148 Chapter 6 ■ Enumeration of Services
- An attacker can use to enumerate users on a system.
A. NetBIOS
B. TCP/IP
C. NetBEUI
D. NNTP - A is used to connect to a remote system using NetBIOS.
A. NULL session
B. Hash
C. Rainbow table
D. Rootkit - is used to synchronize clocks on a network.
A. SAM
B. NTP
C. NetBIOS
D. FTP - Port number is used for SMTP.
A. 25
B. 110
C. 389
D. 52 - Port number is used by DNS for zone transfers.
A. 53 TCP
B. 53 UDP
C. 25 TCP
D. 25 UDP - Which command can be used to view NetBIOS information?
A. netstat
B. nmap
C. nbtstat
D. telnet