Rootkits containing Trojan binary programs that are ready
Windows Software
Update Services is designed to manager patching and updating system software
from the network
·
true
Samba is proprietary
implementation of CIFS
·
false
Rootkits containing
Trojan binary programs that are ready to install are more dangerous than
typical Trojan programs
·
true
What critical
component of any OS that can be can be vulnerable to attacks is used to store
and manage information?
·
file System
Which of the following
protocols does NetBios use to access a network resources
·
NBT,TCP/IP,NetBeui
SMB is used to share
files and usually runs on top of NetBios, netBEUI, or which of the following?
·
TCP/IP
Which standarized
remote file system protocol replaced SMB in Windows 2000 server and later
·
Common internet file
system
Microsoft Baseline
security Analyzer has its orgins in which of the following command line
scanners?
·
HPNETChk
Which of the following
is a window's client/server technology designed to manage patching and updating
system software from the network?
·
WSUS
Which of the following
is an open-source implementation of CIFS?
·
samba
Ubuntu and Debian
Linux use what command to update and manage their RPM packages?
·
apt-get
What is the most
seious shortcoming of Microsoft's orginal File Allocation Table (FAT) file
system?
·
no ACL support
What is the current
file system that windows utilizes that has strong security features?
·
NTFS
Which of the following
is considered to be the most critical SQL vulnerability?
·
null SA password
Which of the following
is an SELinux os security mechanism that enforces access rules based on
privileges for interactions between process, files and users?
·
Mandatory Access
control
What programing
languages are vulnerable to buffer overflow attacks?
·
C and C++
Embedded OSs are usually
designed to be smalll and efficient so they do not have some of the function
that general - purpose OSs have
·
true
Which one of the
following, if compromised might allow attackers the ability to gain complete
access to network resources?
·
router
A device that performs
more than one function, such as printing and faxing is called which of the
following?
·
MFD
What type of malicious
code could be installed in a system's flash memory to allow an attacker t
access they system at a later date?
·
BIOS-based rootkid
What type of viruses
and code has been created by security researchers and attackers that could
infect phones running google's Android, windows mobile and the apple iPhone OS?
·
Java-based
Which of teh following
if often found within an embedded OS that can a potential vulnerability to an
attack?
·
Web server
Which of the following
source code is now available to the public and was considered a trimmed down
version of the Windows desktop OS?
·
windows ce
CGI programs can be
written in many different programming and scripting languages, such as C/C++ ,
Perl, UNIX shells, Visual Basic and FORTRAN
·
true
A user can view the
source code of PHP file by using their Web browser's tool
·
false
JavaScript is a
server-side scriptign language that is embedded in an html Web page
·
false
OLE DB relies on
connection strings that enable the application to access that data stored on an
external device
·
true
To check whether a CGI
program works, you can test the Url in your WEb browser. Which of the following
directories should you should you save the program to on you Web server before
you check the URL in your Web browser?
·
cgi-bin
Which of the following
programming languages was originally used primarily on UNIX SYstem, but is more
widely now on many platforms such as Macintosh and windwos?
·
JScript,VBScript,PHP
Adobe System's
ColdFUsion uses its proprietary tags, which are written in which of the
following languages?
·
CFML
Which of the followign
interfaces is a standard database access method, developed by SQl, Acess Group
, that allows an application to access data stored in a database managment
system(DBMS)?
·
OLE,ODBC,ADO
Which of the following
is a programming interface for connection a Web application to a database and
defines technologies that allow application such as Word or Excel, to interact
with the Web?
·
ADO