Home
Subjects
Expert solutions
Create
Log in
Sign up
Upgrade to remove ads
Only ₩37,125/year
- Science
- Computer Science
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (40)
Windows Software Update Services is designed to manager patching and updating system software from the network
true
Samba is proprietary implementation of CIFS
false
Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs
true
What critical component of any OS that can be can be vulnerable to attacks is used to store and manage information?
file System
Which of the following protocols does NetBios use to access a network resources
NBT,TCP/IP,NetBeui
SMB is used to share files and usually runs on top of NetBios, netBEUI, or which of the following?
TCP/IP
Which standarized remote file system protocol replaced SMB in Windows 2000 server and later
Common internet file system
Microsoft Baseline security Analyzer has its orgins in which of the following command line scanners?
HPNETChk
Which of the following is a window's client/server technology designed to manage patching and updating system software from the network?
WSUS
Which of the following is an open-source implementation of CIFS?
samba
Ubuntu and Debian Linux use what command to update and manage their RPM packages?
apt-get
What is the most seious shortcoming of Microsoft's orginal File Allocation Table (FAT) file system?
no ACL support
What is the current file system that windows utilizes that has strong security features?
NTFS
Which of the following is considered to be the most critical SQL vulnerability?
null SA password
Which of the following is an SELinux os security mechanism that enforces access rules based on privileges for interactions between process, files and users?
Mandatory Access control
What programing languages are vulnerable to buffer overflow attacks?
C and C++
Embedded OSs are usually designed to be smalll and efficient so they do not have some of the function that general - purpose OSs have
true
Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources?
router
A device that performs more than one function, such as printing and faxing is called which of the following?
MFD
What type of malicious code could be installed in a system's flash memory to allow an attacker t access they system at a later date?
BIOS-based rootkid
What type of viruses and code has been created by security researchers and attackers that could infect phones running google's Android, windows mobile and the apple iPhone OS?
Java-based
Which of teh following if often found within an embedded OS that can a potential vulnerability to an attack?
Web server
Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?
windows ce
CGI programs can be written in many different programming and scripting languages, such as C/C++ , Perl, UNIX shells, Visual Basic and FORTRAN
true
A user can view the source code of PHP file by using their Web browser's tool
false
JavaScript is a server-side scriptign language that is embedded in an html Web page
false
OLE DB relies on connection strings that enable the application to access that data stored on an external device
true
To check whether a CGI program works, you can test the Url in your WEb browser. Which of the following directories should you should you save the program to on you Web server before you check the URL in your Web browser?
cgi-bin
Which of the following programming languages was originally used primarily on UNIX SYstem, but is more widely now on many platforms such as Macintosh and windwos?
JScript,VBScript,PHP
Adobe System's ColdFUsion uses its proprietary tags, which are written in which of the following languages?
CFML
Which of the followign interfaces is a standard database access method, developed by SQl, Acess Group , that allows an application to access data stored in a database managment system(DBMS)?
OLE,ODBC,ADO
Which of the following is a programming interface for connection a Web application to a database and defines technologies that allow application such as Word or Excel, to interact with the Web?
ADO
Which of the following is an alternative term used when refering to Application Security
AppSec
Which of the following cross-site scripting vulnerabilities types is especially harmful because it can be delivered to subsequent users of the application?
reflected,injected,Stored
Which type of vulnerabilites can result from a server accepting untrusted, unvaildated input?
redirection, spoofing, injection
Which of the following results from poorly configured technologies that a Web application runs on top of?
Security misconfigurations
What is the specific act of checking user's privilages to understand if they should or should not have access to a page, field, resource, or action in an application?
authroization
What is the specfic act filtering, rejecting, or santizing a user's untrusted input before the application process it?
input validation
Which of the following refers to the flow a user in expected to follow is an application to accomplish a goal?
business logic
What type of useful tools can a security tester find available in both Firefox and Chrome Web browser?
Developer tools
Recommended textbook solutionsIntroduction to the Theory of Computation
3rd EditionMichael Sipser
389 solutions
Engineering Electromagnetics
8th EditionJohn Buck, William Hayt
483 solutions
Starting Out with C++: From Control Structures through Objects
8th EditionTony Gaddis
1,294 solutions
Numerical Analysis
2nd EditionTimothy Sauer
385 solutions
Sets with similar termsEthical Hacking Test 5
49 terms
jobymcintire
Network and Defense Exam 3 Ch. 8-10
36 terms
cory_wilson4
ITEC 472 Entire Final
93 terms
DJFATWILL
Linux Final Exam
469 terms
dustin_sochacki
Sets found in the same folderEthical hacking final part 2
55 terms
Jonathan_France
Ethical hacking final exam flashcards part 1
68 terms
Jonathan_France
Ethical Hacking Exam 2
91 terms
ty_wickline
Ethical Hacking Test #1
90 terms
Logan_Dunlap
Chapter 28
5 terms
Jonathan_France
Chapter 26 english terms
11 terms
Jonathan_France
Chapter 24/25 english terms
14 terms
Jonathan_France
Chapter 12/13/14 terms
18 terms
Jonathan_France
Verified questionsCOMPUTER SCIENCE
What advantages does a vector offer over an array?
Verified answer
COMPUTER SCIENCE
Write a program that uses nested loops to collect data and calculate the average rainfall over a period of years. The program should first ask for the number of years. The outer loop will iterate once for each year. The inner loop will iterate twelve times, once for each month. Each iteration of the inner loop will ask the user for the inches of rainfall for that month. After all iterations, the program should display the number of months, the total inches of rainfall, and the average rainfall per month for the entire period. Input Validation: Do not accept a number less than 1 for the number of years. Do not accept negative numbers for the monthly rainfall.
Verified answer
COMPUTER SCIENCE
How does the NTFS directory structure differ from the directory structure used in UNIX operating systems?
Verified answer
COMPUTER SCIENCE
Can you think of a good reason to avoid writing statements in a class member function that use cout or cin ?
Verified answer
Other Quizlet setsCommunity Final
188 terms
bekah634
Final Exam
52 terms
Chelsea_Dax22
Ch. 16 Anti inflammatory, Anti arthritis, and Rela…
28 terms
bryant_marles
Colonial America and the American Revolu…
32 terms
Comma_Here_OftenTEACHER
Related questionsQUESTION
Which command will remotely transfer the archive file /tmp/kerberos.tar to the directory /tmp on serverb? Specify /home/dba1/.ssh/review3_key as the private key of the SSH key pair?
2 answers
QUESTION
Users may list, open, add, delete and modify documents and folders. They can also modify share permissions.
2 answers
QUESTION
To configure clients to download updates from the WSUS server, which policy must be enabled?
2 answers
QUESTION
You have just installed Windows 8.1 and now attempt to install your favorite game that worked fine under Windows 7. When you attempt the installation, you get an error. What is your best next step?
8 answers