Show
Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Terms in this set (40)Windows Software Update Services is designed to manager patching and updating system software from the network true Samba is proprietary implementation of CIFS false Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs true What critical component of any OS that can be can be vulnerable to attacks is used to store and manage information? file System Which of the following protocols does NetBios use to access a network resources NBT,TCP/IP,NetBeui SMB is used to share files and usually runs on top of NetBios, netBEUI, or which of the following? TCP/IP Which standarized remote file system protocol replaced SMB in Windows 2000 server and later Common internet file system
Microsoft Baseline security Analyzer has its orgins in which of the following command line scanners? HPNETChk Which of the following is a window's client/server technology designed to manage patching and updating system software from the network? WSUS Which of the following is an open-source implementation of CIFS? samba Ubuntu and Debian Linux use what command to update and manage their RPM packages? apt-get What is the most seious shortcoming of Microsoft's orginal File Allocation Table (FAT) file system? no ACL support What is the current file system that windows utilizes that has strong security features? NTFS Which of the following is considered to be the most critical SQL vulnerability? null SA password Which of the following is an SELinux os security mechanism that enforces access rules based on privileges for interactions between process, files and users? Mandatory Access control What programing languages are vulnerable to buffer overflow attacks? C and C++ Embedded OSs are usually designed to be smalll and efficient so they do not have some of the function that general - purpose OSs have true Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources? router A device that performs more than one function, such as printing and faxing is called which of the following? MFD What type of malicious code could be installed in a system's flash memory to allow an attacker t access they system at a later date? BIOS-based rootkid What type of viruses and code has been created by security researchers and attackers that could infect phones running google's Android, windows mobile and the apple iPhone OS? Java-based Which of teh following if often found within an embedded OS that can a potential vulnerability to an attack? Web server Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS? windows ce CGI programs can be written in many different programming and scripting languages, such as C/C++ , Perl, UNIX shells, Visual Basic and FORTRAN true A user can view the source code of PHP file by using their Web browser's tool false JavaScript is a server-side scriptign language that is embedded in an html Web page false OLE DB relies on connection strings that enable the application to access that data stored on an external device true To check whether a CGI program works, you can test the Url in your WEb browser. Which of the following directories should you should you save the program to on you Web server before you check the URL in your Web browser? cgi-bin Which of the following programming languages was originally used primarily on UNIX SYstem, but is more widely now on many platforms such as Macintosh and windwos? JScript,VBScript,PHP Adobe System's ColdFUsion uses its proprietary tags, which are written in which of the following languages? CFML Which of the followign interfaces is a standard database access method, developed by SQl, Acess Group , that allows an application to access data stored in a database managment system(DBMS)? OLE,ODBC,ADO Which of the following is a programming interface for connection a Web application to a database and defines technologies that allow application such as Word or Excel, to interact with the Web? ADO Which of the following is an alternative term used when refering to Application Security AppSec Which of the following cross-site scripting vulnerabilities types is especially harmful because it can be delivered to subsequent users of the application? reflected,injected,Stored Which type of vulnerabilites can result from a server accepting untrusted, unvaildated input? redirection, spoofing, injection Which of the following results from poorly configured technologies that a Web application runs on top of? Security misconfigurations What is the specific act of checking user's privilages to understand if they should or should not have access to a page, field, resource, or action in an application? authroization What is the specfic act filtering, rejecting, or santizing a user's untrusted input before the application process it? input validation Which of the following refers to the flow a user in expected to follow is an application to accomplish a goal? business logic What type of useful tools can a security tester find available in both Firefox and Chrome Web browser? Developer tools Recommended textbook solutionsIntroduction to the Theory of Computation3rd EditionMichael Sipser 389 solutions Engineering Electromagnetics8th EditionJohn Buck, William Hayt 483 solutions Starting Out with C++: From Control Structures through Objects8th EditionTony Gaddis 1,294 solutions
Numerical Analysis2nd EditionTimothy Sauer 385 solutions Sets with similar termsEthical Hacking Test 549 terms jobymcintire Network and Defense Exam 3 Ch. 8-1036 terms cory_wilson4 ITEC 472 Entire Final93 terms DJFATWILL Linux Final Exam469 terms dustin_sochacki Sets found in the same folderEthical hacking final part 255 terms Jonathan_France Ethical hacking final exam flashcards part 168 terms Jonathan_France Ethical Hacking Exam 291 terms ty_wickline Ethical Hacking Test #190 terms Logan_Dunlap Other sets by this creatorChapter 285 terms Jonathan_France Chapter 26 english terms11 terms Jonathan_France Chapter 24/25 english terms14 terms Jonathan_France Chapter 12/13/14 terms18 terms Jonathan_France Verified questionsCOMPUTER SCIENCE What advantages does a vector offer over an array? Verified answer
COMPUTER SCIENCE Write a program that uses nested loops to collect data and calculate the average rainfall over a period of years. The program should first ask for the number of years. The outer loop will iterate once for each year. The inner loop will iterate twelve times, once for each month. Each iteration of the inner loop will ask the user for the inches of rainfall for that month. After all iterations, the program should display the number of months, the total inches of rainfall, and the average rainfall per month for the entire period. Input Validation: Do not accept a number less than 1 for the number of years. Do not accept negative numbers for the monthly rainfall. Verified answer COMPUTER SCIENCE How does the NTFS directory structure differ from the directory structure used in UNIX operating systems? Verified answer
COMPUTER SCIENCE Can you think of a good reason to avoid writing statements in a class member function that use cout or cin ? Verified answer Other Quizlet setsCommunity Final188 terms bekah634 Final Exam52 terms Chelsea_Dax22 Ch. 16 Anti inflammatory, Anti arthritis, and Rela…28 terms bryant_marles Colonial America and the American Revolu…32 terms Comma_Here_OftenTEACHER Related questionsQUESTION Which command will remotely transfer the archive file /tmp/kerberos.tar to the directory /tmp on serverb? Specify /home/dba1/.ssh/review3_key as the private key of the SSH key pair? 2 answers QUESTION Users may list, open, add, delete and modify documents and folders. They can also modify share permissions. 2 answers QUESTION To configure clients to download updates from the WSUS server, which policy must be enabled? 2 answers QUESTION You have just installed Windows 8.1 and now attempt to install your favorite game that worked fine under Windows 7. When you attempt the installation, you get an error. What is your best next step? 8 answers Which of the following is a Windows programming interface that allows computers to communicate across a local area network LAN )?NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN).
What type of firewall inspects network traffic at a higher level in the OSI model?A stateful inspection firewall examines network traffic to determine whether one packet is related to another packet. A proxy firewall (aka application-level gateway) inspects packets at the application layer of the Open Systems Interconnection (OSI) reference model.
What does the NBT part of NBTscan stand for?What does the “NBT” part of “NBTscan” stand for? NetBIOS over TCP/IP. What enumeration tool is extremely useful when working with Windows NT, 2000, and Windows XP systems.
Which type of scan is usually used to bypass a firewall or packet filtering device?1.0 network? (Choose all that apply.) A closed port responds to a SYN packet with which of the following packets? Which type of scan is usually used to bypass a firewall or packet-filtering device? Security testers can use Hping to bypass filtering devices.
|