AND ANSWERS ALL CORRECT
Enumeration can be used to discover all but which of the following types of information?
A. Smartcard PINs
B. Ports
C. Services
D. Shares - Answer-A. Smartcard PINs
Processes in Windows run in all of but which one of the following user contexts?
A. Local service
B. System
C. Current user
D. Remote access - Answer-D. Remote access
Which of the following is a database on the local system that stores user account
information?
A. Security Account Manager (SAM)
B. Local Security Account (LSA)
C. Kerberos
D. BitLocker - Answer-A. Security Account Manager (SAM)
Which of the following best describes what occurs when a user attempts a connection to
a Windows system without the standard username and password being provided?
A. NULL session
, B. Privilege escalation
C. Enumeration
D. Backdoor - Answer-A. NULL session
Which of the following best describes what occurs when a lower-level account is
cracked in order to obtain increased access?
A. NULL session
B. Privilege escalation
C. Enumeration
D. Backdoor - Answer-B. Privilege escalation
Nmap's -sT command tells the application to do which of the following?
A. Choose random targets
B. Pick a target
C. Treat all hosts as online
D. Perform a full TCP connection scan - Answer-D. Perform a full TCP connection scan
What does OS fingerprinting allow?
A. OS vulnerability testing
B. Network mapping
C. Host OS identification
D. Packet capture - Answer-C. Host OS identification
A ___________ scan detects packets in which all flags are active.
A. XMAS
B. FIN
C. ACK
D. SYN - Answer-A. XMAS