![]() Which of the following tools helps discover unwanted operating system changes and non-compliant systems within the network? Baseline analyzers Which of the following tools is built into the Windows operating systems? Group Policy Objects The Microsoft Security Baseline Analyzer _ scores the severity of each vulnerability and offers suggestions for addressing each of the vulnerabilities found. Group Administration Controller Active Directory Which part of the C-I-A triad refers to preventing the disclosure of secure information to unauthorized individuals or systems? Confidentiality From the LabFiles Properties dialog box, which of the following options is necessary to enable you to specify permissions for each sub-folder? Disable Inheritance Which part of the C-I-A triad refers to maintaining and assuring the accuracy of data over its life-cycle? Integrity Which of the following tools is used to modify permissions on the TargetWindowsDC01 server to allow new users to use the remote desktop services? The Group Policy Object Editor Which tool enables a system administrator or security practitioner to set and enforce key security policies at the Active Directory Forest, Domain, and Organizational Unit level? Group Policy Objects Much of the policy revealed in the "Password must meet complexity requirements" window: enforces current best practices-with the exception of password length. If it is impractical to place guest users in a secure network, isolated from the production network by firewall barriers, then: specific areas of access should be determined and they should be as restrictive as possible Which of the following is the database that provides a centrally controlled and managed access and security management system for an organization's Windows computer systems? Include the account or user name within the password. Use sequential sets of letters and numbers. Leave the Administrator account named Administrator. Builtin (built-in) By default, Windows will: inherit the permissions of the parent folder so that all subfolders will have the same permissions as the parent Which of the following statements is true regarding the rules for password selection? Which of the following work together to complete the scanning and vulnerability assessment phase of the ethical hacking process? Nmap (Zenmap) and Nessus Which of the following interfaces enables you to scan several IP addresses at once or type in an IP address to create a simple scan of any machine? Nessus On a Windows network share, if the user can view the folder's contents as well as execute scripts, what type of access controls and permissions are probably configured? Read and execute Members of the _ group called Remote Desktop Users are allowed to use the remote desktop services to connect to remote machines. ![]() ![]() ![]() Conducting a vulnerability scan on entire subnets: is time consuming and noisy (making them easily detected). You can limit the breadth and scope of a vulnerability scan by: using a text file, which lists only the hosts you want to scan. scanning and vulnerability The raw data from the Nmap Output tab is grouped into a more readable form: on the Ports/Hosts and Host Details tab for each host in the scan. A successful _ assessment of a network is all about using the right tools to map the network and identify any vulnerabilities that can be the opening for a future attack. Ping scan Within Zenmap, which command is used to discover the versions of the software on open TCP ports? The -sV command The CVE listing is a database of: known software vulnerabilities and exposures as well as how to mitigate them with software patches and updates. Within Zenmap, which command is used to begin the OS fingerprinting scan and determine which operating systems are running on the network hosts? The -O command The _ confirms that the machine is available, but can't identify ports, operating systems, or services.
0 Comments
Leave a Reply. |