Enumeration CH 6 Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The Nbtstat command is used to enumerate *nix systems. a. True b. False

False

What utility can be used for enumerating Windows OS's? a. LDAP b. NetBIOS c. NBTscan d. Solaris

NBTscan

Which of the following is a commonly used UNIX enumeration tool? a. Netcat b. Nbtstat c. Netstat d. SNMPWalk

Netstat

The Net view command can be used to see whether a server has any shared resources. a. True b. False

True

Which of the following tools can be used to enumerate Windows systems? (Choose all that apply.) a. OpenVAS or Nessus b. Reddit c. DumpIt d. Hyena

a. OpenVAS or Nessus d. Hyena

What is the best method of preventing NetBIOS attacks? a. filtering certain ports at the firewall b. telling users to create difficult-to-guess passwords c. pausing the Workstation service d. stopping the Workstation service

a. filtering certain ports at the firewall

To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used? a. footprinting b. ping sweeps c. sandboxing d. port analysis

a. footprinting

Security testers conduct enumeration for which of the following reasons? (Choose all that apply.) a. gaining access to shares and network resources b. obtaining user logon names and group memberships c. discovering services running on computers and servers d. discovering open ports on computers and servers

a. gaining access to shares and network resources b. obtaining user login names and group memberships

To identify the NetBIOS names of systems on the 193.145.85.0 network, which of the following commands do you use? a. nbtscan 193.145.85.0/24 b. nbtscan 193.145.85.0-255 c. nbtstat 193.145.85.0/24 d. netstat 193.145.85.0/24

a. nbtscan 193.145.85.0/24

Which of the following commands connects to a computer containing shared files and folders? a. Net view b. Net use c. Netstat d. Nbtstat

b. Net use

What does the "NBT" part of "NBTscan" stand for? a. NetBIOS Transfer b. NetBIOS over TCP/IP c. NetBIOS Test d. NetBIOS over Transport

b. NetBIOS over TCP/IP

Which port numbers indicate NetBIOS is in use on a remote target? a. 135 to 137 b. 389 to 1023 c. 135 to 139 d. 110 and 115

c. 135 to 139

Not counting the reserved character at the end, a NetBIOS name can contain a maximum of ________ characters. a. 10 b. 11 c. 15 d. 16

c. 15

Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network? a. Net use b. Net user c. Net view d. Nbtuser

c. Net view

What process involves connecting to a remote system to access and extract valuable information? a. mapping b. ping sweeps c. enumeration d. port scanning

c. enumeration

Which of the following commands should you use to determine whether there are any shared resources on a Windows computer with the IP address 193.145.85.202? a. netstat -c 193.145.85.202 b. nbtscan -a 193.145.85.202 c. nbtstat -a 193.145.85.202 d. nbtstat -a \\193.145.85.202\\193.145.85.202

c. nbtstat -a 193.145.85.202

Most NetBIOS enumeration tools connect to the target system by using which of the following? a. ICMP packets b. default logons and blank passwords c. null sessions d. admin accounts

c. null sessions

Enumeration of Windows systems can be more difficult if port _______ is filtered. a. 110/UDP b. 443/UDP c. 80/TCP d. 139/TCP

d. 139/TCP

To determine what resources or shares are on a network, security testers must use footprinting and what other procedure to determine what services a host computer offers? a. rookits b. ping sweeps c. sandboxing d. port scanning

d. port scanning

Which of the following testing processes is the most intrusive? a. port scanning b. enumeration c. null scanning d. numeration

enumeration


Set pelajaran terkait

HESI Reduce Risk Potential NCLEX Review

View Set

Adrielle Module 9 - Introduction to simulation

View Set

Health Assessment Prep U Chapter 3

View Set

1 - D Motion - Physics...........

View Set

Composition👉作文开头、结尾、好词好句

View Set