Home
You may like this!
121.
__________ is a method for expanding an email list.
  • A.
    VRFY
  • B.
    EXPN
  • C.
    RCPT TO
  • D.
    SMTP
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
The EXPN command will display the recipients of an email list.
Report
Name Email  
122.
An attacker can use __________ to enumerate users on a system.
  • A.
    NetBIOS
  • B.
    TCP/IP
  • C.
    NetBEUI
  • D.
    NNTP
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
NetBIOS can be used to enumerate the users on a system.
Report
Name Email  
123.
A __________ is used to connect to a remote system using NetBIOS.
  • A.
    NULL session
  • B.
    Hash
  • C.
    Rainbow table
  • D.
    Rootkit
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
A NULL session can be used to connect to a remote system via the ipc$ share.
Report
Name Email  
124.
__________ is used to synchronize clocks on a network.
  • A.
    SAM
  • B.
    NTP
  • C.
    NetBIOS
  • D.
    FTP
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
NTP (Network Time Protocol) is used to synchronize clocks on a network.
Report
Name Email  
125.
Port number __________ is used for SMTP.
  • A.
    25
  • B.
    110
  • C.
    389
  • D.
    52
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Port 25 is for SMTP.
Report
Name Email