Enumeration
Which of the following steps in enumeration penetration testing serves as an input to many of the ping sweep and port scanning tools for further enumeration? Calculate the subnet mask Perform competitive intelligence Perform email footprinting Perform ARP poisoning
Calculate the subnet mask
Which of the following SMTP in-built commands tells the actual delivery addresses of aliases and mailing lists? VRFY EXPN RCPT TO PSINFO
EXPN
Which of the following enumeration techniques is used by a network administrator to replicate domain name system (DNS) data across many DNS servers, or to backup DNS files? Extract user names using email IDs Extract information using default passwords Extract information using DNS Zone Transfer Brute force Active Directory
Extract information using DNS Zone Transfer
Which of the following protocols is the technology for both gateway-to-gateway (LAN-to-LAN) and host to gateway (remote access) enterprise VPN solutions? SMTP IPSec SNMP NetBios
IPSec
Which of the following tools can be used to perform LDAP enumeration? SuperScan SoftPerfect Network Scanner JXplorer Nsauditor Network Security Auditor
JXplorer
Which of the following protocols is responsible for accessing distributed directories and access information such as valid usernames, addresses, departmental details, and so on? LDAP DNS NTP SMTP
LDAP
Which of the following protocols uses TCP or UDP as its transport protocol over port 389? LDAP SNMP SMTP SIP
LDAP
Which of the following protocols is responsible for synchronizing clocks of networked computers? LDAP DNS NTP SMTP
NTP
An attacker identified that port 139 on the victim's Windows machine is open and he used that port to identify the resources that can be accessed or viewed on the remote system. What is the protocol that allowed the attacker to perform this enumeration? LDAP NetBIOS SMTP SNMP
NetBIOS
Which of the following information is collected using enumeration? Network resources, network shares, and machine names. Open ports and services. Email Recipient's system IP address and geolocation. Operating systems, location of web servers, users and passwords.
Network resources, network shares, and machine names.
Which of the following tools is not a NetBIOS enumeration tool? Hyena SuperScan NetScanTools Pro OpUtils
OpUtils
Which of the following steps in enumeration penetration testing extracts information about encryption and hashing algorithms, authentication type, key distribution algorithms, SA LifeDuration, etc.? Perform SMTP enumeration Perform DNS enumeration Perform IPsec enumeration Perform NTP enumeration
Perform IPsec enumeration
Which protocol enables an attacker to enumerate user accounts and devices on a target system? SMTP SNMP NetBIOS TCP
SNMP
Which of the following tools can be used to perform SNMP enumeration? SNScan SoftPerfect Network Scanner SuperScan Nsauditor Network Security Auditor
SNScan
At a Windows server command prompt, which command could be used to list the running services? Sc query type= running Sc query \\servername Sc query Sc config
Sc query
Which of the following protocols provides reliable multiprocess communication service in a multinetwork environment? UDP TCP SMTP SNMP
TCP
What is the port number used by DNS servers to perform DNS zone transfer? TCP/UDP 135 UDP 137 TCP 139 TCP/UDP 53
TCP/UDP 53
Which command lets a tester enumerate live systems in a class C network via ICMP using native Windows tools? ping 192.168.2. ping 192.168.2.255 for %V in (1 1 255) do PING 192.168.2.%V for /L %V in (1 1 254) do PING -n 1 192.168.2.%V | FIND /I "Reply"
for /L %V in (1 1 254) do PING -n 1 192.168.2.%V | FIND /I "Reply"
Which of the following windows utilities allow an attacker to perform NetBIOS enumeration? GetRequest nbtstat SetRequest ntpdate
nbtstat
Which of the following command is used by the attackers to query the ntpd daemon about its current state? ntpdate ntptrace ntpdc ntpq
ntpdc