Exam 6: Enumeration
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
Match each item with a statement below.
-First Windows version to introduce User Account Control and BitLocker
(Multiple Choice)
4.8/5
(42)
What feature implemented in Windows Server 2016 allows for application isolation to protect applications from one another?
(Multiple Choice)
4.9/5
(35)
What type of Windows Server is the most likely server to be targeted by a computer hacker?
(Multiple Choice)
4.7/5
(37)
What version of Windows Server has completely eliminated the option for telnet server?
(Multiple Choice)
4.9/5
(36)
Windows Server 2012 introduced what protection feature to prevent pass-the-hash attacks?
(Multiple Choice)
4.8/5
(33)
What is the primary purpose of enumeration,and give three examples of information that can be acquired through enumeration?
(Essay)
4.8/5
(29)
If you do not have access to Nessus,what NMap procedure can be used to help you to gain information about remote *nix hosts?
(Multiple Choice)
4.8/5
(43)
What process allows a security professional to extract valuable information,such as information about users and recent login times from a network?
(Multiple Choice)
4.8/5
(30)
What boot loader will allow your computer or laptop to start in both Windows and Linux?
(Multiple Choice)
4.8/5
(34)
The computer names you assign to Windows systems are called which of the following?
(Multiple Choice)
4.8/5
(33)
Why is understanding the protocol "Simple Network Management Protocol" important for security professionals?
(Essay)
4.7/5
(31)
Match each item with a statement below.
-Designed for use on tablets and traditional PCs and only allows trusted applications by default through Device Guard
(Multiple Choice)
4.8/5
(25)
Match each item with a statement below.
-Unauthenticated connection to a Windows computer that uses no logon and password values.
(Multiple Choice)
4.8/5
(42)
NBTscan is a utility that can be used for enumerating Windows OSs.
(True/False)
4.9/5
(37)
Which of the following is a Windows programming interface that allows computers to communicate across a local area network (LAN)?
(Multiple Choice)
4.9/5
(42)
Which of the following is a useful enumeration tool that enables you to find out who is logged into a *nix system with one simple command?
(Multiple Choice)
4.8/5
(41)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)