17 Jan Back Orifice
COM546 Advanced Penetration Testing
Module 6 Exam 3
Question 1 The print command for Perl is almost identical to the print command used in which of the following programming languages?
Question 1 options:
Java
C
PHP
Smalltalk
Question 2 Which of the following is a backdoor initiated from inside the target’s network that makes it possible to take control of the target even when it’s behind a firewall?
Question 2 options:
reverse port
back shell
reverse shell
reverse door
Question 3 You must always add “//” at the end of comment text when using C language.
Question 3 options:
True
False
Question 4 In the Perl programming language, variables begin with which of the following characters?
Question 4 options:
%
!
*
$
Question 5 In the C programming language, which of the following show where a block of code begins and ends?
Question 5 options:
braces
parenthesis
brackets
dashes
Question 6 Bugs are worse than syntax errors because a program can run successfully with a bug, but the output might be incorrect or inconsistent.
Question 6 options:
True
False
Question 7 In HTML, each tag has a matching closing tag that is written with which of the following characters?
Question 7 options:
forward slash (/)
backward slash (\)
bang (!)
ampersand (&)
Question 8 UNIX was first written in assembly language. However, it was soon rewritten in what programming language?
Question 8 options:
Smalltalk
Perl
Python
C
Question 9 Which of the following special characters is used with the printf() function in the C programming language to indicate a new line?
Question 9 options:
\t
\0
\n
\l
Question 10 You can use the syntax /* and */ to accomplish what function when working with large portions of text?
Question 10 options:
run
erase
execute
comment
Question 11 Most programming languages have a way to branch, loop, and test.
Question 11 options:
True
False
Question 12 In the C programming language, which variable type holds the value of a single letter?
Question 12 options:
Char
Float
String
Const
Question 13 Security professionals often need to examine Web pages and recognize when something looks suspicious.
Question 13 options:
True
False
Question 14 Red Hat and Fedora Linux use what command to update and manage their RPM packages?
Question 14 options:
yum
get
dir
apt-get
Question 15 What is the current file system that Windows utilizes that has strong security features?
Question 15 options:
FAT
ADS
FAT32
NTFS
Question 16 NetBios is not available in Windows Vista, Server 2008, and later versions of Windows. However, NetBios should be understood by a security professional because it is used for which of the following?
Question 16 options:
backward compatibility
Windows upgrades
virus scanning
RPC
Question 17 What is the most serious shortcoming of Microsoft’s original File Allocation Table (FAT) file system?
Question 17 options:
no ACL support
no SUS support
no SMTP support
no Linux support
Question 18 SMB is used to share files and usually runs on top of NetBIOS, NetBEUI, or which of the following?
Question 18 options:
Winsock
CIFS
TCP/IP
IPX/SPX
Question 19 Samba is a proprietary implementation of CIFS.
Question 19 options:
True
False
Question 20 When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?
Question 20 options:
NT level security
Share-level security
User-level security
CIF level security
Question 21 What programming languages are vulnerable to buffer overflow attacks?
Question 21 options:
C and Python
C and C++
Assembly and C++
Perl and Python
Question 22 What critical component of any OS, that can be can be vulnerable to attacks, is used to store and manage information?
Question 22 options:
SQL database
file system
WSUS
NetBIOS
Question 23 Which of the following is an interprocess communication mechanism that allows a program running on one host to run code on a remote host?
Question 23 options:
RPC
NetBIOS
Winsock
NetBEUI
Question 24 Windows 10, Windows 8, Windows Server 2016, and Windows Server 2012 have most services and features enabled by default.
Question 24 options:
True
False
Question 25 To determine whether a system could be vulnerable to an RPC-related issue, which of the following tools can be used?
Question 25 options:
Nessus
WSUS
MBSA
Unicornscan
Question 26 Early Windows OSs used which of the following programs loaded into memory to interact with a network resource or device?
Question 26 options:
Microsoft RPC
IPX/SPX
Winsock
NetBIOS
Question 27 Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?
Question 27 options:
VxWorks
Windows Embedded 8
Windows CE
Windows 10 IoT
Question 28 Ubuntu and Debian Linux use what command to update and manage their RPM packages?
Question 28 options:
yum
get
dir
apt-get
Question 29 Which of the following systems should be used when equipment monitoring and automation is critical?
Question 29 options:
CAD
GUI
SCADA
VoIP
Question 30 When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password to access a specific resource?
Question 30 options:
NT level security
Share-level security
User-level security
CIF level security
Question 31 What type of viruses and code has been created by security researchers and attackers that could infect phones running Google’s Android, Windows Mobile, and the Apple iPhone OS?
Question 31 options:
Python
C++
Perl
Java-based
Question 32 What type of malicious code could be installed in a system’s flash memory to allow an attacker to access the system at a later date?
Question 32 options:
BIOS-based rootkit
embedded browser
unclassified kernel
patch
Question 33 What is the current file system that Windows utilizes that has strong security features?
Question 33 options:
FAT
ADS
FAT32
NTFS
Question 34 (1 point)
What is the most serious shortcoming of Microsoft’s original File Allocation Table (FAT) file system?
Question 34 options:
no ACL support
no SUS support
no SMTP support
no Linux support
Question 35 A device that performs more than one function, such as printing and faxing is called which of the following?
Question 35 options:
MILS
ASA
RTOS
MFD
Question 36 When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?
Question 36 options:
NT level security
Share-level security
User-level security
CIF level security
Question 37 What programming languages are vulnerable to buffer overflow attacks?
Question 37 options:
C and Python
C and C++
Assembly and C++
Perl and Python
Question 38 (Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?
Question 38 options:
firmware
testware
middleware
fireware
Question 39 Which of the following if often found within an embedded OS that can cause a potential vulnerability to an attack?
Question 39 options:
Web server
USB port
RAM
PCB
Question 40 Which of the following is a common Linux rootkit?
Question 40 options:
Back Orifice
Kill Trojans
Packet Storm Security
Linux Rootkit 5
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
Do you need help with this question?
Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.
WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.
With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Chat with us today! We are always waiting to answer all your questions.