121.
__________ is a method for expanding an email list.
- A.VRFY
- B.EXPN
- C.RCPT TO
- D.SMTP
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
The EXPN command will display the recipients of an email list. |
122.
An attacker can use __________ to enumerate users on a system.
- A.NetBIOS
- B.TCP/IP
- C.NetBEUI
- D.NNTP
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
NetBIOS can be used to enumerate the users on a system. |
123.
A __________ is used to connect to a remote system using NetBIOS.
- A.NULL session
- B.Hash
- C.Rainbow table
- D.Rootkit
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
A NULL session can be used to connect to a remote system via the ipc$ share. |
124.
__________ is used to synchronize clocks on a network.
- A.SAM
- B.NTP
- C.NetBIOS
- D.FTP
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
NTP (Network Time Protocol) is used to synchronize clocks on a network. |
125.
Port number __________ is used for SMTP.
- A.25
- B.110
- C.389
- D.52
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Port 25 is for SMTP. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40