Page 535 - StudyBook.pdf
P. 535
Infrastructure Security: System Hardening • Chapter 8 519
A. The backup altered the archive bit on the backup systems
B. The CD/DVDs are not compatible with the systems in which they were
installed
C. The patches were not tested before installation
D. The wrong patches were installed
6. You have been asked to examine a subnet of a computer and identify any
open ports or services that should be disabled.These systems are located in
several different floors of the facility.Which of the following would be the
best type of tool to accomplish the task?
A. A process review tool such as Netstat
B. A port scanning tool such as Nmap
C. A registry tool such as RegEdit
D. Enable automatic updates on each of the targeted computers
7. You have been given the scan below and asked to review it.
Interesting ports on (12.16.3.199):
(The 1594 ports scanned but not shown below are in state: filtered)
Port State Service
22/tcp open ssh
69/udp open tftp
80/tcp open http
135/tcp open netbios ssn
3306/tcp open mysql
Based on an analysis, can you determine the OS of the scanned network system?
A. Windows XP
B. Windows NT
C. Windows Vista
D. Linux
8. You have been tasked with securing the network.While reviewing an Nmap
scan of your network, one device had the following ports open.Which one
will you choose?
www.syngress.com