6.2.5 - Enumeration Countermeasures (Practice Questions)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Ignore messages to unknown recipients instead of sending back error messages.

Which of the following is the most basic way to counteract SMTP exploitation?

LDAP

After the enumeration stage, you have are considering blocking port 389. Your colleagues has advised you to use caution when blocking ports that could potentially impact your network. Which of the following necessary services could be blocked?

This is a DNS zone transfer.

Diana, a penetration tester, executed the following command. Which answer describes what you learn from the information displayed?

SNscan

Robby, a security specialist, is taking countermeasures for SNMP. Which of the following utilities would he most likely use to detect SNMP devices on the network that are vulnerable to attacks?

Split DNS

Hugh, a security consultant, recommended the use of an internal and external DNS to provide an extra layer of security. Which of the following DNS countermeasures is being used?


संबंधित स्टडी सेट्स

ATI Fluid, electrolyte, and Acid-Base Regulation Test

View Set

Chemistry Midterm Review (Unit 3 and Unit 4)

View Set

CRPC | Maximizing the Client Experience During the Retirement Planning Process

View Set

Bio 183 Practice Final Daddy Jacquet

View Set