Saintleo COM546 2019 May Module 6 Exam 3 Latest

Sep 29, 2024

Get all Your Education Homework help from Tutorslite.com

COM546 Advanced Penetration Testing

Don't use plagiarized sources. Get Your Custom Essay on
Saintleo COM546 2019 May Module 6 Exam 3 Latest
Just from $13/Page
Order Essay

Module 6 Exam 3

Question 1 The print command for Perl is almost identical to the print command used in which of the following programming languages?

Question 1 options:

Java

C

PHP

Smalltalk

Question 2 Which of the following is a backdoor initiated from inside the target’s network that makes it possible to take control of the target even when it’s behind a firewall?

Question 2 options:

reverse port

back shell

reverse shell

reverse door

Question 3 You must always add “//” at the end of comment text when using C language.

Question 3 options:

                True

                False

Question 4 In the Perl programming language, variables begin with which of the following characters?

Question 4 options:

%

!

*

$

Question 5 In the C programming language, which of the following show where a block of code begins and ends?

Question 5 options:

braces

parenthesis

brackets

dashes

Question 6 Bugs are worse than syntax errors because a program can run successfully with a bug, but the output might be incorrect or inconsistent.

Question 6 options:

                True

                False

Question 7 In HTML, each tag has a matching closing tag that is written with which of the following characters?

Question 7 options:

forward slash (/)

backward slash ()

bang (!)

ampersand (&)

Question 8 UNIX was first written in assembly language. However, it was soon rewritten in what programming language?

Question 8 options:

Smalltalk

Perl

Python

C

Question 9 Which of the following special characters is used with the printf() function in the C programming language to indicate a new line?

 

Question 9 options:

t

n

l

Question 10 You can use the syntax /* and */ to accomplish what function when working with large portions of text?

Question 10 options:

run

erase

execute

comment

Question 11 Most programming languages have a way to branch, loop, and test.

Question 11 options:

                True

                False

Question 12 In the C programming language, which variable type holds the value of a single letter?

Question 12 options:

Char

Float

String

Const

Question 13 Security professionals often need to examine Web pages and recognize when something looks suspicious.

Question 13 options:

                True

                False

Question 14 Red Hat and Fedora Linux use what command to update and manage their RPM packages?

Question 14 options:

yum

get

dir

apt-get

Question 15 What is the current file system that Windows utilizes that has strong security features?

Question 15 options:

FAT

ADS

FAT32

NTFS

Question 16 NetBios is not available in Windows Vista, Server 2008, and later versions of Windows. However, NetBios should be understood by a security professional because it is used for which of the following?

Question 16 options:

backward compatibility

Windows upgrades

virus scanning

RPC

Question 17 What is the most serious shortcoming of Microsoft’s original File Allocation Table (FAT) file system?

Question 17 options:

no ACL support

no SUS support

no SMTP support

no Linux support

 

Question 18 SMB is used to share files and usually runs on top of NetBIOS, NetBEUI, or which of the following?

Question 18 options:

Winsock

CIFS

TCP/IP

IPX/SPX

Question 19 Samba is a proprietary implementation of CIFS.

Question 19 options:

                True

                False

Question 20 When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?

Question 20 options:

NT level security

Share-level security

User-level security

CIF level security

Question 21 What programming languages are vulnerable to buffer overflow attacks?

Question 21 options:

C and Python

C and C++

Assembly and C++

Perl and Python

Question 22 What critical component of any OS, that can be can be vulnerable to attacks, is used to store and manage information?

Question 22 options:

SQL database

file system

WSUS

NetBIOS

Question 23 Which of the following is an interprocess communication mechanism that allows a program running on one host to run code on a remote host?

Question 23 options:

RPC

NetBIOS

Winsock

NetBEUI

Question 24 Windows 10, Windows 8, Windows Server 2016, and Windows Server 2012 have most services and features enabled by default.

Question 24 options:

                True

                False

Question 25 To determine whether a system could be vulnerable to an RPC-related issue, which of the following tools can be used?

Question 25 options:

Nessus

WSUS

MBSA

Unicornscan

Question 26 Early Windows OSs used which of the following programs loaded into memory to interact with a network resource or device?

Question 26 options:

Microsoft RPC

IPX/SPX

Winsock

NetBIOS

Question 27 Which of the following source code is now available to the public and was considered a trimmed down version of the Windows desktop OS?

 

Question 27 options:

VxWorks

Windows Embedded 8

Windows CE

Windows 10 IoT

Question 28 Ubuntu and Debian Linux use what command to update and manage their RPM packages?

Question 28 options:

yum

get

dir

apt-get

Question 29 Which of the following systems should be used when equipment monitoring and automation is critical?

Question 29 options:

CAD

GUI

SCADA

VoIP

 

Question 30 When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password to access a specific resource?

Question 30 options:

NT level security

Share-level security

User-level security

CIF level security

Question 31 What type of viruses and code has been created by security researchers and attackers that could infect phones running Google’s Android, Windows Mobile, and the Apple iPhone OS?

Question 31 options:

Python

C++

Perl

Java-based

Question 32 What type of malicious code could be installed in a system’s flash memory to allow an attacker to access the system at a later date?

Question 32 options:

BIOS-based rootkit

embedded browser

unclassified kernel

patch

Question 33 What is the current file system that Windows utilizes that has strong security features?

Question 33 options:

FAT

ADS

FAT32

NTFS

Question 34 (1 point)

What is the most serious shortcoming of Microsoft’s original File Allocation Table (FAT) file system?

Question 34 options:

no ACL support

no SUS support

no SMTP support

no Linux support

Question 35 A device that performs more than one function, such as printing and faxing is called which of the following?

Question 35 options:

MILS

ASA

RTOS

MFD

Question 36 When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share?

Question 36 options:

NT level security

Share-level security

User-level security

CIF level security

Question 37 What programming languages are vulnerable to buffer overflow attacks?

Question 37 options:

C and Python

C and C++

Assembly and C++

Perl and Python

Question 38 (Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?

Question 38 options:

firmware

testware

middleware

fireware

Question 39 Which of the following if often found within an embedded OS that can cause a potential vulnerability to an attack?

Question 39 options:

Web server

USB port

RAM

PCB

Question 40 Which of the following is a common Linux rootkit?

Question 40 options:

Back Orifice

Kill Trojans

Packet Storm Security

Linux Rootkit 5

Recent Posts

Open chat
Hello
Can we help you?