Quiz 2

Ace your homework & exams now with Quizwiz!

MD5 message algorithm takes a message of arbitrary length and outputs a ____? - 64-bit fingerprint - 128-bit fingerprint or message digest - 32-bit output - 256-bit key pair

- 128-bit fingerprint or message digest

IP Network Browser can determine this on a Cisco Device (select all that apply): - ARP Tables - Cards installed - Passwords - IOS version

- ARP Tables - Cards installed - IOS version

The Pstools include which of the following? (Choose all that apply) - psdumpram - PsLogList - PsExec - PsLists

- PsLogList - PsExec - PsLists

Which of the following accurately describes Transmission Control Protocol (choose all that apply) 1) Connection-less oriented protocols 2) Supports retransmission of lost data 3) provides acknowledgement 4) can terminate a connection

1) Connection-less oriented protocols 2) Supports retransmission of lost data 3) provides acknowledgement

Commonly used SNMP enumeration tools include which of the following? 1) IP Network Browser 2) hping3 3) Angry IP Scanner 4) nmap

1) IP Network Browser

Which of the following are LDAP enumeration tools? (choose all that apply) 1) JXplorer 2) Active Directory Explorer 3) SnScan 4) LEX

1) JXplorer 2) Active Directory Explorer 4) LEX

Which of the following commands are Network Time Protocol (NTP) enumeration commands? (choose all that apply) 1) NTPQ 2) Net time 3) ntptrace 4) ntpdate

1) NTPQ 2) Net time 3) ntptrace 4) ntpdate

The SMTP protocol provides 3 built in commands. What are they? 1) RCPT TO 2) FINGER 3) EXPN 4) VRFY

1) RCPT TO 3) EXPN 4) VRFY

Which of the following are SNMP enumerations tools (choose all the apply)? 1) Spiceworks 2) Softperfect 3) Nmap 4) Getif

1) Spiceworks 2) Softperfect 4) Getif

User DataGram protocol can be used for which three of the following? 1) Streaming audio 2) reliable communication 3) video 4) teleconferencing

1) Streaming audio 2) reliable communication 3) video 4) teleconferencing

NetBIOS uses which of the following? (choose all the apply) 1) UDP Port 138 2) TCP Port 22 3) UDP Port 137 4) TCP Port 139

1) UDP Port 138 2) TCP Port 22 3) UDP Port 137

Most password attacks are successful due to _________. 1) Guessable passwods 2) lack of security 3) complicated password policy 4) expired usernames

1) guessable passwords

Symmetric encryption uses the _______ to encrypt and decrypt.1 1) same keys 2) two key pairs method 3) different keys 4) none of the above

1) same keys

Typically SNMP uses this port for transmission: - 161 - 137 - 139 - 445

161

This command provides you with NetBIOS statistics: 1) netstat 2) nbtstat 3) netbstat 4) net use

2) nbtstat

Which of the following Management Information Base (MIB) files contains information about server services? 1) HOSTMIB.MIB 2) WINS.MIB 3) LNMIB2.MIB 4) DCHP.MIB

3) LNMIB2.MIB

Typically NBNS uses this port for transmission: 1) TCP port 139 2) UDP Port 139 3) TCP Port 137 4) UDP Port 137

4) UDP Port 137

Which of the following is NOT a Social engineering technique?- selecting a victim - developing a relationship - exploiting the victim - research on a target company

Exploiting the victim

True or False: NetBIOS Name Resolution is supported in IPv6

False

SMTP uses which port? 1) TCP Port 25 2) TCP Port 110 3) UDP Port 161 4) UDP Port 993

TCP Port 25


Related study sets

Therapeutic Exercise Elbow Chapter 18

View Set

AP World History Modern: Chapter 17

View Set

Semester 2 Exam Review Questions

View Set

Chapter 3 Licensing and Certification

View Set