
Enumeration
Authored by Dr.Ramalingam D
Computers
University
Used 79+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following testing processes is the most intrusive?
Enumeration
Null scanning
Numeration
Port scanning
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Security testers conduct enumeration for which of the following reasons? (Choose all that apply.)
Gaining access to shares and network resources
Discovering services running on computers and servers
Obtaining user logon names and group memberships
Discovering open ports on computers and servers
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following tools can be used to enumerate Windows systems? (Choose all
that apply.)
OpenVAS
DumpSec
Hyena
DumpIt
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Enumeration of Windows systems can be more difficult if ..........port is filtered.
110/UDP
443/UDP
80/TCP
139/TCP
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Net view command can be used to see whether there are any shared resources on a server. True or False?
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A null session is enabled by default in all the following Windows versions except:
Windows 95
Windows Server 2008
Windows 98
Windows 2000
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
To identify the NetBIOS names of systems on the 193.145.85.0 network, which of the following commands do you use?
nbtscan 193.145.85.0/24
nbtscan 193.145.85.0-255
nbtstat 193.145.85.0/24
netstat 193.145.85.0/24
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?