Quiz 2
MD5 message algorithm takes a message of arbitrary length and outputs a ____? - 64-bit fingerprint - 128-bit fingerprint or message digest - 32-bit output - 256-bit key pair
- 128-bit fingerprint or message digest
IP Network Browser can determine this on a Cisco Device (select all that apply): - ARP Tables - Cards installed - Passwords - IOS version
- ARP Tables - Cards installed - IOS version
The Pstools include which of the following? (Choose all that apply) - psdumpram - PsLogList - PsExec - PsLists
- PsLogList - PsExec - PsLists
Which of the following accurately describes Transmission Control Protocol (choose all that apply) 1) Connection-less oriented protocols 2) Supports retransmission of lost data 3) provides acknowledgement 4) can terminate a connection
1) Connection-less oriented protocols 2) Supports retransmission of lost data 3) provides acknowledgement
Commonly used SNMP enumeration tools include which of the following? 1) IP Network Browser 2) hping3 3) Angry IP Scanner 4) nmap
1) IP Network Browser
Which of the following are LDAP enumeration tools? (choose all that apply) 1) JXplorer 2) Active Directory Explorer 3) SnScan 4) LEX
1) JXplorer 2) Active Directory Explorer 4) LEX
Which of the following commands are Network Time Protocol (NTP) enumeration commands? (choose all that apply) 1) NTPQ 2) Net time 3) ntptrace 4) ntpdate
1) NTPQ 2) Net time 3) ntptrace 4) ntpdate
The SMTP protocol provides 3 built in commands. What are they? 1) RCPT TO 2) FINGER 3) EXPN 4) VRFY
1) RCPT TO 3) EXPN 4) VRFY
Which of the following are SNMP enumerations tools (choose all the apply)? 1) Spiceworks 2) Softperfect 3) Nmap 4) Getif
1) Spiceworks 2) Softperfect 4) Getif
User DataGram protocol can be used for which three of the following? 1) Streaming audio 2) reliable communication 3) video 4) teleconferencing
1) Streaming audio 2) reliable communication 3) video 4) teleconferencing
NetBIOS uses which of the following? (choose all the apply) 1) UDP Port 138 2) TCP Port 22 3) UDP Port 137 4) TCP Port 139
1) UDP Port 138 2) TCP Port 22 3) UDP Port 137
Most password attacks are successful due to _________. 1) Guessable passwods 2) lack of security 3) complicated password policy 4) expired usernames
1) guessable passwords
Symmetric encryption uses the _______ to encrypt and decrypt.1 1) same keys 2) two key pairs method 3) different keys 4) none of the above
1) same keys
Typically SNMP uses this port for transmission: - 161 - 137 - 139 - 445
161
This command provides you with NetBIOS statistics: 1) netstat 2) nbtstat 3) netbstat 4) net use
2) nbtstat
Which of the following Management Information Base (MIB) files contains information about server services? 1) HOSTMIB.MIB 2) WINS.MIB 3) LNMIB2.MIB 4) DCHP.MIB
3) LNMIB2.MIB
Typically NBNS uses this port for transmission: 1) TCP port 139 2) UDP Port 139 3) TCP Port 137 4) UDP Port 137
4) UDP Port 137
Which of the following is NOT a Social engineering technique?- selecting a victim - developing a relationship - exploiting the victim - research on a target company
Exploiting the victim
True or False: NetBIOS Name Resolution is supported in IPv6
False
SMTP uses which port? 1) TCP Port 25 2) TCP Port 110 3) UDP Port 161 4) UDP Port 993
TCP Port 25