26.
Enumeration is useful to system hacking because it provides which of the following?
- A.Passwords
- B.IP ranges
- C.Configurations
- D.Usernames
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Usernames are especially useful in the system hacking process because they allow you to target accounts for password cracking. |
27.
Enumeration does not uncover which of the following pieces of information?
- A.Services
- B.User accounts
- C.Ports
- D.Shares
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Ports are usually uncovered during the scanning phase and not the enumeration phase. |
28.
__________ involves grabbing a copy of a zone file.
- A.Zone transfer
- B.nslookup transfers
- C.DNS transfer
- D.Zone update
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Zone transfers are used to retrieve a copy of the zone file from a server and store it in another location. |
29.
Which of the following would confirm a user named chell in SMTP?
- A.vrfy chell
- B.vrfy –u chell
- C.expn chell
- D.expn –u chell
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
vrfy chell, the verify command, is used within SMTP to verify that the object provided is legitimate. |
30.
VRFY is used to do which of the following?
- A.Validate an email address
- B.Expand a mailing list
- C.Validate an email server
- D.Test a connection
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
VRFY validates an email address in SMTP. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40