Exam 6: Enumeration
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
LDAP (port ____) is the protocol used to access Novell's eDirectory, Microsoft Active Directory, and Apple Open Directory.
(Multiple Choice)
4.8/5
(39)
____ is a system process that runs on Windows OSs to facilitate the exchange of network data.
(Multiple Choice)
4.8/5
(32)
NetWare's ____ is a graphical Java utility for centralized network administration.
(Multiple Choice)
4.8/5
(40)
Many password-guessing programs are available that can determine a password in a matter of seconds. One such program the Department of Defense uses is ____________________.
(Short Answer)
4.7/5
(40)
MATCHING
Match each term with the correct statement below.
-the kernel data structures were made read only to prevent rogue applications from affecting the core of the operating system
(Multiple Choice)
4.8/5
(29)
MATCHING
Match each term with the correct statement below.
-first Microsoft GUI product that did not rely on DOS
(Multiple Choice)
4.7/5
(38)
____ implemented Windows File Protection to prevent core system files from being overwritten.
(Multiple Choice)
4.8/5
(22)
With ____, you can have your desktop computer or laptop start in both Windows and Linux.
(Multiple Choice)
4.8/5
(31)
The "NBT" part of "NBTscan" is an abbreviation for ____________________ over TCP/IP.
(Short Answer)
4.9/5
(37)
MATCHING
Match each term with the correct statement below.
-developed by contributors and sponsored by Red Hat
(Multiple Choice)
4.8/5
(29)
The computer names you assign to Windows systems are called ____ names.
(Multiple Choice)
4.7/5
(39)
MATCHING
Match each term with the correct statement below.
-encompasses four editions; each is targeted to different markets with different features
(Multiple Choice)
4.8/5
(34)
MATCHING
Match each term with the correct statement below.
-domains are emphasized in this OS instead of workgroups
(Multiple Choice)
4.9/5
(42)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)