174 Chapter 7 ■ Gaining Access to a System
Review Questions
- Enumeration is useful to system hacking because it provides
A. Passwords
B. IP ranges
C. Configuration
D. Usernames - What can enumeration not discover?
A. Services
B. User accounts
C. Ports
D. Shares - involves gaining access to a system.
A. System hacking
B. Privilege escalation
C. Enumeration
D. Backdoor - is the process of exploiting services on a system.
A. System hacking
B. Privilege escalation
C. Enumeration
D. Backdoor - How is a brute-force attack performed?
A. By trying all possible combinations of characters
B. By trying dictionary words
C. By capturing hashes
D. By comparing hashes - A is an offline attack.
A. Cracking attack
B. Rainbow attack
C. Birthday attack
D. Hashing attack