewall examines network traffic to determine whether one packet is related to another packet. A proxy firewall (aka application-level gateway) inspects packets at the application layer of the Open Systems Interconnection (OSI) reference model.

What does the NBT part of NBTscan stand for?

What does the “NBT” part of “NBTscan” stand for? NetBIOS over TCP/IP. What enumeration tool is extremely useful when working with Windows NT, 2000, and Windows XP systems.

Which type of scan is usually used to bypass a firewall or packet filtering device?

1.0 network? (Choose all that apply.) A closed port responds to a SYN packet with which of the following packets? Which type of scan is usually used to bypass a firewall or packet-filtering device? Security testers can use Hping to bypass filtering devices.