CEH

(Jeff_L) #1

Review Questions 147


Review Questions



  1. Enumeration is useful to system hacking because it provides which of the following:


A. Passwords
B. IP ranges
C. Configurations
D. Usernames


  1. Enumeration does not uncover which of the following pieces of information?


A. Services
B. User accounts
C. Ports
D. Shares


  1. involves increasing a user’s access on a system.


A. System hacking
B. Privilege escalation
C. Enumeration
D. Backdoor


  1. is the process of exploiting services on a system.


A. System hacking
B. Privilege escalation
C. Enumeration
D. Backdoor


  1. VRFY is used to do which of the following?


A. Validate an e-mail address
B. Expand a mailing list
C. Validate an e-mail server
D. Test a connection


  1. is a method for expanding an e-mail list.


A. VRFY
B. EXPN
C. RCPT TO
D. SMTP
Free download pdf