31.
Enumeration is useful to system hacking because it provides __________.
- A.Passwords
- B.IP ranges
- C.Configuration
- D.Usernames
- Answer & Explanation
- Report
Answer : [A,D]
Explanation :
Explanation :
Usernames are especially useful in the system-hacking process because they let you target accounts for password cracking. Enumeration can provide information regarding usernames and accounts. |
32.
What does the enumeration phase not discover?
- A.Services
- B.User accounts
- C.Ports
- D.Shares
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Ports are usually uncovered during the scanning phase and not the enumeration phase. |
33.
How would you use Netcat to set up a server on a system?
- A.nc –l –p 192.168.1.1
- B.nc –l –p 1000
- C.nc –p –u 1000
- D.nc –l –p –t 192.168.1.1
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Netcat uses the syntax nc –l –p to listen on a specific port, with the port number being specified as a number following the–p. For example, nc –l –p 1000 would tell the server to listen on port 1000 for incoming connections. |
34.
__________ is the process of exploiting services on a system.
- A.System hacking
- B.Privilege escalation
- C.Enumeration
- D.Backdoor
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
System hacking is intended to increase access to a system. |
35.
How is a brute-force attack performed?
- A.By trying all possible combinations of characters
- B.By trying dictionary words
- C.By capturing hashes
- D.By comparing hashes
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Brute-force attacks are carried out by trying all possible combinations of characters in an attempt to uncover the correct one. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40