Exam 6: Enumeration
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
Nessus can be used to enumerate Windows OSs, as well as ____________________ systems.
Free
(Short Answer)
4.8/5
(37)
Correct Answer:
NetWare
What is Hyena and what can it be used for?
Free
(Essay)
4.9/5
(37)
Correct Answer:
Hyena is an excellent GUI product for managing and securing Microsoft OSs.The interface is easy to use and gives security professionals a wealth of information.With just a click,you can look at the shares and user logon names for Windows servers and domain controllers.If any domains or workgroups are on the network,this tool displays them,too.Hyena can also display a graphical representation of the following areas:
-Microsoft Terminal Services
-Microsoft Windows Network
-Web Client Network
-Find User/Group
A NetBIOS name does not need to be unique on a network.
Free
(True/False)
4.7/5
(39)
Correct Answer:
False
NTFS was implemented to replace FAT16 and FAT32 because of the difficulty in incorporating security in these file systems.
(True/False)
4.8/5
(31)
In ____, instead of peer-to-peer networks, a client/server model was created in which a server was responsible for authenticating users and giving them access to resources on a network.
(Multiple Choice)
4.8/5
(34)
MATCHING
Match each term with the correct statement below.
-replaced the Registry with Active Directory for object storage
(Multiple Choice)
4.9/5
(35)
The ____ command is a powerful enumeration tool included with Windows.
(Multiple Choice)
4.9/5
(35)
____ is an excellent GUI tool for managing Windows OSs and is capable of displaying graphical representations of several areas.
(Multiple Choice)
4.8/5
(43)
Why is enumeration a more intrusive process than port scanning or footprinting?
(Essay)
5.0/5
(38)
In NetWare 5.0, TCP/IP replaced ____ as the default protocol.
(Multiple Choice)
4.8/5
(30)
Probably the biggest enhancement in Windows 95 was the ____________________, a database that stores information about the system's hardware and software.
(Short Answer)
4.9/5
(32)
As a security professional, should you learn about the security issues in the NetWare OS? Why or why not?
(Essay)
4.8/5
(42)
MATCHING
Match each term with the correct statement below.
-uses SUSE Linux as its OS
(Multiple Choice)
4.8/5
(27)
One of the biggest vulnerabilities of NetBIOS systems is a(n) ____, which is an unauthenticated connection to a Windows computer using no logon and password values.
(Multiple Choice)
4.8/5
(30)
The ____ command gives you a quick way to see whether there are any shared resources on a computer or server.
(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)