CEH

(Jeff_L) #1

148 Chapter 6 ■ Enumeration of Services



  1. An attacker can use to enumerate users on a system.
    A. NetBIOS
    B. TCP/IP
    C. NetBEUI
    D. NNTP

  2. A is used to connect to a remote system using NetBIOS.
    A. NULL session
    B. Hash
    C. Rainbow table
    D. Rootkit

  3. is used to synchronize clocks on a network.
    A. SAM
    B. NTP
    C. NetBIOS
    D. FTP

  4. Port number is used for SMTP.
    A. 25
    B. 110
    C. 389
    D. 52

  5. Port number is used by DNS for zone transfers.
    A. 53 TCP
    B. 53 UDP
    C. 25 TCP
    D. 25 UDP

  6. Which command can be used to view NetBIOS information?
    A. netstat
    B. nmap
    C. nbtstat
    D. telnet

Free download pdf