Rootkits containing Trojan binary programs that are ready

Rootkits containing Trojan binary programs that are ready


Windows Software Update Services is designed to manager patching and updating system software from the network

 

·         true

 

Samba is proprietary implementation of CIFS

 

·         false

 

Rootkits containing Trojan binary programs that are ready to install are more dangerous than typical Trojan programs

 

·         true

 

What critical component of any OS that can be can be vulnerable to attacks is used to store and manage information?

 

·         file System

 

 

Which of the following protocols does NetBios use to access a network resources

 

·         NBT,TCP/IP,NetBeui

 

SMB is used to share files and usually runs on top of NetBios, netBEUI, or which of the following?

 

·         TCP/IP

 

Which standarized remote file system protocol replaced SMB in Windows 2000 server and later

 

·         Common internet file system

 

Microsoft Baseline security Analyzer has its orgins in which of the following command line scanners?

 

·         HPNETChk

 

Which of the following is a window's client/server technology designed to manage patching and updating system software from the network?

 

·         WSUS

 

Which of the following is an open-source implementation of CIFS?

 

·         samba

 

Ubuntu and Debian Linux use what command to update and manage their RPM packages?

 

·         apt-get

 

What is the most seious shortcoming of Microsoft's orginal File Allocation Table (FAT) file system?

 

·         no ACL support

 

What is the current file system that windows utilizes that has strong security features?

 

·         NTFS

 

Which of the following is considered to be the most critical SQL vulnerability?

 

·         null SA password

 

Which of the following is an SELinux os security mechanism that enforces access rules based on privileges for interactions between process, files and users?

 

·         Mandatory Access control

 

What programing languages are vulnerable to buffer overflow attacks?

 

·         C and C++

 

Embedded OSs are usually designed to be smalll and efficient so they do not have some of the function that general - purpose OSs have

 

·         true

 

 

Which one of the following, if compromised might allow attackers the ability to gain complete access to network resources?

 

·         router

 

A device that performs more than one function, such as printing and faxing is called which of the following?

 

·         MFD

 

What type of malicious code could be installed in a system's flash memory to allow an attacker t access they system at a later date?

 

·         BIOS-based rootkid

 

What type of viruses and code has been created by security researchers and attackers that could infect phones running google's Android, windows mobile and the apple iPhone OS?

 

·         Java-based

 

Which of teh following if often found within an embedded OS that can a potential vulnerability to an attack?

 

·         Web server

 

Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?

 

·         windows ce

 

CGI programs can be written in many different programming and scripting languages, such as C/C++ , Perl, UNIX shells, Visual Basic and FORTRAN

 

·         true

 

A user can view the source code of PHP file by using their Web browser's tool

 

·         false

 

JavaScript is a server-side scriptign language that is embedded in an html Web page

 

·         false

 

OLE DB relies on connection strings that enable the application to access that data stored on an external device

 

·         true

 

To check whether a CGI program works, you can test the Url in your WEb browser. Which of the following directories should you should you save the program to on you Web server before you check the URL in your Web browser?

 

·         cgi-bin

 

Which of the following programming languages was originally used primarily on UNIX SYstem, but is more widely now on many platforms such as Macintosh and windwos?

 

·         JScript,VBScript,PHP

 

Adobe System's ColdFUsion uses its proprietary tags, which are written in which of the following languages?

 

·         CFML

 

Which of the followign interfaces is a standard database access method, developed by SQl, Acess Group , that allows an application to access data stored in a database managment system(DBMS)?

 

·         OLE,ODBC,ADO

 

Which of the following is a programming interface for connection a Web application to a database and defines technologies that allow application such as Word or Excel, to interact with the Web?

 

·         ADO

 

 

Answer Detail

Get This Answer

Invite Tutor