Home
You may like this!
31.
Enumeration is useful to system hacking because it provides __________.
  • A.
    Passwords
  • B.
    IP ranges
  • C.
    Configuration
  • D.
    Usernames
  • Answer & Explanation
  • Report
Answer : [A,D]
Explanation :
Usernames are especially useful in the system-hacking process because they let you target accounts for password cracking. Enumeration can provide information regarding usernames and accounts.
Report
Name Email  
32.
What does the enumeration phase not discover?
  • A.
    Services
  • B.
    User accounts
  • C.
    Ports
  • D.
    Shares
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Ports are usually uncovered during the scanning phase and not the enumeration phase.
Report
Name Email  
33.
How would you use Netcat to set up a server on a system?
  • A.
    nc –l –p 192.168.1.1
  • B.
    nc –l –p 1000
  • C.
    nc –p –u 1000
  • D.
    nc –l –p –t 192.168.1.1
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Netcat uses the syntax nc –l –p to listen on a specific port, with the port number being specified as a number following the–p. For example, nc –l –p 1000 would tell the server to listen on port 1000 for incoming connections.
Report
Name Email  
34.
__________ is the process of exploiting services on a system.
  • A.
    System hacking
  • B.
    Privilege escalation
  • C.
    Enumeration
  • D.
    Backdoor
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
System hacking is intended to increase access to a system.
Report
Name Email  
35.
How is a brute-force attack performed?
  • A.
    By trying all possible combinations of characters
  • B.
    By trying dictionary words
  • C.
    By capturing hashes
  • D.
    By comparing hashes
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Brute-force attacks are carried out by trying all possible combinations of characters in an attempt to uncover the correct one.
Report
Name Email