Enumeration CH 6 Quiz
The Nbtstat command is used to enumerate *nix systems. a. True b. False
False
What utility can be used for enumerating Windows OS's? a. LDAP b. NetBIOS c. NBTscan d. Solaris
NBTscan
Which of the following is a commonly used UNIX enumeration tool? a. Netcat b. Nbtstat c. Netstat d. SNMPWalk
Netstat
The Net view command can be used to see whether a server has any shared resources. a. True b. False
True
Which of the following tools can be used to enumerate Windows systems? (Choose all that apply.) a. OpenVAS or Nessus b. Reddit c. DumpIt d. Hyena
a. OpenVAS or Nessus d. Hyena
What is the best method of preventing NetBIOS attacks? a. filtering certain ports at the firewall b. telling users to create difficult-to-guess passwords c. pausing the Workstation service d. stopping the Workstation service
a. filtering certain ports at the firewall
To determine what resources or shares are on a network, security testers must use port scanning and what other procedure first to determine what OS is being used? a. footprinting b. ping sweeps c. sandboxing d. port analysis
a. footprinting
Security testers conduct enumeration for which of the following reasons? (Choose all that apply.) a. gaining access to shares and network resources b. obtaining user logon names and group memberships c. discovering services running on computers and servers d. discovering open ports on computers and servers
a. gaining access to shares and network resources b. obtaining user login names and group memberships
To identify the NetBIOS names of systems on the 193.145.85.0 network, which of the following commands do you use? a. nbtscan 193.145.85.0/24 b. nbtscan 193.145.85.0-255 c. nbtstat 193.145.85.0/24 d. netstat 193.145.85.0/24
a. nbtscan 193.145.85.0/24
Which of the following commands connects to a computer containing shared files and folders? a. Net view b. Net use c. Netstat d. Nbtstat
b. Net use
What does the "NBT" part of "NBTscan" stand for? a. NetBIOS Transfer b. NetBIOS over TCP/IP c. NetBIOS Test d. NetBIOS over Transport
b. NetBIOS over TCP/IP
Which port numbers indicate NetBIOS is in use on a remote target? a. 135 to 137 b. 389 to 1023 c. 135 to 139 d. 110 and 115
c. 135 to 139
Not counting the reserved character at the end, a NetBIOS name can contain a maximum of ________ characters. a. 10 b. 11 c. 15 d. 16
c. 15
Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network? a. Net use b. Net user c. Net view d. Nbtuser
c. Net view
What process involves connecting to a remote system to access and extract valuable information? a. mapping b. ping sweeps c. enumeration d. port scanning
c. enumeration
Which of the following commands should you use to determine whether there are any shared resources on a Windows computer with the IP address 193.145.85.202? a. netstat -c 193.145.85.202 b. nbtscan -a 193.145.85.202 c. nbtstat -a 193.145.85.202 d. nbtstat -a \\193.145.85.202\\193.145.85.202
c. nbtstat -a 193.145.85.202
Most NetBIOS enumeration tools connect to the target system by using which of the following? a. ICMP packets b. default logons and blank passwords c. null sessions d. admin accounts
c. null sessions
Enumeration of Windows systems can be more difficult if port _______ is filtered. a. 110/UDP b. 443/UDP c. 80/TCP d. 139/TCP
d. 139/TCP
To determine what resources or shares are on a network, security testers must use footprinting and what other procedure to determine what services a host computer offers? a. rookits b. ping sweeps c. sandboxing d. port scanning
d. port scanning
Which of the following testing processes is the most intrusive? a. port scanning b. enumeration c. null scanning d. numeration
enumeration