Information Technology /Cyber-Security: Chapter 6
Cyber-Security: Chapter 6
This deck covers key concepts and tools related to network management, enumeration, and security testing in Windows and UNIX systems.
Which of the following is a popular network management service for network administrators?
SNMP
Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/37
Key Terms
Term
Definition
Which of the following is a popular network management service for network administrators?
SNMP
Which Windows 10 feature uses virtualization to protect access tokens from theft by attackers?
Credential Guard
Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network?
Net view
Which of the following is an older network management service that is useful for network administrators that want to view system statistics, version numbers, and other detailed host information remotely?
SNMP
Security testers conduct enumeration for which of the following reasons?
Gaining access to shares and network resources
Obtaining user logon names and group members...
Which of the following is an excellent GUI tool for managing Windows OSs and is capable of displaying graphical representations of several areas?
Hyena
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
Which of the following is a popular network management service for network administrators? | SNMP |
Which Windows 10 feature uses virtualization to protect access tokens from theft by attackers? | Credential Guard |
Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network? | Net view |
Which of the following is an older network management service that is useful for network administrators that want to view system statistics, version numbers, and other detailed host information remotely? | SNMP |
Security testers conduct enumeration for which of the following reasons? | Gaining access to shares and network resources Obtaining user logon names and group memberships |
Which of the following is an excellent GUI tool for managing Windows OSs and is capable of displaying graphical representations of several areas? | Hyena |
The latest version of Nessus Server and Client can run on Windows, Mac OS X, FreeBSD, and most Linux distributions. | True |
To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used? | Footprinting |
If you do not have access to Nessus, what NMap procedure can be used to help you to gain information about remote *nix hosts? | Script Scanning |
Which of the following testing processes is the most intrusive? | Enumeration |
Which of the following tools can be used to enumerate Windows systems? | Hyena OpenVAS or Nessus |
Most NetBIOS enumeration tools connect to the target system by using which of the following? | Null sessions |
A null session is enabled by default in all the following Windows versions except: | Windows Server 2008 |
What version of Windows Server has completely eliminated the option for the telnet server? | Windows Server 2016 |
What process allows a security professional to extract valuable information, such as information about users and recent login times from a network? | Enumeration |
Which of the following is the vulnerability scanner from which OpenVAS was developed? | Nessus |
If you don’t have access to Nessus, which of the following can be used by an attacker to gain information about remote *nix Hosts? | NMAP |
What enumeration tool is extremely useful when working with Windows NT, 2000, and Windows XP systems? | DumpSec |
Which of the following is a useful enumeration tool that enables you to find out who is logged into a *nix system with one simple command? | Finger utility |
Which of the following commands should you use to determine whether there are any shared resources on a Windows computer with the IP address 193.145.83.202? | nbtstat -a 193.145.85.202 |
The computer names you assign to Windows systems are called which of the following? | NetBIOS |
What upper-level service is required to utilize file and printer sharing in Windows? | Server Message Block |
The open-source descendant of Nessus is called which of the following? | OpenVAS |
A NetBIOS name does not need to be unique on a network. | False |
What does the 'NBT' part of 'NBTscan' stand for? | NetBIOS over TCP/IP |
What type of Windows Server is the most likely server to be targeted by a computer hacker? | Domain Controller |
What feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, preventing rootkits? | SecureBoot |
Which of the following commands gives you a quick way to see if there are any shared resources on a computer or server? | Net view |
The Windows Net use command is a quick way to discover any shared resources on a computer or server. True or False? | False |
Windows Server 2012 introduced what protection feature to prevent pass-the-hash attacks? | Authentication Silos |
Which of the following is a commonly used UNIX enumeration tool? | SNMPWalk |
To identify the NetBIOS names of systems on the 193.145.85.0 network, which of the following commands do you use? | nbtscan 193.145.85.0 /24 |
Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network? | Net View |
Which port numbers indicate NetBIOS is in use on a remote Target? | 135 to 139 |
Enumeration of Windows systems can be more difficult if which port is filtered? | 139/TCP |
A NetBIOS name can contain a maximum of how many characters? | 15 |
The nbtstat command is used to enumerate *nix systems. True or False? | False |