Exam 6: Enumeration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below. -First Windows version to introduce User Account Control and BitLocker

(Multiple Choice)
4.8/5
(42)

A NetBIOS name does not need to be unique on a network.

(True/False)
4.8/5
(42)

What feature implemented in Windows Server 2016 allows for application isolation to protect applications from one another?

(Multiple Choice)
4.9/5
(35)

Why do hackers pay attention to NetBIOS computer name suffixes?

(Essay)
4.9/5
(34)

What type of Windows Server is the most likely server to be targeted by a computer hacker?

(Multiple Choice)
4.7/5
(37)

What version of Windows Server has completely eliminated the option for telnet server?

(Multiple Choice)
4.9/5
(36)

Windows Server 2012 introduced what protection feature to prevent pass-the-hash attacks?

(Multiple Choice)
4.8/5
(33)

What is the primary purpose of enumeration,and give three examples of information that can be acquired through enumeration?

(Essay)
4.8/5
(29)

If you do not have access to Nessus,what NMap procedure can be used to help you to gain information about remote *nix hosts?

(Multiple Choice)
4.8/5
(43)

What is the Net view command and how can you use it?

(Essay)
4.8/5
(39)

What process allows a security professional to extract valuable information,such as information about users and recent login times from a network?

(Multiple Choice)
4.8/5
(30)

What boot loader will allow your computer or laptop to start in both Windows and Linux?

(Multiple Choice)
4.8/5
(34)

The computer names you assign to Windows systems are called which of the following?

(Multiple Choice)
4.8/5
(33)

What is a "null session" and how does it relate to Window's systems?

(Essay)
4.8/5
(42)

Why is understanding the protocol "Simple Network Management Protocol" important for security professionals?

(Essay)
4.7/5
(31)

Match each item with a statement below. -Designed for use on tablets and traditional PCs and only allows trusted applications by default through Device Guard

(Multiple Choice)
4.8/5
(25)

Match each item with a statement below. -Unauthenticated connection to a Windows computer that uses no logon and password values.

(Multiple Choice)
4.8/5
(42)

NBTscan is a utility that can be used for enumerating Windows OSs.

(True/False)
4.9/5
(37)

Which of the following is a Windows programming interface that allows computers to communicate across a local area network (LAN)?

(Multiple Choice)
4.9/5
(42)

Which of the following is a useful enumeration tool that enables you to find out who is logged into a *nix system with one simple command?

(Multiple Choice)
4.8/5
(41)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)