CEH

(Jeff_L) #1

174 Chapter 7 ■ Gaining Access to a System


Review Questions



  1. Enumeration is useful to system hacking because it provides
    A. Passwords
    B. IP ranges
    C. Configuration
    D. Usernames

  2. What can enumeration not discover?
    A. Services
    B. User accounts
    C. Ports
    D. Shares

  3. involves gaining access to a system.
    A. System hacking
    B. Privilege escalation
    C. Enumeration
    D. Backdoor

  4. is the process of exploiting services on a system.
    A. System hacking
    B. Privilege escalation
    C. Enumeration
    D. Backdoor

  5. How is a brute-force attack performed?
    A. By trying all possible combinations of characters
    B. By trying dictionary words
    C. By capturing hashes
    D. By comparing hashes

  6. A is an offline attack.
    A. Cracking attack
    B. Rainbow attack
    C. Birthday attack
    D. Hashing attack

Free download pdf