Exam 6: Enumeration
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
Why is enumeration a more intrusive process than port scanning or footprinting?
(Essay)
4.9/5
(32)
Which of the following commands gives you a quick way to see if there are any shared resources on a computer or server?
(Multiple Choice)
4.9/5
(38)
All of the enumeration techniques that work with older Windows OSs still work with Windows Server 2012.
(True/False)
4.9/5
(32)
What upper-level service is required to utilize file and printer sharing in Windows?
(Multiple Choice)
4.9/5
(31)
Match each item with a statement below.
-Process of extracting critical information from a network
(Multiple Choice)
4.8/5
(44)
What security feature was extended to the OS to alert the user when an application is launched on a Windows 8.1 computer?
(Multiple Choice)
4.9/5
(34)
Match each item with a statement below.
-Introduces Windows Containers to allow for application isolation to protect applications from one another
(Multiple Choice)
4.9/5
(34)
Match each item with a statement below.
-The first Microsoft GUI product that didn't rely on DOS
(Multiple Choice)
4.9/5
(30)
Match each item with a statement below.
-Builds on the security advances made in Vista with the introduction of AppLocker
(Multiple Choice)
4.9/5
(36)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)