Filters
Question type

Study Flashcards

Which of the following is a useful enumeration tool that enables you to find out who is logged into a *nix system with one simple command?


A) Net utility
B) Finger utility
C) Nix utility
D) Point utility

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

What is the Net view command and how can you use it?

Correct Answer

verifed

verified

The Net view command is a built-in Windo...

View Answer

What boot loader will allow your computer or laptop to start in both Windows and Linux?


A) BASH
B) BIOS
C) X500
D) GRUB

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Why is understanding the protocol "Simple Network Management Protocol" important for security professionals?

Correct Answer

verifed

verified

The SNMP service can run on both Windows...

View Answer

What is a "null session" and how does it relate to Window's systems?

Correct Answer

verifed

verified

Historically,one of the biggest vulnerab...

View Answer

What feature implemented in Windows Server 2016 allows for application isolation to protect applications from one another?


A) Windows Boxes
B) Windows VMs
C) Windows NT
D) Windows Containers

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

NBTscan is a utility that can be used for enumerating Windows OSs.

A) True
B) False

Correct Answer

verifed

verified

What process allows a security professional to extract valuable information,such as information about users and recent login times from a network?


A) mapping
B) port analysis
C) enumeration
D) back scanning

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Match each item with a statement below. -Unauthenticated connection to a Windows computer that uses no logon and password values.


A) Windows 95
B) NetBIOS
C) Windows Server 2012
D) null session
E) SNMP
F) enumeration
G) Windows Vista
H) Windows 7
I) Windows 10
J) Windows Server 2016

K) C) and I)
L) D) and F)

Correct Answer

verifed

verified

Why do hackers pay attention to NetBIOS computer name suffixes?

Correct Answer

verifed

verified

The NetBIOS name suffixes correspond to ...

View Answer

What type of Windows Server is the most likely server to be targeted by a computer hacker?


A) File Server
B) DNS Server
C) DHCP Server
D) Domain Controller

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Windows Server 2012 introduced what protection feature to prevent pass-the-hash attacks?


A) Containers
B) Authentication Silos
C) Attack Surface
D) AppLocker

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

The computer names you assign to Windows systems are called which of the following?


A) AD Names
B) NetBIOS
C) NetDDE
D) IIS

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Match each item with a statement below. -First Windows version to introduce User Account Control and BitLocker


A) Windows 95
B) NetBIOS
C) Windows Server 2012
D) null session
E) SNMP
F) enumeration
G) Windows Vista
H) Windows 7
I) Windows 10
J) Windows Server 2016

K) A) and B)
L) I) and J)

Correct Answer

verifed

verified

Match each item with a statement below. -Designed for use on tablets and traditional PCs and only allows trusted applications by default through Device Guard


A) Windows 95
B) NetBIOS
C) Windows Server 2012
D) null session
E) SNMP
F) enumeration
G) Windows Vista
H) Windows 7
I) Windows 10
J) Windows Server 2016

K) C) and H)
L) B) and E)

Correct Answer

verifed

verified

If you do not have access to Nessus,what NMap procedure can be used to help you to gain information about remote *nix hosts?


A) script analysis
B) script scanning
C) snmp pinging
D) range ping

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

What version of Windows Server has completely eliminated the option for telnet server?


A) Windows Server 2012
B) Windows Server 2003
C) Windows Server 2016
D) Windows Server 2008

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

A NetBIOS name does not need to be unique on a network.

A) True
B) False

Correct Answer

verifed

verified

What is the primary purpose of enumeration,and give three examples of information that can be acquired through enumeration?

Correct Answer

verifed

verified

Enumeration is the process of extracting...

View Answer

Which of the following is a Windows programming interface that allows computers to communicate across a local area network (LAN) ?


A) NetBIOS
B) BIOS
C) NetApp
D) NetAPI

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer