Home
You may like this!
26.
Enumeration is useful to system hacking because it provides which of the following?
  • A.
    Passwords
  • B.
    IP ranges
  • C.
    Configurations
  • D.
    Usernames
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Usernames are especially useful in the system hacking process because they allow you to target accounts for password cracking.
Report
Name Email  
27.
Enumeration does not uncover which of the following pieces of information?
  • A.
    Services
  • B.
    User accounts
  • C.
    Ports
  • D.
    Shares
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Ports are usually uncovered during the scanning phase and not the enumeration phase.
Report
Name Email  
28.
__________ involves grabbing a copy of a zone file.
  • A.
    Zone transfer
  • B.
    nslookup transfers
  • C.
    DNS transfer
  • D.
    Zone update
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Zone transfers are used to retrieve a copy of the zone file from a server and store it in another location.
Report
Name Email  
29.
Which of the following would confirm a user named chell in SMTP?
  • A.
    vrfy chell
  • B.
    vrfy –u chell
  • C.
    expn chell
  • D.
    expn –u chell
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
vrfy chell, the verify command, is used within SMTP to verify that the object provided is legitimate.
Report
Name Email  
30.
VRFY is used to do which of the following?
  • A.
    Validate an email address
  • B.
    Expand a mailing list
  • C.
    Validate an email server
  • D.
    Test a connection
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
VRFY validates an email address in SMTP.
Report
Name Email