Review Questions 147
Review Questions
- Enumeration is useful to system hacking because it provides which of the following:
A. Passwords
B. IP ranges
C. Configurations
D. Usernames
- Enumeration does not uncover which of the following pieces of information?
A. Services
B. User accounts
C. Ports
D. Shares
- involves increasing a user’s access on a system.
A. System hacking
B. Privilege escalation
C. Enumeration
D. Backdoor
- is the process of exploiting services on a system.
A. System hacking
B. Privilege escalation
C. Enumeration
D. Backdoor
- VRFY is used to do which of the following?
A. Validate an e-mail address
B. Expand a mailing list
C. Validate an e-mail server
D. Test a connection
- is a method for expanding an e-mail list.
A. VRFY
B. EXPN
C. RCPT TO
D. SMTP